Skip to main content

Most read in past 36 months

Title Sort ascending Total views
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina 29
Концепцията за национална сигурност и информационното противоборство 2
Work Package: Real-time Data Processing in Adaptive Sensor Interfaces 7
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence 21
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security 89
Welcoming Address 3
Vulnerability Analysis for Urban Natural Gas Pipeline Network System 21
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan 21
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age 12
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training 155
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 51
Using Strategic Planning in Support of Defense Acquisitions 10
Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover 13
Using Cyber Ranges in Cybersecurity Management Educational Programmes 50
Using Architectural Models to Identify Opportunities for Improvement of Acquisition Management 8
Use of Mobile Applications in Security and Safety Systems 2
US Department of Defense Modeling and Simulation: New Approaches and Initiatives 12
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry 32
Ukrainian Educational System in the Field of Cybersecurity 10
Ubiquitous Insecurity? How to “Hack” IT Systems 7
Two Secure Transportation Schemes for Mobile Agents 8
TUX-TMS: A Reputation-based Trust System 8
Turkish Security Discourses and Policies: The Kurdish Question 18
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks 8
Transparency-building in the Security Sector 3
Transparency of Defence Policy in Progress 11
Transparency Matters 6
Transparency in Reforming the National Security Sector in Transition Countries 3
Transparency in Force Modernization Decisions 5
Transparency in Defence Resource Management - Problems and Solutions 17
Transformation: Military and Science 37
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models 59
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm 39
Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience 31
Tracking Filters for Radar Systems with Correlated Measurement Noise 14
Towards Unified European Cyber Incident and Crisis Management Ontology 89
Towards Multi-National Capability Development in Cyber Defence 12
Towards Europe 2035: In Search of the Archimedean Screw. FOCUS in Perspective 12
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience 13
Towards Creation of a Unified Information System of the Navies of the Black Sea Countries 14
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience 74
Towards a More Resilient Cyberspace: The Case of Albania 18
Total Information Awareness (DARPA’s Research Program) 26
Timothy Thomas on the Key Elements of the Russian Approach to IW 14
Tiems Contribution to Emergency and Crisis Management 9
The White Paper of Civil Protection of the Republic of Bulgaria 4
The war for control of information 7
The Use of the Internet by Terrorist Organizations 36
The Urge for Comprehensive Cyber Security Strategies in the Western Balkan 8
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks 31