Skip to main content

Most read in past 36 months

Title Sort ascending Total views
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects 7
The Role of Information Campaigns and Advertising in the Military Recruitment System 37
The Rise of Russian PMCs – ‘Stealth’ Instrument for a ‘Sharp Power’ 2
The Persistent Need to Reform Cyber Security Services: A Case Study on France 8
The Obama Administration and Incident Response: A Report 10
The Multi-Role NATO-Interoperable Light Weight Torpedo for the 21st Century 4
The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation 19
The Ministry of Defense Armed Forces Transformation Management Policy 6
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS) 11
The Internet in China: Civilian and Military Uses 7
The Internet and the Changing Face of International Relations and Security 7
The Information Society Should Serve the People 8
The Information Revolution and Post-Modern Warfare 5
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour 110
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022 140
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution 34
The Human Factor in the Integrated Approach to Cyberdefence 10
The Hackathons as a First Step to Build Digital Competences 58
The Growing Threat: Homeland Security Issues of Bulgaria 6
The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization 6
The Genetic Program - A Technocratic Hypothesis 7
The Experience of Rakovski National Defense College in Organizing the Communication in the Educational Process During Covid-19 Pandemic 12
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination 6
The Dialectics of Information – A Framework 5
The Design And Evaluation of Situation Assessment Strategies 7
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection 35
The Cyberspace Dimension in Armed Conflict: Approaching a Complex Issue with Assistance of the Morphological Method 8
The Concepts and Design of ROC Defense Reorganization 12
The Computer Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces 10
The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas 7
The Coalition Information Systems and Operations Learning Network: An Emerging Concept for Multinational C4 Interoperability 5
The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development 5
The Case for Advanced Distributed Learning 9
The C4I System Concept and the Control of National Sea Spaces 8
The Bulgarian Armed Forces in the Information Society 45
The Bulgarian Air Force in a New Security Environment 3
Testbed for implementation of advanced IT Participation 2
Terrorist ‘Use’ of the Internet and Fighting Back 78
Terrorism on the Sea, Piracy, and Maritime Security 9
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking 12
Telemedical Services for Disaster Emergencies 15
TAS: Trust Assessment System 11
Tactical Approach to Cyber Defence in IoT Computer Networks 29
Synopsis of Operational Research in the UK Ministry of Defence 8
Supporting Transformation 10
Supporting Transformation 10
Supply Chain Cyber Security – Potential Threats 59
Structured Description of Naval Tasks 17
Strategy Development and Implementation in a Complex Multi-National IT Organisation 14
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification 61