Skip to main content

Most read in past 36 months

Title Total views Sort ascending
Information Assurance Benefits and Challenges: An Introduction 375
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving 359
Analysis of Cybersecurity Issues in the Maritime Industry 320
Cognitive Attacks in Russian Hybrid Warfare 248
How to Support Teams to be Remote and Productive: Group Decision-Making for Distance Collaboration Software Tools 237
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive 236
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities 212
Capabilities-based Planning for Security Sector Transformation 191
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel 183
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training 160
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages 156
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider? 148
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022 140
OSINT on the Dark Web: Child Abuse Material Investigations 129
A New Steganographic Algorithm for Hiding Messages in Music 125
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach 125
A Logical Model for Multi-Sector Cyber Risk Management 125
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes 125
Security Analysis of Diceware Passphrases 123
Cyber Threat Prediction with Machine Learning 118
Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief 113
Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe 113
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES 112
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour 110
Credit Card Fraud Detection Using Self-Organizing Maps 110
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods 110
Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions 105
Enhancing the Organisational Culture related to Cyber Security during the University Digital Transformation 104
Organizational Learning in the Academic Literature – Systematic Literature Review 103
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain 101
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain 100
A Clustering Method for Information Summarization and Modelling a Subject Domain 99
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain 95
Public Key Generation Principles Impact Cybersecurity 93
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security 90
Towards Unified European Cyber Incident and Crisis Management Ontology 90
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence 88
A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT 84
Enhanced Collaboration for Cyber Security and Resilience 84
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector 82
Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine 82
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations 82
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application 82
Information Technology for Big Data Sensor Networks Stability Estimation 82
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me? 81
Integrated Security Management System for Enterprises in Industry 4.0 79
Terrorist ‘Use’ of the Internet and Fighting Back 78
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research 78
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base 78
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON 75