Skip to main content

Most read in past 36 months

Title Total views Sort ascending
Integration of Information Resources to Ensure Collaboration in Crisis Management 75
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON 75
A Model of ICT Competence Development for Digital Transformation 74
Societal Impact Assessment of a Cyber Security Network Project 74
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience 74
Model Fooling Attacks Against Medical Imaging: A Short Survey 73
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage 73
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices 72
MAIT: Malware Analysis and Intelligence Tool 71
A Cyber Range for Armed Forces Education 70
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience 70
Optimization of the Chief Information Officer Function in Large Organizations 70
Instrumental Equipment for Cyberattack Prevention 69
Planning and Implementing Change in Cyber Security Network Organisations 69
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems 69
Human Factor, Resilience, and Cyber/Hybrid Influence 69
Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief 69
Data Science as a Service: The Data Range 69
Cyber Hygiene Issues in the Naval Security Environment 68
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack 67
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems 66
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045 63
Governance Mesh Approach for Cybersecurity Ecosystem 63
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models 61
From Classroom to Online Teaching – A Case during COVID19 61
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification 60
Cyber Red Teaming: Overview of Sly, an Orchestration Tool 59
Preserving Privacy of Security Services in the SecaaS Model 59
A System-of-Systems Approach to Cyber Security and Resilience 58
Supply Chain Cyber Security – Potential Threats 58
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space 58
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones 58
The Hackathons as a First Step to Build Digital Competences 58
Concepts in Networks and Communication Security and Graph Theory 58
French Cyber Security and Defence: An Overview 57
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data 57
An Enhanced Solution for Automated Fire Control Systems 55
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative 55
Piloting the ECHO e-Skills and Training Toolkit 54
A Cost-Effective Approach to Securing Systems through Partial Decentralization 53
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 52
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies 51
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness 51
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers 50
Using Cyber Ranges in Cybersecurity Management Educational Programmes 50
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization 48
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies 47
Comparative Research of Cybersecurity Information Sharing Models 47
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information 47
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports 47