Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative Author(s): Mohamad Zreik27 Mar 2023
Differences of Leadership Notions within NATO Member Countries: The Hungarian Experience Author(s): Jozsef Boda27 Mar 2023
Debates around Britain’s National Security Are Characterized by a Paucity of Effective Leadership and a Surfeit of Political Cowardice Author(s): Timothy Parsons27 Mar 2023
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving Author(s): George Sharkov, Christina Todorova07 Dec 2022
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques Author(s): George Sharkov05 Dec 2022
The Hackathons as a First Step to Build Digital Competences Author(s): Ventsislav Polimenov, Katya Dimitrova, Irena Mladenova, Kamen Iliev23 Sep 2022
An Enhanced Solution for Automated Fire Control Systems Author(s): Dilyan Markov, Alexander Kolev, Vania Ivanova23 Sep 2022
Cyber Hygiene Issues in the Naval Security Environment Author(s): Boyan Mednikarov, Yuliyan Tsonev, Borislav Nikolov, Andon Lazarov23 Sep 2022
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor Author(s): Valeriy Mygal, Galyna Mygal, Stanislav Mygal23 Sep 2022
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain Author(s): Irena Mladenova, Velizar Shalamanov, Antoniya Shalamanova-Filipova23 Sep 2022
Simulation-Based Training with Gamified Components for Augmented Border Protection Author(s): Alberto Tremori, Sasha Godfrey, Luca Berretta, Arnau Viñas, Pavlina Nikolova, Iliyan Hutov23 Sep 2022
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain Author(s): Georgi Penchev, Velizar Shalamanov23 Sep 2022
Cyber Red Teaming: Overview of Sly, an Orchestration Tool Author(s): Paloma de la Vallée, Georgios Iosifidis, Wim Mees23 Sep 2022
Piloting the ECHO e-Skills and Training Toolkit Author(s): Ilona Frisk, Ilkka Tikanmäki, Harri Ruoslahti23 Sep 2022
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience Author(s): George Sharkov, Christina Todorova, Georgi Koykov, Ivan Nikolov23 Sep 2022
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach Author(s): Pavel Varbanov23 Sep 2022
Preserving Privacy of Security Services in the SecaaS Model Author(s): Piotr Jurgała, Tytus Kurek, Marcin Niemiec21 Sep 2022
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models Author(s): Ivan Gaidarski, Pavlin Kutinchev21 Sep 2022
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage Author(s): Iliyan Iliev, Ivan Blagoev21 Sep 2022
OSINT on the Dark Web: Child Abuse Material Investigations Author(s): Jyri Rajamäki, Iiro Lahti, Johanna Parviainen20 Sep 2022