What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security Author(s): Sean Costigan, Greg Gleason10 Sep 2019
Integrated Security Management System for Enterprises in Industry 4.0 Author(s): Sergiy Dotsenko, Oleg Illiashenko, Sergii Kamenskyi, Vyacheslav Kharchenko10 Sep 2019
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain Author(s): Jyri Rajamäki, Ilkka Tikanmäki, Jari Räsänen10 Sep 2019
Quantum-Based Solutions for the Next-Generation Internet Author(s): Marcin Niemiec, Andrzej Dziech, Miłosz Stypiński, Jan Derkacz10 Sep 2019
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience Author(s): Todor Tagarev10 Sep 2019
Problems of Digitized Information Flow Analysis: Cognitive Aspects Author(s): Valeriy Mygal, Galyna Mygal10 Sep 2019
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues Author(s): Nikola Saranov10 Sep 2019
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS) Author(s): Toddor Velev, Nina Dobrinkova10 Sep 2019
Implementation of Cloud Technologies for Building Data Centers in Defence and Security Author(s): Rosen Iliev, Kristina Ignatova10 Sep 2019
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training Author(s): Kirsi Aaltola, Petteri Taitto10 Sep 2019
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks Author(s): Maksym Shchoholiev, Violeta Tretynyk10 Sep 2019
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities Author(s): Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris10 Sep 2019
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation Author(s): Tihomir Videv, Boris Bozveliev, Sotir Sotirov10 Sep 2019
Diffusion of Information in an Online Social Network with Limited Attention Author(s): Diego Oliveira, Kevin Chan10 Sep 2019
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations Author(s): Boris Bozveliev, Sotir Sotirov, Tihomir Videv10 Sep 2019
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security Author(s): Ivelina Vardeva10 Sep 2019
e-Platform Architecture for Organisational Collaboration and IT Education Author(s): Silvia Matern10 Sep 2019
Automating Footwear Impressions Retrieval through Texture Author(s): Neil Farrugia, Joseph Vella10 Sep 2019
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration Author(s): Ventzislav Atanassov10 Feb 2019
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination Author(s): Valeri Kopchev09 Feb 2019