Most cited

Article Authors Citations
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries M.E. Bonfanti; F. Capone (89)
Supply Chain Cyber Security – Potential Threats L. Urciuoli; T. Männistö; J. Hintsa; T. Khan (98)
Ecosystem Platform for the Defence and Security Sector of Ukraine O. Polischuk (66)
Integration of Information Resources to Ensure Collaboration in Crisis Management K. Ignatova; D. Tsonev (61)
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON G. Penchev; A. Shalamanova (61)
Information Security Architecture: An Integrated Approach to Security in the Organization I.S.I.J. Monitor (88)
How to Support Teams to be Remote and Productive: Group Decision-Making for Distance Collaboration Software Tools D. Borissova; Z. Dimitrova; V. Dimitrov (69)
Institution Building for It Governance and Management V. Shalamanov (117)
Capabilities-based Planning for Security Sector Transformation T. Tagarev (76)
Optimization of the Chief Information Officer Function in Large Organizations V. Shalamanov; V. Sabinski; T. Georgiev (38)
National Security Strategy of the Netherlands: An Innovative Approach M. Rademaker (57)
Principles of Mitigating and Managing Human System Risks D. Procházková (34)
Credit Card Fraud Detection Using Self-Organizing Maps V. Zaslavsky; A. Strizhak (33)
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings N. Nikolic (35)
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions V. Shalamanov (44)
Cybersecurity as a Relative Concept X. Li (27)
A Brief on Embedded Societal Security B. Sundelius (40)
Analytical support to foresighting EU roles as a Global Security Actor T. Tagarev; P. Ivanova (40)
Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief V. Ratchev; T. Tagarev (42)
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution T. Semerdjiev (26)
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations B. Bozveliev; S. Sotirov; T. Videv (24)
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot V. Bontchev; V. Yosifova (32)
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information N. Stoianov; M. Bozhilova (21)
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers F. Vietti; R.Franzini Tibaldeo (20)
Multivariate Statistics of Security Perceptions in Europe D. Lieberz (20)