Most cited

Article Authors Citations
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages P. Poptchev (5)
Using Architectural Models to Identify Opportunities for Improvement of Acquisition Management A. Dimov; G. Stankov; T. Tagarev (5)
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection R. Bendrath (4)
Critical Information Infrastructure Protection (CIIP) P. Westrin (4)
Cognitive Attacks in Russian Hybrid Warfare G. Pocheptsov (4)
Information Technology Management for the Bulgarian Armed Forces XXI V. Dankov (4)
Controlling Computer Network Operations A. Rathmell (4)
Bulgaria’s Defence Policy and Force Size from a Comparative Macro Perspective T. Tagarev; L. Velkova (4)
Obstacles in Inter-Organizational Cooperation and Hybrid Threats N. Nikolic (3)
C4I System Reengineering: Essential Component of Bulgarian Armed Forces S. Balabanov; K. Alexandrova (3)
Transparency in Force Modernization Decisions R.K. Murphy; R. Cathers (3)
Human Intuition and Decision-making Systems A. Borden (3)
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience T. Tagarev (3)
Challenges of Multinational Acquisition of Capabilities in Black Sea Format T. Tagarev; V. Georgiev (3)
Using Strategic Planning in Support of Defense Acquisitions R.K. Murphy; S.D. Beach (3)
Bulgaria and NATO: 7 Lost Years J. Simon (3)
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience V. Shalamanov (3)
Ruggedized Commercial IT Modules for Field C2 Posts in Coalition Operations and Emergencies V. Shalamanov; S. Avramov (3)
The Cyberspace Dimension in Armed Conflict: Approaching a Complex Issue with Assistance of the Morphological Method M. Dunn (3)
The Internet in China: Civilian and Military Uses T. Thomas (3)
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats A. Okuku; K. Renaud; B. Valeriano (2)
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes T. Tagarev; N. Stoianov; G. Sharkov; Y. Yanakiev (2)
Experimental Validation Of Metamodels For Intelligent Agents In Conflict J. Moffat; S. Witty (2)
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045 S. Dotsenko; O. Illiashenko; S. Kamenskyi; V. Kharchenko (2)
French Cyber Security and Defence: An Overview P. Vitel; H. Bilddal (2)