Top downloads
Title | Downloads |
---|---|
Modernizing the Bulgarian Military: Not Those Drones |
(182) |
Main Issues and Risks Related to the Provision of Resources for Bulgaria’s Defence Capabilities Development Programme 2032 |
(154) |
On Conflicts, Interests, Goals, Power, and Security |
(121) |
Evaluating the Utility of Distance Learning Forms during the Covid-19 Pandemic |
(270) |
How People’s Behaviour Was Motivated during the Covid-19 Emergency Situation |
(152) |
Cybersecurity Risks and Challenges in the Covid-19 Pandemic |
(476) |
Cyber threats modification during the COVID-19. Cyber pandemia |
(222) |
Cyber risks, threats & security measures associated with COVID-19 |
(243) |
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives |
(206) |
DRIVER+ Taxonomy of Crisis Management Functions 2020 |
(169) |
Demography, Capabilies and Security |
(158) |
The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria |
(197) |
Research-focused Cyber Exercises: National State-of-the-Art Academic Experience and Perspectives |
(134) |
The Future of Command and Control Systems |
(116) |
Perspectives for Mobile Learning in Higher Education in Bulgaria |
(164) |
Research on the Overall Attitude Towards Mobile Learning in Social Media: Emotions Mining Approach |
(270) |
Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition |
(196) |
Putting AI into the EU Cyber Crisis Collaboration |
(178) |
Assistive AI Tools for Analysing False Content, Disinformation Flows, and Online Influence Campaigns |
(164) |
Cyber-Physical Systems Security: Research Challenges and Opportunities |
(165) |
Top 10 live threats to cyberspace in 2019 |
(191) |
Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment |
(152) |
Lessons from the Procedure of Acquiring a New Type of Combat Aircraft, 1999-2017 |
(84) |
Defence-Industrial Cooperation with Foreign Countries: Best Practices of Ethics |
(142) |
Military-Industrial Complex: How to profit from the National Security |
(98) |
On Bulgaria’s Defence Policy 2015-2020 |
(65) |
Future Threats and Challenges in Cyberspace |
(91) |
Facilitating Factors and Effects of Corruption Networks |
(172) |
A Two-Level Model for Describing the Risk Profile in Formulating Policy and Developing Security Capabilities |
(148) |
Bulgaria: Information on Capabilities, Organisations, Policies, and Legislation in Crisis Management and Disaster Response |
(87) |
Hungary: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(77) |
Lithuania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(106) |
Latvia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(75) |
Estonia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(70) |
Slovenia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(240) |
Montenegro: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(78) |
Romania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(229) |
Albania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(79) |
Poland: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(76) |
Changes in the Security Environment and the Forms, Methods and Means of Conflict: Hybrid War |
(56) |
Scenario and ambitions for managing a trans-border political-military crisis: Implications for Bulgaria’s Defence Policy |
(85) |
Key Prerequisites for Integrity in Defence - Role of Parliament |
(220) |
Bulgaria’s 2014 Annual Defence Report: Plenty of Data, Low Political Impact |
(74) |
Levels of Cybersecurity Training and Education |
(165) |
Information technologies for good governance in defence, security, and the public sector: Experience and outlook |
(75) |
Policies for the Protection of Critical Infrastructure from Cyber Attacks |
(268) |
Cyber Threats Analysis In On-Line Social Networks With A Study On User Response |
(74) |
Applying Multimedia Technologies in The Information Systems of The Security and Defense Field |
(162) |
Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035 |
(146) |
Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian) |
(207) |