Top downloads
Title | Downloads |
---|---|
Modernizing the Bulgarian Military: Not Those Drones |
(191) |
Main Issues and Risks Related to the Provision of Resources for Bulgaria’s Defence Capabilities Development Programme 2032 |
(160) |
On Conflicts, Interests, Goals, Power, and Security |
(128) |
Evaluating the Utility of Distance Learning Forms during the Covid-19 Pandemic |
(292) |
How People’s Behaviour Was Motivated during the Covid-19 Emergency Situation |
(158) |
Cybersecurity Risks and Challenges in the Covid-19 Pandemic |
(518) |
Cyber threats modification during the COVID-19. Cyber pandemia |
(236) |
Cyber risks, threats & security measures associated with COVID-19 |
(256) |
Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives |
(226) |
DRIVER+ Taxonomy of Crisis Management Functions 2020 |
(185) |
Demography, Capabilies and Security |
(171) |
The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria |
(210) |
Research-focused Cyber Exercises: National State-of-the-Art Academic Experience and Perspectives |
(154) |
The Future of Command and Control Systems |
(119) |
Perspectives for Mobile Learning in Higher Education in Bulgaria |
(175) |
Research on the Overall Attitude Towards Mobile Learning in Social Media: Emotions Mining Approach |
(292) |
Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition |
(210) |
Putting AI into the EU Cyber Crisis Collaboration |
(191) |
Assistive AI Tools for Analysing False Content, Disinformation Flows, and Online Influence Campaigns |
(179) |
Cyber-Physical Systems Security: Research Challenges and Opportunities |
(180) |
Top 10 live threats to cyberspace in 2019 |
(204) |
Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment |
(164) |
Lessons from the Procedure of Acquiring a New Type of Combat Aircraft, 1999-2017 |
(89) |
Defence-Industrial Cooperation with Foreign Countries: Best Practices of Ethics |
(152) |
Military-Industrial Complex: How to profit from the National Security |
(103) |
On Bulgaria’s Defence Policy 2015-2020 |
(71) |
Future Threats and Challenges in Cyberspace |
(93) |
Facilitating Factors and Effects of Corruption Networks |
(187) |
A Two-Level Model for Describing the Risk Profile in Formulating Policy and Developing Security Capabilities |
(162) |
Bulgaria: Information on Capabilities, Organisations, Policies, and Legislation in Crisis Management and Disaster Response |
(93) |
Hungary: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(81) |
Lithuania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(118) |
Latvia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(91) |
Estonia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(79) |
Slovenia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(257) |
Montenegro: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(83) |
Romania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(246) |
Albania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(83) |
Poland: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response |
(82) |
Changes in the Security Environment and the Forms, Methods and Means of Conflict: Hybrid War |
(59) |
Scenario and ambitions for managing a trans-border political-military crisis: Implications for Bulgaria’s Defence Policy |
(90) |
Key Prerequisites for Integrity in Defence - Role of Parliament |
(231) |
Bulgaria’s 2014 Annual Defence Report: Plenty of Data, Low Political Impact |
(80) |
Levels of Cybersecurity Training and Education |
(179) |
Information technologies for good governance in defence, security, and the public sector: Experience and outlook |
(78) |
Policies for the Protection of Critical Infrastructure from Cyber Attacks |
(281) |
Cyber Threats Analysis In On-Line Social Networks With A Study On User Response |
(78) |
Applying Multimedia Technologies in The Information Systems of The Security and Defense Field |
(177) |
Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035 |
(158) |
Security of SSD Drives with Full Disk Encryption and Some Attacks (in Bulgarian) |
(234) |