Skip to main content

Top downloads

Title Downloads

Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training

(420)

The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)

(348)

Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues

(418)

Implementation of Cloud Technologies for Building Data Centers in Defence and Security

(460)

Automating Footwear Impressions Retrieval through Texture

(335)

Quantum-Based Solutions for the Next-Generation Internet

(504)

Cryptographic Key Generation by Genetic Algorithms

(398)

Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation

(243)

Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations

(328)

Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities

(626)

What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security

(516)

DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience

(700)

Amelioration of ElGamal Digital Signature Schemes

(369)

Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration

(403)

The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination

(378)

Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions

(349)

Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence

(473)

Strategy Development and Implementation in a Complex Multi-National IT Organisation

(281)

Graphic Model of The Target Audience of Psychological Influence in Social Networks

(381)

Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War

(195)

Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War

(332)

Cognitive Attacks in Russian Hybrid Warfare

(848)

Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings

(396)

Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine

(411)

Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters

(325)

Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan

(319)

Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief

(370)

Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief

(370)

Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures

(250)

Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience

(405)

Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges

(298)

Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management

(295)

Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe

(485)

Radon Emanation as a Source of Radiation Hazard to the Environment: The Case of the Ukrainian Shield

(376)

Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry

(303)

Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover

(234)

Vulnerability Analysis for Urban Natural Gas Pipeline Network System

(180)

Hybrid Warfare: Emerging Research Topics

(429)

How to Counter Hybrid Threats?

(212)

Building Societal Resilience against Hybrid Threats

(257)

Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare

(394)

Hybrid Warfare and Societal Resilience: Implications for Democratic Governance

(307)

Communication between the Defence Sector and the Civil Society of Bulgaria as a Way to Build Capacity for Countering Hybrid Threats

(286)

Information Sharing for Cyber Threats

(674)

Security Risks Relating to the Migrant Crisis and Interagency Cooperation: The Case of Macedonia and Bulgaria

(230)

Building a Potential to Counteract Hybrid Threats through Cooperation and Regional Security

(311)

Promoting Interagency and International Cooperation in Countering Hybrid Threats

(315)

The Persistent Need to Reform Cyber Security Services: A Case Study on France

(520)

Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage

(244)

Guidelines on a Mobile Security Lab Course

(280)