Skip to main content

Top downloads

Title Downloads

Smart Solutions for Sustainable Emergency and Crisis Management

(393)

A Critical Analysis of the U.S. “Pivot” toward the Asia-Pacific: How Realistic is Neo-realism?

(167)

Multi-Fragmental Availability Models of Critical Infrastructures with Variable Parameters of System Dependability

(300)

Agent-Based Intelligent Support to Coalition Operations

(293)

Natural Disasters’ Management and Detection of Priority Problems for Future Research

(263)

The C-factor in the Cybersecurity Equation: The Importance of Student Cybersecurity Competitions

(289)

The Importance of Open-Source Intelligence in Assessing Risks of Cyberattacks

(382)

A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations

(116)

Model for Risk Management of Critical Infrastructures of the Republic of Bulgaria

(127)

Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects

(102)

The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations

(194)

Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools

(137)

Seabed Critical Infrastructures

(192)

(64)

Navigating Uncharted Waters: Tackling Maritime Cybersecurity Challenges in the Black Sea Region

(168)

A Proposal for a Cross-Layer, P+S Approach in Underwater Communication: The Underwater Data Exchange Protocol

(108)

Synthetic Data Generation for Fraud Detection Using Diffusion Models

(291)

(19)

Data, Privacy and Human-Centered AI in Defense and Security Systems: Legal and Ethical Considerations

(368)

(7)

Implementation of the ECHO Cyber Skills Framework in the CyberSecPro Project: Enhancing Cybersecurity Capabilities

(132)

Human Factors Make or Break Cybersecurity!

(214)

Applying a New Approach to Consider the Human Factor in the Design of Information Security Systems

(143)

The Need for Emotional Cues Analysis in OSINT in Countering Reflexive Control Information Warfare Campaigns: A Critical Review and Reconceptualization

(193)

Russian Reflexive Control Campaigns Targeting Political Realignment of Ukraine’s Democratic Allies: Critical Review and Conceptualization

(470)

Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation

(191)

A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease

(100)

(82)

Insights on Human Factors Enhancing Cybersecurity

(100)

EURMARS: Use of Satellite Imagery as an Asset for Maritime Environment Rapid Mapping and Object Detection in Large Areas

(110)

Digital Stabilization of Thermal Videos for Border and Infrastructure Surveillance

(21)