Skip to main content

Most read in past 36 months

Title Total views
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving 344
Capabilities-based Planning for Security Sector Transformation 188
Information Assurance Benefits and Challenges: An Introduction 170
Analysis of Cybersecurity Issues in the Maritime Industry 148
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider? 146
Cognitive Attacks in Russian Hybrid Warfare 138
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive 103
How to Support Teams to be Remote and Productive: Group Decision-Making for Distance Collaboration Software Tools 97
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages 92
Credit Card Fraud Detection Using Self-Organizing Maps 91
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities 84
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel 81
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach 81
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes 77
A Logical Model for Multi-Sector Cyber Risk Management 75
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training 71
Cyber Threat Prediction with Machine Learning 71
A New Steganographic Algorithm for Hiding Messages in Music 68
A Clustering Method for Information Summarization and Modelling a Subject Domain 65
Enhanced Collaboration for Cyber Security and Resilience 65
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain 65
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security 64
Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief 63
Organizational Learning in the Academic Literature – Systematic Literature Review 63
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022 61
Challenges in E-Government and Security of Information 60
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain 59
OSINT on the Dark Web: Child Abuse Material Investigations 58
Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions 57
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain 54
Terrorist ‘Use’ of the Internet and Fighting Back 53
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES 53
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour 53
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative 53
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector 52
Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe 51
Public Key Generation Principles Impact Cybersecurity 51
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me? 50
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems 49
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence 49
A Model of ICT Competence Development for Digital Transformation 48
Societal Impact Assessment of a Cyber Security Network Project 48
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage 48
Enhancing the Organisational Culture related to Cyber Security during the University Digital Transformation 47
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application 47
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base 45
A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT 45
Supply Chain Cyber Security – Potential Threats 44
Optimization of the Chief Information Officer Function in Large Organizations 44
Towards Unified European Cyber Incident and Crisis Management Ontology 43