Skip to main content

Most read in past 36 months

Title Total views
Integration of Information Resources to Ensure Collaboration in Crisis Management 74
A Model of ICT Competence Development for Digital Transformation 74
Model Fooling Attacks Against Medical Imaging: A Short Survey 73
Societal Impact Assessment of a Cyber Security Network Project 73
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage 72
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices 72
MAIT: Malware Analysis and Intelligence Tool 71
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience 71
A Cyber Range for Armed Forces Education 70
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON 70
Optimization of the Chief Information Officer Function in Large Organizations 70
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems 69
Human Factor, Resilience, and Cyber/Hybrid Influence 69
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience 69
Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief 68
Instrumental Equipment for Cyberattack Prevention 68
Planning and Implementing Change in Cyber Security Network Organisations 68
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack 66
Data Science as a Service: The Data Range 66
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems 65
Cyber Hygiene Issues in the Naval Security Environment 64
Governance Mesh Approach for Cybersecurity Ecosystem 63
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045 62
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification 60
From Classroom to Online Teaching – A Case during COVID19 59
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models 58
A System-of-Systems Approach to Cyber Security and Resilience 58
Supply Chain Cyber Security – Potential Threats 58
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space 58
The Hackathons as a First Step to Build Digital Competences 58
French Cyber Security and Defence: An Overview 57
Preserving Privacy of Security Services in the SecaaS Model 57
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data 57
Concepts in Networks and Communication Security and Graph Theory 57
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones 56
Cyber Red Teaming: Overview of Sly, an Orchestration Tool 56
An Enhanced Solution for Automated Fire Control Systems 55
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative 55
Piloting the ECHO e-Skills and Training Toolkit 53
A Cost-Effective Approach to Securing Systems through Partial Decentralization 53
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies 51
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 51
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness 50
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers 50
Using Cyber Ranges in Cybersecurity Management Educational Programmes 50
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization 48
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information 47
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports 47
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies 47
Augmented Reality in an Enhanced Command and Control Application 46