Skip to main content

Most read in past 36 months

Title Total views
Human Factor, Resilience, and Cyber/Hybrid Influence 93
Planning and Implementing Change in Cyber Security Network Organisations 93
Enhanced Collaboration for Cyber Security and Resilience 93
Terrorist ‘Use’ of the Internet and Fighting Back 92
Information Technology for Big Data Sensor Networks Stability Estimation 90
Challenges in E-Government and Security of Information 90
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience 89
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me? 88
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON 87
A Model of ICT Competence Development for Digital Transformation 87
MAIT: Malware Analysis and Intelligence Tool 86
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research 86
A Cyber Range for Armed Forces Education 86
Cyber Red Teaming: Overview of Sly, an Orchestration Tool 85
Model Fooling Attacks Against Medical Imaging: A Short Survey 84
Integration of Information Resources to Ensure Collaboration in Crisis Management 83
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045 81
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage 80
Data Science as a Service: The Data Range 80
Governance Mesh Approach for Cybersecurity Ecosystem 80
Cyber Hygiene Issues in the Naval Security Environment 79
Societal Impact Assessment of a Cyber Security Network Project 78
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack 77
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems 76
Instrumental Equipment for Cyberattack Prevention 76
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems 76
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification 74
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models 74
Comparative Research of Cybersecurity Information Sharing Models 73
Russian Reflexive Control Campaigns Targeting Political Realignment of Ukraine’s Democratic Allies: Critical Review and Conceptualization 72
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies 72
Supply Chain Cyber Security – Potential Threats 71
Synthetic Data Generation for Fraud Detection Using Diffusion Models 71
French Cyber Security and Defence: An Overview 71
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness 70
The Hackathons as a First Step to Build Digital Competences 69
From Classroom to Online Teaching – A Case during COVID19 69
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative 69
Augmented Reality in an Enhanced Command and Control Application 69
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data 67
Concepts in Networks and Communication Security and Graph Theory 64
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space 63
Using Cyber Ranges in Cybersecurity Management Educational Programmes 63
RSA Weaknesses Caused by the Specifics of Random Number Generation 63
Preserving Privacy of Security Services in the SecaaS Model 63
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones 62
An Enhanced Solution for Automated Fire Control Systems 62
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 61
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers 61
A Cost-Effective Approach to Securing Systems through Partial Decentralization 61