Skip to main content

Most read in past 36 months

Title Total views
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence 115
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security 115
Challenges in E-Government and Security of Information 113
Applying a New Approach to Consider the Human Factor in the Design of Information Security Systems 112
Optimization of the Chief Information Officer Function in Large Organizations 111
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain 111
Planning and Implementing Change in Cyber Security Network Organisations 110
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices 109
Integrated Security Management System for Enterprises in Industry 4.0 108
Enhanced Collaboration for Cyber Security and Resilience 105
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base 104
Human Factor, Resilience, and Cyber/Hybrid Influence 101
A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT 101
Terrorist ‘Use’ of the Internet and Fighting Back 101
Signature-based Intrusion Detection Hardware-Software Complex 101
Information Technology for Big Data Sensor Networks Stability Estimation 100
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045 99
Human Factors Make or Break Cybersecurity! 98
Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation 97
Model Fooling Attacks Against Medical Imaging: A Short Survey 96
Cyber Red Teaming: Overview of Sly, an Orchestration Tool 96
MAIT: Malware Analysis and Intelligence Tool 95
Data Science as a Service: The Data Range 95
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research 95
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification 94
French Cyber Security and Defence: An Overview 94
A Cyber Range for Armed Forces Education 94
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON 93
A Model of ICT Competence Development for Digital Transformation 93
Insights on Human Factors Enhancing Cybersecurity 93
Governance Mesh Approach for Cybersecurity Ecosystem 89
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems 86
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage 85
Integration of Information Resources to Ensure Collaboration in Crisis Management 85
Cyber Hygiene Issues in the Naval Security Environment 84
Societal Impact Assessment of a Cyber Security Network Project 84
Instrumental Equipment for Cyberattack Prevention 83
RSA Weaknesses Caused by the Specifics of Random Number Generation 83
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness 83
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models 83
Supply Chain Cyber Security – Potential Threats 82
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack 82
EURMARS: Use of Satellite Imagery as an Asset for Maritime Environment Rapid Mapping and Object Detection in Large Areas 80
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems 79
Digital Stabilization of Thermal Videos for Border and Infrastructure Surveillance 78
Augmented Reality in an Enhanced Command and Control Application 78
Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges 77
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space 76
Model for Risk Management of Critical Infrastructures of the Republic of Bulgaria 76
The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations 76