Skip to main content

Most read in past 36 months

Title Total views
The Design And Evaluation of Situation Assessment Strategies 9
Library Update 9
On Integrity of Intelligence in Countries of Eastern Europe 9
On the Necessity to Create a National Processing Centre 9
Needs and Opportunities for Enhancing the Emergency Management System 9
Plagiarism, Cheating and Academic Dishonesty – Have You Been There? 9
Defence Budget Transparency on the Internet 9
Intelligence for a safe city model 9
Reforming Intelligence Services In Mexico 9
Risk as a Factor in Decision-Making 9
New Financial Transaction Security Concerns in Mobile Commerce 9
Security Aspects of the Cellular Communications 9
Ubiquitous Insecurity? How to “Hack” IT Systems 9
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service 9
Identifying the Reasons for Failures in Large-Scale Systems 9
PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure 9
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES 9
An Improved Version of a Multiple Target Tracking Algorithm 9
Kaleidoscopic Approach to Security Shadows in the Age of Information 9
Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems 9
The Ministry of Defense Armed Forces Transformation Management Policy 9
The Growing Threat: Homeland Security Issues of Bulgaria 9
Advanced Distributed Learning and Community 9
A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment 9
On the Generalized Input Estimation 9
Information Assurance Challenges 9
Modeling Support to Battlespace Awareness 9
Securing Cyberspace 9
Improved Anonymous Secure e-Voting over a Network 9
Strategic and Technology Policy Implications for E-Government 9
Network Intrusion Detection: An Analyst’s Handbook 9
Governance on Intelligence: Issues that Play a Role 9
New Challenges to Information Security Caused by the Introduction of Wi-Fi Technologies 9
Advanced NATO-compatible Solutions for Surface Vessels 9
Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle 9
NATO and Sweden Joint Live Experiment on NEC 9
Bulgaria in NATO:New Roles and Capabilities of the Navy 9
Design of a Secure Fine-Grained Official Document Exchange Model for E-Government 9
E-Comerce Laboratory, Plovdiv University, Bulgaria 9
The Internet in China: Civilian and Military Uses 9
Contemporary Trends in the Development of Information Security and Computer Virology 9
The Information Revolution and Post-Modern Warfare 9
Establishing an Air Pollution Monitoring Network for Industrial Regions: A Probabilistic Approach 8
Game Theoretical Modeling for Planning and Decision-Making 8
Modeling in Shaped Charge Design 8
Computer-aided exercises in training commanders and HQ staff: Note on Bulgarian Experience 8
Challenges for the Bulgarian Air Force - A Royal Air Force Perspective 8
E-Government and Security of Information 8
Transparency Matters 8
Information Support for Decision-Making during the Kosovo Crisis 8