Skip to main content

Most read in past 36 months

Title Total views
Strategic and Technology Policy Implications for E-Government 9
Network Intrusion Detection: An Analyst’s Handbook 9
The Information Society Should Serve the People 9
Governance on Intelligence: Issues that Play a Role 9
New Challenges to Information Security Caused by the Introduction of Wi-Fi Technologies 9
Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle 9
NATO and Sweden Joint Live Experiment on NEC 9
Bulgaria in NATO:New Roles and Capabilities of the Navy 9
Design of a Secure Fine-Grained Official Document Exchange Model for E-Government 9
E-Comerce Laboratory, Plovdiv University, Bulgaria 9
The Internet in China: Civilian and Military Uses 9
Contemporary Trends in the Development of Information Security and Computer Virology 9
The Information Revolution and Post-Modern Warfare 9
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers 9
Advanced NATO-compatible Solutions for Surface Vessels 9
Developing and Employing Expeditionary Capabilities: Key to Transforming Air Forces of Small NATO Nations 9
An Efficient and Secure Remote Authentication Scheme Using Smart Cards 9
Two Secure Transportation Schemes for Mobile Agents 9
A Terrain Reasoning Algorithm for Defending a Fire Zone 9
Library Update 9
On Integrity of Intelligence in Countries of Eastern Europe 9
Combat & Security Related Modeling and Simulation in Croatia 9
On the Necessity to Create a National Processing Centre 9
Plagiarism, Cheating and Academic Dishonesty – Have You Been There? 9
Defence Budget Transparency on the Internet 9
The Genetic Program - A Technocratic Hypothesis 9
Intelligence for a safe city model 9
Reforming Intelligence Services In Mexico 9
Risk as a Factor in Decision-Making 9
New Financial Transaction Security Concerns in Mobile Commerce 9
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service 9
Identifying the Reasons for Failures in Large-Scale Systems 9
PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure 9
English Skills for Staff Officers: Collaborative Development of the Distance Course 9
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES 9
An Improved Version of a Multiple Target Tracking Algorithm 9
Kaleidoscopic Approach to Security Shadows in the Age of Information 9
Ubiquitous Insecurity? How to “Hack” IT Systems 9
Architectures in the Analysis of Requirements and Design of Simulation Systems 8
Is Neutrality an Appropriate Instrument for Domestic Security? 8
The Coalition Information Systems and Operations Learning Network: An Emerging Concept for Multinational C4 Interoperability 8
Multinational Collaboration in Advanced Distributed Learning 8
Modeling and Simulation Internet Sources 8
Engagement of the Ministry of Defense and Bulgarian Armed Forces in Establishing Information Society 8
Dialectics of Information Security 8
Secure User-Friendly Remote Authentication Schemes 8
Government PKI Deployment and Usage in Taiwan 8
A South-East European Defence Transparency Audit 8
Phase changes in Meta-modelling using the Fractal Dimension 8
Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform 8