Skip to main content

Most read in past 36 months

Title Total views
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space 77
Model for Risk Management of Critical Infrastructures of the Republic of Bulgaria 77
From Classroom to Online Teaching – A Case during COVID19 76
Comparative Research of Cybersecurity Information Sharing Models 75
Heuristic-based Intrusion Detection Functionality in a Snort Environment 74
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies 73
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data 73
The Hackathons as a First Step to Build Digital Competences 73
Concepts in Networks and Communication Security and Graph Theory 73
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative 73
Adopting Machine Learning for Images Transferred with LoRaWAN 70
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones 69
Using Cyber Ranges in Cybersecurity Management Educational Programmes 69
An Enhanced Solution for Automated Fire Control Systems 69
A Cost-Effective Approach to Securing Systems through Partial Decentralization 68
Preserving Privacy of Security Services in the SecaaS Model 68
Cyberwar in Russian and USA Military-Political Thought: A Comparative View 67
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 67
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers 67
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot 66
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising 66
Profiling Human Roles in Cybercrime 64
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports 64
K Band Radar Drone Signatures 64
Organising National Cybersecurity Centres 63
Navigating Uncharted Waters: Tackling Maritime Cybersecurity Challenges in the Black Sea Region 62
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information 62
Piloting the ECHO e-Skills and Training Toolkit 61
Implementation of Cloud Technologies for Building Data Centers in Defence and Security 60
Ecosystem Platform for the Defence and Security Sector of Ukraine 60
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities 60
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings 58
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations 58
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine 58
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina 56
3D Facial Reconstruction from 2D Portrait Imagery 56
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats 55
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor 55
A Security Approach to a Military Autonomous Platform Path Planning 55
Implementation of the ECHO Cyber Skills Framework in the CyberSecPro Project: Enhancing Cybersecurity Capabilities 54
Cyber Security Teaching and Learning Laboratories: A Survey 54
The Role of Information Campaigns and Advertising in the Military Recruitment System 54
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy 53
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks 52
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned 52
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm 52
Managing Cybersecurity Resources: A Cost-Benefit Analysis 52
Labour Relations and the Information Security of the State during the Covid-19 Pandemics 52
Simulation-Based Training with Gamified Components for Augmented Border Protection 52
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies 51