Skip to main content

Most read in past 36 months

Title Total views
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations 46
K Band Radar Drone Signatures 46
Cyberwar in Russian and USA Military-Political Thought: A Comparative View 46
Augmented Reality in an Enhanced Command and Control Application 46
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy 45
The Bulgarian Armed Forces in the Information Society 45
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising 44
Labour Relations and the Information Security of the State during the Covid-19 Pandemics 44
Signature-based Intrusion Detection Hardware-Software Complex 43
Heuristic-based Intrusion Detection Functionality in a Snort Environment 43
RSA Weaknesses Caused by the Specifics of Random Number Generation 43
A Security Approach to a Military Autonomous Platform Path Planning 41
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings 41
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries 40
Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges 40
Context Scenarios in Long-Term Defense Planning 40
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot 39
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm 39
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities 38
3D Facial Reconstruction from 2D Portrait Imagery 38
Simulation-Based Training with Gamified Components for Augmented Border Protection 38
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations 38
Adopting Machine Learning for Images Transferred with LoRaWAN 38
The Role of Information Campaigns and Advertising in the Military Recruitment System 37
Transformation: Military and Science 37
Profiling Human Roles in Cybercrime 36
The Use of the Internet by Terrorist Organizations 36
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection 35
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine 35
Problems of Digitized Information Flow Analysis: Cognitive Aspects 35
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution 34
Ecosystem Platform for the Defence and Security Sector of Ukraine 34
A BTC-Based Watermarking Scheme for Digital Images 34
Multinational Cooperation and Intervention: Small Steps to Better Results 34
Leadership in Uncertainty 34
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact 34
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy 34
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis 34
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations 33
Organising National Cybersecurity Centres 32
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider 32
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry 32
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques 32
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks 31
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats 31
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor 31
Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience 31
Cyber Security Teaching and Learning Laboratories: A Survey 30
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance 30
Tactical Approach to Cyber Defence in IoT Computer Networks 29