Skip to main content

Most read in past 36 months

Title Total views
Heuristic-based Intrusion Detection Functionality in a Snort Environment 70
Concepts in Networks and Communication Security and Graph Theory 69
Model for Risk Management of Critical Infrastructures of the Republic of Bulgaria 69
Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges 69
Digital Stabilization of Thermal Videos for Border and Infrastructure Surveillance 69
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data 68
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization 68
An Enhanced Solution for Automated Fire Control Systems 67
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones 67
Using Cyber Ranges in Cybersecurity Management Educational Programmes 67
A Cost-Effective Approach to Securing Systems through Partial Decentralization 66
Preserving Privacy of Security Services in the SecaaS Model 65
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems 65
Human Factors Make or Break Cybersecurity! 65
Cyberwar in Russian and USA Military-Political Thought: A Comparative View 63
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers 63
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports 62
The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations 62
Piloting the ECHO e-Skills and Training Toolkit 61
Profiling Human Roles in Cybercrime 60
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising 60
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information 59
K Band Radar Drone Signatures 58
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities 58
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot 58
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations 57
Total Information Awareness (DARPA’s Research Program) 57
Ecosystem Platform for the Defence and Security Sector of Ukraine 57
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings 55
Organising National Cybersecurity Centres 54
A Security Approach to a Military Autonomous Platform Path Planning 53
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy 53
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm 52
3D Facial Reconstruction from 2D Portrait Imagery 52
Adopting Machine Learning for Images Transferred with LoRaWAN 52
Implementation of Cloud Technologies for Building Data Centers in Defence and Security 52
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks 51
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine 51
Labour Relations and the Information Security of the State during the Covid-19 Pandemics 51
Cyber Security Teaching and Learning Laboratories: A Survey 51
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor 49
Simulation-Based Training with Gamified Components for Augmented Border Protection 49
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina 49
Navigating Uncharted Waters: Tackling Maritime Cybersecurity Challenges in the Black Sea Region 49
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats 48
A Proposal for a Cross-Layer, P+S Approach in Underwater Communication: The Underwater Data Exchange Protocol 47
The Bulgarian Armed Forces in the Information Society 47
The Role of Information Campaigns and Advertising in the Military Recruitment System 47
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations 47
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques 47