Skip to main content

Most read in past 36 months

Title Total views
A Cost-Effective Approach to Securing Systems through Partial Decentralization 61
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies 61
Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges 59
Piloting the ECHO e-Skills and Training Toolkit 58
Model for Risk Management of Critical Infrastructures of the Republic of Bulgaria 58
Insights on Human Factors Enhancing Cybersecurity 56
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information 56
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot 55
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports 55
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities 55
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising 54
Heuristic-based Intrusion Detection Functionality in a Snort Environment 54
K Band Radar Drone Signatures 53
Cyberwar in Russian and USA Military-Political Thought: A Comparative View 53
Ecosystem Platform for the Defence and Security Sector of Ukraine 52
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations 51
Applying a New Approach to Consider the Human Factor in the Design of Information Security Systems 51
The Need for Emotional Cues Analysis in OSINT in Countering Reflexive Control Information Warfare Campaigns: A Critical Review and Reconceptualization 51
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy 50
Signature-based Intrusion Detection Hardware-Software Complex 50
A Security Approach to a Military Autonomous Platform Path Planning 50
Implementation of Cloud Technologies for Building Data Centers in Defence and Security 50
Profiling Human Roles in Cybercrime 49
The Importance of Open-Source Intelligence in Assessing Risks of Cyberattacks 49
Labour Relations and the Information Security of the State during the Covid-19 Pandemics 49
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings 48
3D Facial Reconstruction from 2D Portrait Imagery 47
Simulation-Based Training with Gamified Components for Augmented Border Protection 47
Data, Privacy and Human-Centered AI in Defense and Security Systems: Legal and Ethical Considerations 47
The Bulgarian Armed Forces in the Information Society 46
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor 46
Cyber Security Teaching and Learning Laboratories: A Survey 45
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine 45
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations 45
Adopting Machine Learning for Images Transferred with LoRaWAN 44
Organising National Cybersecurity Centres 43
A BTC-Based Watermarking Scheme for Digital Images 43
The Use of the Internet by Terrorist Organizations 43
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm 42
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries 42
The Role of Information Campaigns and Advertising in the Military Recruitment System 42
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy 42
Leadership in Uncertainty 42
Problems of Digitized Information Flow Analysis: Cognitive Aspects 41
Context Scenarios in Long-Term Defense Planning 41
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection 41
EURMARS: Use of Satellite Imagery as an Asset for Maritime Environment Rapid Mapping and Object Detection in Large Areas 41
Cryptographic Key Generation by Genetic Algorithms 41
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies 39
Transformation: Military and Science 39