Skip to main content

Most read in past 36 months

Title Total views
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry 39
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies 39
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques 38
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks 38
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations 38
Multinational Cooperation and Intervention: Small Steps to Better Results 38
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats 38
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina 37
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis 37
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts 37
An innovative Airport Physical-cyber Security System (APSS) 37
Total Information Awareness (DARPA’s Research Program) 37
Stakeholder Engagement Framework 36
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution 35
Managing Cybersecurity Resources: A Cost-Benefit Analysis 35
Foundations for a new theory of plausible and paradoxical reasoning 34
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions 34
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact 34
Quantum-Based Solutions for the Next-Generation Internet 34
Cybersecurity in Ukraine: Problems and Perspectives 33
21st Century Cyber Warfare 33
Money Laundering Techniques with Electronic Payment Systems 32
Institution Building for It Governance and Management 32
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance 32
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis 32
Critical Information Infrastructure Protection (CIIP) 32
Prerequisites and Approaches to Force Modernization in a Transition Period 32
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider 32
ICT Governance, Human Factors and Cyber Situational Awareness 31
Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems 31
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria 31
Navigating Uncharted Waters: Tackling Maritime Cybersecurity Challenges in the Black Sea Region 31
Human Factors Make or Break Cybersecurity! 31
IT and Cyber Security Awareness – Raising Campaigns 31
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War 31
Tactical Approach to Cyber Defence in IoT Computer Networks 31
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned 31
Creating and Strengthening Cybersecurity in the Republic of Moldova 30
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations 30
Cyber Security and Resilience of Modern Societies: A Research Management Architecture 30
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security 30
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures 30
A Proposal for a Cross-Layer, P+S Approach in Underwater Communication: The Underwater Data Exchange Protocol 30
Information Sharing for Cyber Threats 29
e-Platform Architecture for Organisational Collaboration and IT Education 29
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues 29
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments 29
Diffusion of Information in an Online Social Network with Limited Attention 29
National Security Strategy of the Netherlands: An Innovative Approach 29
Hybrid Warfare: Emerging Research Topics 29