Skip to main content

Most read in past 36 months

Title Total views
A BTC-Based Watermarking Scheme for Digital Images 46
Managing Cybersecurity Resources: A Cost-Benefit Analysis 45
Cryptographic Key Generation by Genetic Algorithms 45
Leadership in Uncertainty 45
The Use of the Internet by Terrorist Organizations 45
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts 44
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries 43
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy 43
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies 43
Context Scenarios in Long-Term Defense Planning 43
Multinational Cooperation and Intervention: Small Steps to Better Results 42
Problems of Digitized Information Flow Analysis: Cognitive Aspects 42
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection 42
Transformation: Military and Science 41
IMoViS: A System for Mobile Visualization of Intrusion Detection Data 41
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry 41
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations 40
Quantum-Based Solutions for the Next-Generation Internet 40
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis 40
Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools 40
Cybersecurity in Ukraine: Problems and Perspectives 40
Implementation of the ECHO Cyber Skills Framework in the CyberSecPro Project: Enhancing Cybersecurity Capabilities 40
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned 39
An innovative Airport Physical-cyber Security System (APSS) 39
21st Century Cyber Warfare 38
A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations 37
Money Laundering Techniques with Electronic Payment Systems 37
Creating and Strengthening Cybersecurity in the Republic of Moldova 37
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance 37
ICT Governance, Human Factors and Cyber Situational Awareness 37
Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects 37
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution 37
Seabed Critical Infrastructures 37
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact 36
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments 36
Critical Information Infrastructure Protection (CIIP) 36
Stakeholder Engagement Framework 36
Foundations for a new theory of plausible and paradoxical reasoning 35
A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease 35
Prerequisites and Approaches to Force Modernization in a Transition Period 35
Institution Building for It Governance and Management 34
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions 34
Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems 34
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations 34
Tactical Approach to Cyber Defence in IoT Computer Networks 33
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis 33
Cyber Security and Resilience of Modern Societies: A Research Management Architecture 33
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria 33
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider 33
IT and Cyber Security Awareness – Raising Campaigns 32