Skip to main content

Most read in past 36 months

Title Total views
Network User Behaviour Analysis by Machine Learning Methods 32
Building Societal Resilience against Hybrid Threats 32
IT and Cyber Security Awareness – Raising Campaigns 32
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War 32
e-Platform Architecture for Organisational Collaboration and IT Education 32
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues 32
Diffusion of Information in an Online Social Network with Limited Attention 31
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security 31
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures 31
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan 31
Amelioration of ElGamal Digital Signature Schemes 31
Graphic Model of The Target Audience of Psychological Influence in Social Networks 31
Information Sharing for Cyber Threats 31
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19 30
Planning Measures and Capabilities for Protection of Critical Infrastructures 30
Natural Disasters’ Management and Detection of Priority Problems for Future Research 30
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy 30
National Security Strategy of the Netherlands: An Innovative Approach 30
Hybrid Warfare: Emerging Research Topics 30
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks 30
Bulgaria and NATO: 7 Lost Years 29
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System 29
Simulation Modeling in Military Affairs: Status and Perspectives 28
Vulnerability Analysis for Urban Natural Gas Pipeline Network System 27
A Method for the Development of Cyber Security Strategies 27
Differences of Leadership Notions within NATO Member Countries: The Hungarian Experience 27
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria 27
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making 26
Promoting Interagency and International Cooperation in Countering Hybrid Threats 26
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report 26
Strategy Development and Implementation in a Complex Multi-National IT Organisation 26
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration 26
Principles of Mitigating and Managing Human System Risks 26
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence 26
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety 26
Macedonian Path Towards Cybersecurity 26
Command and Control: Operational Requirements and System Implementation 26
Education in Geomatics for First Line Emergency Management in Ukraine 25
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services 25
Multiple Hypothesis Tracking Using Hough Transform Track Detector 25
Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management 25
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War 25
Civil Security: Architectural Approach in Emergency Management Transformation 25
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters 24
Hybrid Warfare Challenges and Responses: Lessons from Ukraine 24
Assessing Cyber Security 2015 24
Towards a More Resilient Cyberspace: The Case of Albania 24
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS) 24
Debates around Britain’s National Security Are Characterized by a Paucity of Effective Leadership and a Surfeit of Political Cowardice 24
A Brief on Embedded Societal Security 24