Skip to main content

Most read in past 36 months

Title Total views
Diffusion of Information in an Online Social Network with Limited Attention 29
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19 28
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System 28
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination 27
Bulgaria and NATO: 7 Lost Years 27
Natural Disasters’ Management and Detection of Priority Problems for Future Research 27
Differences of Leadership Notions within NATO Member Countries: The Hungarian Experience 26
Simulation Modeling in Military Affairs: Status and Perspectives 26
The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations 26
Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation 26
Planning Measures and Capabilities for Protection of Critical Infrastructures 26
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence 25
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety 25
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan 25
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria 25
A Method for the Development of Cyber Security Strategies 25
Graphic Model of The Target Audience of Psychological Influence in Social Networks 25
Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects 25
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making 25
Network User Behaviour Analysis by Machine Learning Methods 25
Principles of Mitigating and Managing Human System Risks 25
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration 25
A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations 24
Civil Security: Architectural Approach in Emergency Management Transformation 24
Simulation of Critical Infrastructures 24
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks 24
A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease 24
Education in Geomatics for First Line Emergency Management in Ukraine 24
Building Societal Resilience against Hybrid Threats 24
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services 23
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy 23
Multiple Hypothesis Tracking Using Hough Transform Track Detector 23
Macedonian Path Towards Cybersecurity 23
Process-oriented Model of Information Warfare 23
Digital Stabilization of Thermal Videos for Border and Infrastructure Surveillance 23
Assessing Cyber Security 2015 23
Vulnerability Analysis for Urban Natural Gas Pipeline Network System 23
Information Security and Multisensor Data Processing 22
Towards a More Resilient Cyberspace: The Case of Albania 22
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation 22
Applying the System Approach to the Study of Critical Infrastructure 22
Command and Control: Operational Requirements and System Implementation 22
Structured Description of Naval Tasks 22
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War 22
Promoting Interagency and International Cooperation in Countering Hybrid Threats 22
Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools 22
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age 22
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters 22
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report 22
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’ 21