Skip to main content

Most read in past 36 months

Title Total views
Debates around Britain’s National Security Are Characterized by a Paucity of Effective Leadership and a Surfeit of Political Cowardice 24
A Brief on Embedded Societal Security 24
Structured Description of Naval Tasks 24
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment 23
How to Counter Hybrid Threats? 23
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation 23
Information Security and Multisensor Data Processing 23
Applying the System Approach to the Study of Critical Infrastructure 23
Fuzzy Controller for Antitank Wire Guided Missile Simulator with Direct X SDK 23
Hybrid Threats in Bulgarian Media 23
The Experience of Rakovski National Defense College in Organizing the Communication in the Educational Process During Covid-19 Pandemic 23
A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009 23
Information and Security at Dawn of the Twenty-First Century (in Bulgarian) 23
Research, Education, and Practice of StratCom in the Security Service of Ukraine in Interagency Settings 22
Development of the EU Policy of Police Cooperation with Third Countries: The Case of the Republic of North Macedonia 22
Integrated Framework and Methodology for Capability Priority Decisions 22
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age 22
Hypersonic Weapons in Achieving Maritime Superiority 22
Providing Physical Protection of the Vessel in the Event of an Attack at Sea and Ports 22
A Generic Reference Curriculum on Cybersecurity 22
Transparency in Defence Resource Management - Problems and Solutions 22
Turkish Security Discourses and Policies: The Kurdish Question 21
Operational Research Tools Supporting the Force Development Process for the Canadian Forces 21
Timothy Thomas on the Key Elements of the Russian Approach to IW 21
Robot Map Building From Sonar Sensors and DSmT 21
Development of Tools for Practical Research on Cybersecurity in Msc Theses 21
Lessons of Transition in Bulgarian Security and Defense 21
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’ 21
From Cryptology to Cyber Resilience – Bridging Theory and Practice 21
Information and Security at Dawn of the Twenty-First Century (in Bulgarian) 21
Radon Emanation as a Source of Radiation Hazard to the Environment: The Case of the Ukrainian Shield 20
Multi-stakeholder Approach to Cybersecurity and Resilience 20
Advancing Air and Air Defence Capabilities: What and How? 20
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector 20
Automating Footwear Impressions Retrieval through Texture 20
Earthquake Scenarios for the Cities of Sofia, Rousse and Vratsa 20
Cybersecurity as a Relative Concept 20
The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation 20
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks 20
Scenarios in a Rational Approach towards Planning under Uncertainty 20
Specific Features of IMM Tracking Filter Design 20
Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors 19
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia 19
Small Countries and Major Global Economic Players – the Nicaraguan Channel 19
Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare 19
Digital Transformation, Cyber Security and Resilience, Information & Security: An International Journal 19
Information Security: Management and Personnel Issues 19
Towards Creation of a Unified Information System of the Navies of the Black Sea Countries 19
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project 19
Implementation of Results-Oriented Defense Resource Management in the Bulgarian MoD – Problems and Way Ahead 19