Skip to main content

Most read in past 36 months

Title Total views
Legal Considerations of Intelligence Operations in Countering Transnational Organised Crime 19
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project 19
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer 18
Mine Hunting with Drones 18
A Robust Remote User Authentication Scheme using Smart Card 18
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience 18
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective 18
Challenges of Multinational Acquisition of Capabilities in Black Sea Format 18
TAS: Trust Assessment System 18
A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms 18
Garbled Circuits: Optimizations and Implementations 18
Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria 17
C4ISR in Modernizing Security Sector in Bulgaria and South-Eastern Europe 17
Cyberwarriors: The Backbone of the Future Military or a Misnomer? 17
Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains 17
Assessing Comprehensive Security Approaches in Action: An Introduction 17
US Department of Defense Modeling and Simulation: New Approaches and Initiatives 17
MSA System Concept for Mediterranean Sea Surveillance 17
Fuzzy Control Based on Cluster Analysis and Dynamic Programming 17
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities 17
A Means of Comparing Military Budgeting Processes in South East Europe 17
Inductive Discovery of Criminal Group Structure Using Spectral Embedding 17
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures 17
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa 17
Intelligence Services of the Czech Republic: Current Legal Status and Its Development 16
Formal Verification of Nuclear Systems: Past, Present, and Future 16
Information Technologies in the Command and Control System of the Gendarmerie 16
Tracking Filters for Radar Systems with Correlated Measurement Noise 16
Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover 16
Towards Multi-National Capability Development in Cyber Defence 16
Human Expert Fusion for Image Classification 16
Comprehensive Security and Some Implemental Limits 16
Maritime Defence Investment Policy of the Republic of Bulgaria 16
Smart Grid Safety and Security: Educational and Research Activities 16
Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects 16
Risks for the Population along the Bulgarian Black Sea Coast from Flooding Caused by Extreme Rise of Sea Level 16
Introduction to the Fusion of Quantitative and Qualitative Beliefs 16
Information warfare principles and operations 16
Telemedical Services for Disaster Emergencies 16
Does NATO Have a Role in the Fight Against International Terrorism Analysis of NATO's Response to September 11 16
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking 15
The C4I System Concept and the Control of National Sea Spaces 15
Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide 15
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training 15
Terrorism on the Sea, Piracy, and Maritime Security 15
Acquisition in a Large IT Organization 15
Serbian Security Perceptions: Motivations to Serve 15
The Concepts and Design of ROC Defense Reorganization 15
Secure e-Mail Application Software for Government in Indonesia 15
A Framework Methodology to Support the Selection of a Multipurpose Fighter 15