Skip to main content

Most read in past 36 months

Title Total views
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking 15
The C4I System Concept and the Control of National Sea Spaces 15
Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide 15
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training 15
Terrorism on the Sea, Piracy, and Maritime Security 15
Acquisition in a Large IT Organization 15
Serbian Security Perceptions: Motivations to Serve 15
The Concepts and Design of ROC Defense Reorganization 15
Secure e-Mail Application Software for Government in Indonesia 15
A Framework Methodology to Support the Selection of a Multipurpose Fighter 15
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination 14
Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms 14
Good Practices and Challenges in Organizing for Cybersecurity 14
NATO-EU Cooperation on C4ISR Capabilities for Crisis Management 14
Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage 14
Controlling Computer Network Operations 14
The Obama Administration and Incident Response: A Report 14
Communication between the Defence Sector and the Civil Society of Bulgaria as a Way to Build Capacity for Countering Hybrid Threats 14
The Case for Advanced Distributed Learning 14
Privacy-Preserving Electronic Voting 14
Challenges and Advantages of Distance Learning Systems 14
Information Warfare and Security 14
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula 14
Research and Development of an Iris-based Recognition System for Identification and Secure Authentication 14
Good Governance of Intelligence from a Management Perspective 14
Using Strategic Planning in Support of Defense Acquisitions 13
The Human Factor in the Integrated Approach to Cyberdefence 13
Computer Assisted Exercises Management Environment for Civil Security 13
Formalizing the Optimization Problem in Long-Term Capability Planning 13
"Cuius Regio, Eius Religio, Omnium Spatium?” State Sovereignty in the Age of the Internet 13
DIGILIENCE 2020 Abstracts 13
Bulgaria’s Defence Policy and Force Size from a Comparative Macro Perspective 13
Supporting Transformation 13
On Simulation-based Wargaming: Comparison of Two Different Methodological Approaches 13
Information Security Architecture: An Integrated Approach to Security in the Organization 13
Synopsis of Operational Research in the UK Ministry of Defence 13
An Efficient and Practical Remote User Authentication Scheme 13
Multivariate Statistics of Security Perceptions in Europe 13
National Security Concepts and Information Warfare 13
A Generalization of the Classic Combination Rules to DSm Hyper-power Sets 13
Developing an Architecture for Naval Sovereignty Operations Center 13
Integrated Information Infrastructure of the State Agency for Civil Protection 13
E-Models and Methods for Project Management in the Public Area 13
Cognitive Biases in the Information Security Realm: Determinants, Examples and Mitigation 13
Supporting Transformation 13
IC3 - the Informativeness of the Conflict-Crisis-Catastrophe Triad 13
Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept 13
Scenario Space for Alternative Futures of Security Research 12
Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function 12
A Method of Evaluating Assurance Requirements 12