Skip to main content

Most read in past 36 months

Title Total views
Information Support for Effective Resource Management 12
The Internet and the Changing Face of International Relations and Security 12
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images 12
Lessons from a Customer-Funding Regime in a Large IT Organization 12
CAX, Joint Training and Transformation Objectives 12
Some Problems in Modeling and Simulation Area in the Bulgarian Armed Forces 12
Information Technology Management for the Bulgarian Armed Forces XXI 12
Ukrainian Educational System in the Field of Cybersecurity 12
Security Risks Relating to the Migrant Crisis and Interagency Cooperation: The Case of Macedonia and Bulgaria 12
Referencing the Future: The EU’s Projected Security Roles and Their R&D Implications 12
Interactive Simulations in Support of Decision Making on Defence Resource Allocation 12
Applying Modeling and Simulation to Enhance National and Multi-National Cooperation 12
Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience” (DIGILIENCE 2020) 12
Distributed Training, CAX and Experimentation in support of Crisis Management 12
Developing Regional Air Defence Capabilities: Role of NC3A 12
A New Class of Fusion Rules Based on T-Conorm and T-Norm Fuzzy Operators 12
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues 12
Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants 12
An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues 12
NC3A Support to IED Fight: a Comprehensive Approach 12
National Military Command Center - From Idea to Implementation 12
Human Intuition and Decision-making Systems 12
Language Assistance to Multinational Partners in Coalition Operations 12
Challenge-Response Schemes Using Gap Diffie-Hellman Groups 12
The Urge for Comprehensive Cyber Security Strategies in the Western Balkan 12
Tiems Contribution to Emergency and Crisis Management 12
Analytical support to foresighting EU roles as a Global Security Actor 12
Intelligent Intrusion Detection Prevention Systems 12
Software for Computer Systems Trojans Detection as a Safety-Case Tool 11
Romanian Air Force Operational Capabilities Generation Process 11
Using Architectural Models to Identify Opportunities for Improvement of Acquisition Management 11
Naval Craft, Weapon and Sensor Systems 11
Should the Intelligence Agencies ‘Show More Leg’ or Have They Just Been Stripped Naked? 11
NATO System Analysis and Studies Panel 11
Operations Research Support to Force and Operations Planning in the New Security Environment 11
CROCADILE - An Open, Extensible Agent-Based Distillation Engine 11
Information Assurance in C4I Systems 11
Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management 11
Ruggedized Commercial IT Modules for Field C2 Posts in Coalition Operations and Emergencies 11
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers 11
Operational Analysis in Support of Armed Forces Transformation: The Role of Organizational Culture 11
Homeland Security: General Templates and Options for the Future 11
Learning Choices: Generating and Integrating Informal Knowledge 11
A License Plate Recognition System in e-Government 11
Building a Potential to Counteract Hybrid Threats through Cooperation and Regional Security 11
An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures 11
C4ISR Support to the Comprehensive Approach 11
Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects 11
EKS: Open-source Web-based Distributed Learning Tool 11
Networking South East Europe in Managing Non-traditional Challenges 11