Skip to main content

Most read in past 36 months

Title Total views
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making 26
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters 26
Promoting Interagency and International Cooperation in Countering Hybrid Threats 26
Hypersonic Weapons in Achieving Maritime Superiority 25
Towards a More Resilient Cyberspace: The Case of Albania 25
Fuzzy Controller for Antitank Wire Guided Missile Simulator with Direct X SDK 25
Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management 25
Transparency in Defence Resource Management - Problems and Solutions 25
Process-oriented Model of Information Warfare 25
Critical Information Infrastructure Protection 25
Assessing Cyber Security 2015 25
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age 25
Automating Footwear Impressions Retrieval through Texture 24
Simulation of Critical Infrastructures 24
Research, Education, and Practice of StratCom in the Security Service of Ukraine in Interagency Settings 24
How to Counter Hybrid Threats? 23
Applying the System Approach to the Study of Critical Infrastructure 23
Information Security and Multisensor Data Processing 23
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’ 23
A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009 23
Information and Security at Dawn of the Twenty-First Century (in Bulgarian) 23
From Cryptology to Cyber Resilience – Bridging Theory and Practice 23
Garbled Circuits: Optimizations and Implementations 23
Integrated Framework and Methodology for Capability Priority Decisions 23
Robot Map Building From Sonar Sensors and DSmT 23
Earthquake Scenarios for the Cities of Sofia, Rousse and Vratsa 22
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks 22
Digital Transformation, Cyber Security and Resilience, Information & Security: An International Journal 22
A Generic Reference Curriculum on Cybersecurity 22
Specific Features of IMM Tracking Filter Design 22
Operational Research Tools Supporting the Force Development Process for the Canadian Forces 22
Turkish Security Discourses and Policies: The Kurdish Question 22
Timothy Thomas on the Key Elements of the Russian Approach to IW 22
Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare 22
Cybersecurity as a Relative Concept 21
Development of Tools for Practical Research on Cybersecurity in Msc Theses 21
Lessons of Transition in Bulgarian Security and Defense 21
Advancing Air and Air Defence Capabilities: What and How? 21
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector 20
The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation 20
Scenarios in a Rational Approach towards Planning under Uncertainty 20
Information Security of Distance Learning 20
Radon Emanation as a Source of Radiation Hazard to the Environment: The Case of the Ukrainian Shield 20
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project 20
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa 20
Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria 20
Multi-stakeholder Approach to Cybersecurity and Resilience 20
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities 19
Information Security: Management and Personnel Issues 19
TAS: Trust Assessment System 19