A Clustering Method for Information Summarization and Modelling a Subject Domain |
3,874 |
A Security Approach to a Military Autonomous Platform Path Planning |
1,596 |
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising |
2,913 |
A System-of-Systems Approach to Cyber Security and Resilience |
1,603 |
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa |
2,430 |
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes |
4,630 |
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage |
1,786 |
An Enhanced Solution for Automated Fire Control Systems |
880 |
Augmented Reality in an Enhanced Command and Control Application |
2,102 |
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving |
1,031 |
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization |
4,124 |
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy |
3,002 |
Concepts in Networks and Communication Security and Graph Theory |
3,416 |
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment |
1,166 |
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19 |
2,056 |
Cyber Hygiene Issues in the Naval Security Environment |
1,321 |
Cyber Red Teaming: Overview of Sly, an Orchestration Tool |
1,782 |
Development of the EU Policy of Police Cooperation with Third Countries: The Case of the Republic of North Macedonia |
2,134 |
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector |
1,209 |
Enhanced Collaboration for Cyber Security and Resilience |
1,180 |
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES |
2,121 |
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones |
3,507 |
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain |
1,050 |
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain |
1,376 |
Governance Mesh Approach for Cybersecurity Ecosystem |
850 |
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques |
874 |
Heuristic-based Intrusion Detection Functionality in a Snort Environment |
2,028 |
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods |
1,972 |
Human Factor, Resilience, and Cyber/Hybrid Influence |
1,300 |
Hypersonic Weapons in Achieving Maritime Superiority |
1,003 |
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities |
1,685 |
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel |
4,140 |
MAIT: Malware Analysis and Intelligence Tool |
1,680 |
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies |
961 |
Multinational Cooperation and Intervention: Small Steps to Better Results |
2,030 |
Network User Behaviour Analysis by Machine Learning Methods |
1,863 |
OSINT on the Dark Web: Child Abuse Material Investigations |
1,160 |
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach |
952 |
Piloting the ECHO e-Skills and Training Toolkit |
1,563 |
Planning and Implementing Change in Cyber Security Network Organisations |
1,828 |
Preserving Privacy of Security Services in the SecaaS Model |
1,042 |
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor |
1,285 |
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination |
2,248 |
Providing Physical Protection of the Vessel in the Event of an Attack at Sea and Ports |
2,023 |
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me? |
3,182 |
Research, Education, and Practice of StratCom in the Security Service of Ukraine in Interagency Settings |
1,832 |
RSA Weaknesses Caused by the Specifics of Random Number Generation |
3,858 |
Simulation-Based Training with Gamified Components for Augmented Border Protection |
1,037 |
Small Countries and Major Global Economic Players – the Nicaraguan Channel |
1,110 |
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification |
2,352 |