A Clustering Method for Information Summarization and Modelling a Subject Domain |
3,996 |
A Security Approach to a Military Autonomous Platform Path Planning |
1,652 |
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising |
2,990 |
A System-of-Systems Approach to Cyber Security and Resilience |
1,721 |
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes |
4,768 |
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage |
1,891 |
An Enhanced Solution for Automated Fire Control Systems |
949 |
Augmented Reality in an Enhanced Command and Control Application |
2,170 |
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving |
1,071 |
Concepts in Networks and Communication Security and Graph Theory |
3,498 |
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment |
1,231 |
Cyber Hygiene Issues in the Naval Security Environment |
1,412 |
Cyber Red Teaming: Overview of Sly, an Orchestration Tool |
1,896 |
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector |
1,272 |
Enhanced Collaboration for Cyber Security and Resilience |
1,269 |
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES |
2,182 |
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain |
1,125 |
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain |
1,456 |
Governance Mesh Approach for Cybersecurity Ecosystem |
913 |
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques |
930 |
Heuristic-based Intrusion Detection Functionality in a Snort Environment |
2,099 |
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods |
2,030 |
Human Factor, Resilience, and Cyber/Hybrid Influence |
1,352 |
Hypersonic Weapons in Achieving Maritime Superiority |
1,058 |
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities |
1,758 |
MAIT: Malware Analysis and Intelligence Tool |
1,735 |
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies |
1,045 |
Network User Behaviour Analysis by Machine Learning Methods |
1,921 |
OSINT on the Dark Web: Child Abuse Material Investigations |
1,239 |
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach |
1,006 |
Piloting the ECHO e-Skills and Training Toolkit |
1,676 |
Planning and Implementing Change in Cyber Security Network Organisations |
1,895 |
Preserving Privacy of Security Services in the SecaaS Model |
1,106 |
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor |
1,381 |
Providing Physical Protection of the Vessel in the Event of an Attack at Sea and Ports |
2,145 |
RSA Weaknesses Caused by the Specifics of Random Number Generation |
3,966 |
Simulation-Based Training with Gamified Components for Augmented Border Protection |
1,100 |
Small Countries and Major Global Economic Players – the Nicaraguan Channel |
1,172 |
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification |
2,423 |
The Experience of Rakovski National Defense College in Organizing the Communication in the Educational Process During Covid-19 Pandemic |
1,614 |
The Hackathons as a First Step to Build Digital Competences |
955 |
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022 |
1,508 |
The Role of Information Campaigns and Advertising in the Military Recruitment System |
1,620 |
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience |
1,825 |
Towards Unified European Cyber Incident and Crisis Management Ontology |
1,237 |
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm |
1,545 |
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models |
984 |
Using Cyber Ranges in Cybersecurity Management Educational Programmes |
1,622 |