|
2013-2014 Action Plan (1) | 2020 Belarus protests (1) | 24/7 Network (1) |
24/7 сеть (1) | 2D simulation engine (1) | 3D (1) |
3D modeling (1) | 3D simulation (1) | 3D simulation engine (1) |
3D моделиране (1) | 3M-Conception (1) | A2/AD (2) |
Abkhazia (1) | Abu Bakr (1) | academic dishonesty (1) |
academic major (1) | academic network (1) | access control (2) |
access to information (1) | accident (1) | accountability (13) |
accreditation bodies (1) | ACCS (1) | acquisition (3) |
acquisition management (1) | acqusition (1) | action plan (2) |
Active Endeavour (1) | active measures (1) | Active Reserve (1) |
actor (1) | actors of change (1) | adaptability (1) |
adaptation (1) | adaptive control (1) | adaptive Doppler filtering (2) |
adaptive hybrid estimation (1) | adaptiveness (1) | Additional Protocol (1) |
ADKAR (1) | ADL (6) | advanced air capabilities. (1) |
advanced distributed learning (4) | Advanced Information Technology (1) | advanced persistent threats (1) |
advanced security assurance case (1) | Advanced Technology Demonstrations (1) | advantages (1) |
adversarial images (1) | advertisement (1) | aerodynamic (1) |
Afghanistan (3) | agent (1) | Agent Architecture (1) |
agent models (1) | agent of influence (1) | agent-based (1) |
agent-based simulation (1) | aggregated combat simulations (1) | aggression (2) |
agility (4) | agriculture (1) | AHP (2) |
Ahrar al Sham (1) | AI (4) | Air Doctrine (1) |
Air Expeditionary Wing (1) | air force capabilities (1) | Air Force Missions (1) |
Air Force Modernisation (1) | air force technologies (1) | Air Force Transformation (3) |
air operations (1) | Air power (1) | Air Situation Simulator (1) |
aircraft motion models (1) | airport (2) | airport security (2) |
airpower (2) | Airpower Model (1) | airspace (1) |
airspace control authority (1) | Al Qaeda (1) | al-Nusra (1) |
Al-Qaeda (3) | al-Qaeda in the Arabian Peninsula (1) | Al-Qaeda in the Islamic Maghreb (1) |
al-Qaida (1) | al-Shabaab (1) | alarm receiving system. (1) |
Albania (2) | Aleksandr Lukashenka (1) | algorithmic noise (1) |
allied operations (1) | Alternative futures (2) | ambiguity (1) |
Amniyat (1) | analysis (3) | Analysis of Alternatives (2) |
analysis tool (1) | analytical hierarchy process. (1) | and post-crisis operations. (1) |
and threats; system approach to security systems’ functional aspects analysis (1) | annexation (1) | anomaly (1) |
anomaly detection (1) | anonymity (2) | ANSSI (1) |
anti-access (1) | anti-corruption (1) | antiquities (1) |
antiterrorist operation (1) | antivirus software. (1) | anyplace (1) |
anytime (1) | Apartheid (1) | applied competences (1) |
AQ (1) | AQAP (1) | Arab Spring (2) |
architectural models (1) | architecture (3) | Architecture for Model Integration (1) |
Arctic (1) | area denial (1) | argumentative negotiation (1) |
armaments planning (1) | armed conflict (1) | armed forces (7) |
armed forces modernization (1) | Armed Forces transformation (3) | arms control (2) |
army (1) | art (1) | artificial immune systems (1) |
artificial inteligence (1) | artificial intelligence (12) | artificial neural networks (1) |
artillery (1) | ASAC (1) | ASCE plug-in (1) |
aspect-based sentiment analysis (1) | assemblage (2) | assessment (3) |
assets (1) | assignment (1) | assignments (1) |
Assumption-based Planning (1) | assurance level. (1) | Assurance Method (1) |
assurance requirements (1) | asylum (1) | asymmetric cryptosystems (1) |
asymmetric response (1) | Asymmetric Threats (2) | attack (1) |
attack surface parameters (1) | attack-surface (1) | attacks against IoT. (1) |
attribute data processing (1) | attribution (2) | attribution theory (2) |
atypical employment (1) | audio (1) | audit (2) |
auditing (1) | augmented reality (1) | authenticated encryption (1) |
authentication (6) | Authoring tools (1) | authoritarianism (2) |
authorization (1) | auto-encoding (1) | automated design (1) |
automated learning (1) | automated management system (1) | Automatic identification system (1) |
automatic translation (1) | automation (2) | automaton (1) |
Autonomous guided vehicles. (1) | autonomous platform (1) | autonomy (1) |
availability (1) | awareness (5) | awareness based training (1) |
awareness-raising (1) | Ayman al-Zawahiri (1) | Azerbaijan (1) |
B-61 (2) | B-method (1) | bachelor program (1) |
balance (2) | balance of consequences (1) | balance of threat theory (1) |
balanced scorecard (8) | Balkan Region (1) | Balkans (2) |
ballistic missile (1) | Baltic Battalion (1) | Baltics (1) |
bank card (1) | bank clearing (1) | Barack Obama (2) |
Bayesian algorithms (1) | Bayesian Decision-Making (1) | behavioural model (1) |
behavioural patterns (1) | Belarus (1) | Belarus-Russia relations (1) |
Belarusian sovereignty (1) | Belarusian statehood (1) | belief functions (2) |
benchmark (1) | benefits (1) | BI (1) |
bias (1) | big data (8) | bilinear Pairing (1) |
BIN (2) | binary relation (1) | bio-integrated systems (2) |
bio-terrorism (1) | Biological weapons (1) | biomedical ethics (1) |
Biometric (2) | biometric identification (1) | biometric system (1) |
BIOS (1) | biosecurity (1) | Black Sea (6) |
Black Sea region (1) | Black Sea security (3) | Black Swan theory (1) |
Blacklists (1) | BlackSeaFor (2) | Blind Signature (1) |
block chain (1) | block cypher (1) | Block Truncation Coding (1) |
blockchain (3) | Blurring Borders between External and Internal Security (1) | Boko Haram (2) |
Boolean Algebra (1) | border crossing (1) | border security (1) |
borders (1) | Bosnia (1) | Bosnia and Herzegovina (2) |
botnet (1) | Britain (1) | Browser Indicators (1) |
Budapest Convention (1) | budget (1) | budget transparency (2) |
Budget Transparency Initiative (1) | budgeting (3) | budgeting. (1) |
Building Integrity (1) | Bulgaria (9) | Bulgarian Armed Forces (2) |
Bulgarian universities. (1) | Bulgaria’s defence reform (1) | business model (1) |
business risk (1) | business-critical infrastructure (1) | C2 (1) |
C2 capabilities (1) | C2 management (1) | C2 principles (1) |
C2IS (1) | C3 (1) | C4 (1) |
C4 project management (1) | C4I (3) | C4I systems (3) |
C4ISR (5) | C4ISR Architecture (1) | C4ISR capabilities (1) |
C4ISR Structural Approach (1) | C4ISR systems; operational (1) | caliphate (1) |
caliphate; internet; ISIS; radicalization; relational development; social media; terrorism; Twitter (1) | CALL (2) | CAM (1) |
campaigns (1) | CAOC (1) | capabilities (9) |
Capabilities Development (1) | capabilities-based assessment (1) | capabilities-based defense planning (1) |
capabilities-based planning (3) | capability (2) | Capability Assessment Methodology (1) |
Capability costing (1) | capability delivery (1) | capability development (5) |
Capability Discussion Matrix (1) | capability divelopment (1) | capability gaps (1) |
capability maturity models (1) | capability portfolio (1) | capability prioritization (1) |
capability requirements review (1) | capacity (1) | capacity building (2) |
capture the flag (1) | case study (1) | CASoS (1) |
Catastrophe Loss Models (1) | Caucasus (3) | cause-effect relation (1) |
CAX (9) | CAX Management environment (1) | CBRN (1) |
CBRNE (1) | CCIS (1) | CCNA Security curriculum (1) |
CDMA (1) | cellular automata (1) | cellular automata model of conflict (1) |
cellular communications (1) | Central Asia (7) | Central Europe (1) |
Central Ukrainian Uranium Province (1) | centralisation (2) | centralised organisation (1) |
centralized management (1) | Centre of Excellence (1) | centre of gravity. (1) |
CERT (3) | certification (1) | certification authority (1) |
certification program (1) | CFACC (1) | CFE (1) |
Chad (1) | challenge-response (1) | challenges (2) |
change management (4) | chaos (1) | Character Segmentation (1) |
characteristics (1) | charge back (1) | Charter of the United Nations (1) |
Chechnya (1) | checks and balances (1) | chemical elements migration (1) |
chemical weapons (1) | Chief Information Officer (2) | child abuse material (1) |
China (9) | China military leadership (1) | cholera (1) |
CIED (2) | CIIP; security; cyber threats; conventional vs. IT-related security threats; infrastructure vulnerability; CIIP R&D; network society. (1) | CIMIC (1) |
CIO (2) | CIO Responsibilities (1) | CIO Roles (1) |
CIP (3) | CIRC (2) | Cisco Systems’ courses (1) |
citizen resilience (1) | civ-mil coordination (3) | civil assistance (1) |
Civil Emergencies (1) | Civil protection (7) | civil rights (1) |
Civil Security (3) | civil society (4) | civil society organizations (1) |
civil society; policy (1) | Civil to Military cooperation and integration (1) | civil watchdogs (1) |
civil-military (1) | Civil-Military Combination Strategies (1) | civil-military cooperation (4) |
Civil-military interaction (1) | Civil-Military Interoperability (5) | Civil-military relations (5) |
civil-military teachers (1) | civilian aspect of diplomacy (1) | civilian control (3) |
civilian oversight (1) | civilians (1) | CJTF (1) |
classification (3) | classroom (1) | Clausewitz (1) |
client-server complexes (1) | client/server. (1) | climate (1) |
climate change (4) | cloud (1) | Cloud computing (4) |
cloud environment (1) | cloud technologies (1) | cloud testing (1) |
cluster (1) | clustering (1) | Clustering algorithm (2) |
clustering method (1) | clustering with outliers (1) | clusters (1) |
cluttered environment (1) | CNO (1) | CNO; malicious computer-mediated activities; interdependencies created by network-based power; private sector - government cooperation; IT-related security regimes. (1) |
CNOs (1) | co-creation (1) | co-reference resolution (1) |
coalition (2) | coalition aerospace operations center (1) | coalition ATO (1) |
coalition command and control (1) | coalition interoperability (1) | Coalition operations (2) |
coastal areas risks (1) | coastal cellular coverage (1) | code of conduct (2) |
code of ethics (1) | coding (1) | cognitive (2) |
Cognitive Approach (1) | cognitive aspects (1) | Cognitive attack (1) |
cognitive bias (1) | cognitive hacking (1) | Cognitive Modeling (1) |
cognitive visualization (1) | cognitive warfare (1) | coherence (1) |
cohesion (1) | cold boot (1) | Cold War (1) |
collaboration (3) | collaboration-oriented architecture (1) | collaborations (1) |
collaborative decision-making (1) | collaborative development (1) | collaborative learning (1) |
collaborative network organisation (2) | Collaborative Network Organization (2) | Collaborative Network Organizations (2) |
collaborative networked organisation (1) | Collaborative Networked Organisations (1) | collaborative networks (1) |
collaborative work (1) | collective security (1) | com-parative analysis (1) |
Combat Potential (1) | Combination rules (1) | combined operation (1) |
Combined Operations (1) | ComBlackSeaNavMet (1) | Command & Control (1) |
command and control (12) | Command and Control Information Systems (1) | Command and control technologies (1) |
Command Post Exercise (2) | commissioned officer (1) | common cause failures (2) |
common challenges (1) | common criteria. (1) | Common Foreign and Security Policy (1) |
common funding (2) | Common Security and Defence Policy (2) | common threat perception (1) |
communication (3) | communication technology (1) | communication-content capabilities (1) |
Communications (5) | Communications and Information Systems (1) | community (1) |
company (1) | comparative analysis (1) | comparative development (1) |
comparative legal analysis (1) | competence (1) | competence development (2) |
competence framework (1) | competencies (2) | competition (1) |
competition continuum (1) | complex adaptive systems (1) | complex crisis situations (1) |
complex dynamic systems (1) | Complex man-machine systems (1) | complex systems (1) |
Complex systems; object-modelling techniques; monitoring (1) | complexity (3) | complexity studies (1) |
complexity theory (2) | compliance (2) | compliant motion (1) |
composite cyber risk (1) | Comprehensive approach (14) | Comprehensive Approach. (1) |
comprehensive approach (1) | Comprehensive security (2) | comprehen¬sive approach (1) |
Computation Node (1) | Computational Intelligence (1) | computational propaganda (1) |
Computer Aided Dispatch (1) | computer aided exercises (CAX). (2) | Computer Assisted eXercises (1) |
Computer Assisted Exercises (CAX) (2) | Computer generated forces (2) | computer graphics (1) |
computer networks (2) | computer security (2) | computer systems reliability (1) |
Computer Virology (1) | computer-assisted language learning (1) | Computing Laboratory (1) |
concept (3) | Concept Development & Experimentation (1) | Concept Development and Experimentation (1) |
conceptual (1) | Conceptual model (1) | Conceptual Research Oriented Combat Agent Distillation Implemented in the Littoral Environment (1) |
Conference Key Distribution System (1) | confidence building (2) | confidence- and security-building measures (1) |
confidence-building (1) | confidentiality (1) | conflict (11) |
Conflict management (1) | conflict modeling (1) | conflict modelling (1) |
conflict resilience (1) | conflict resolution (1) | Conjunctive rule (1) |
CONOPS (1) | consolidation (1) | Consortium. (1) |
conspiracy theories (1) | Constraint Satisfaction/Propagation (1) | construction (2) |
constructive roles (1) | contact point (1) | content analysis (1) |
content monitoring system (1) | context (2) | context scenario (2) |
context scenarios (1) | context translation (1) | contextual scenario (1) |
Continuous DSmT (1) | contract management (1) | contribution (1) |
control (1) | control system (2) | Convention on the Prevention of Terrorism (1) |
conventional conflict (1) | conventional forces (1) | convergence (1) |
convex combination (1) | con¬trol (1) | Cookies (1) |
cooperation (18) | Cooperative Defence Projects (1) | Cooperative development team (1) |
cooperative procurement (2) | cooperative security (2) | coordination (8) |
coping (1) | Copy attack (1) | copyright (1) |
Copyright Protection Scheme (1) | corona virus (1) | correlation infrastructure (1) |
corrupt government (1) | corruption (13) | corruption effects (1) |
corruption factors (1) | corruption networks (1) | cost effectiveness (1) |
Cost Module (1) | cost-effectiveness (1) | costing (1) |
COTS (1) | COTS software (1) | Council of Europe (1) |
counter-cyberterrorism (1) | counter-intelligence (1) | Counter-terrorism (6) |
counterbalance (1) | countering hybrid threats (1) | countering violent extremism (1) |
counterinsurgency (2) | counterintelligence (1) | Counterterrorism (9) |
coupling factors (1) | coverage radius (1) | Covid 19 (1) |
COVID-19 (31) | Covid-19 pandemic (2) | COVID19 (1) |
creating profiles (1) | creative law (1) | credit card. (1) |
Creeping Dissolution of the Monopoly of National Power (1) | crew training (1) | crime (1) |
crime of aggression (1) | crime-terror nexus (1) | Crimea (3) |
criminal activity (1) | criminal business (1) | crises (2) |
crisis (6) | crisis generalized net (1) | crisis management (22) |
crisis management architecture (1) | crisis management operations (1) | crisis management strategy (1) |
crisis management structures (1) | crisis management. (1) | crisis operations (1) |
crisis plans (1) | Crisis Response (1) | crisis response operations (1) |
criteria for non-flammability (1) | critical energy infrastructure (1) | critical energy infrastructure protection (2) |
critical information infrastructure (2) | Critical Information Infrastructure Protection (3) | Critical Infrastructure (21) |
Critical Infrastructure Protection (7) | critical infrastructure; Critical Infrastructure Protection; comprehensive security; security policy; coordination; collaboration (1) | Critical infrastructures (2) |
critical infrastruc¬ture (1) | critical junctures (1) | Critical Success (1) |
critique (1) | CROCADILE (1) | cross-border resiliency (1) |
cross-cultural comparison (1) | cross-domain coercion (2) | cross-impact (1) |
cross-sectoral approach (1) | cryptanalysis (1) | cryptocurrency (1) |
cryptographic keys generation (1) | cryptographic software (1) | cryptography (12) |
cryptography protocols (1) | CSBMs (1) | CSDM Views (15) |
CSDP (3) | CSOs (1) | CSTO (1) |
CTF (1) | cultural environments (1) | culture (6) |
curriculum (3) | Customer Relationship Management (1) | cyber (4) |
Cyber Aggregator (1) | cyber arms race (1) | cyber attack prevention (1) |
cyber attacks (2) | cyber confidence-building measures (1) | cyber conflict (1) |
Cyber defence (8) | cyber defense (2) | cyber digital skills (1) |
cyber diversity (1) | cyber domain (3) | Cyber Ecosystem (1) |
cyber education cybersecurity education cyber range serverless faas (1) | cyber hygiene (1) | cyber maturity (1) |
cyber model (1) | cyber operations (8) | cyber picture (1) |
cyber protection (1) | cyber range (6) | cyber range platform (1) |
cyber research exercises (1) | cyber resilience (7) | cyber risk (2) |
cyber risk assessment (1) | cyber risks (2) | cyber security (20) |
Cyber security community (1) | cyber security culture (1) | Cyber Situational Awareness (1) |
cyber skills (1) | cyber space (1) | cyber systems (1) |
cyber technologies (1) | cyber threat (2) | cyber threat information sharing (1) |
cyber threat intelligence (1) | cyber threats (12) | cyber training (1) |
cyber war (3) | cyber warfare (3) | cyber warfare; morphology; human mind as target; neocortical warfare; information attacks; international law. (1) |
cyber-energy nexus (1) | Cyber-physical system (1) | cyber-physical systems (2) |
cyber-social vulnerabilities (1) | cyber-terrorism (1) | CyberAggregator (1) |
cyberat-tack (1) | cyberattack (7) | cyberattacks (2) |
cybercrime (12) | cybercrime roles (1) | cyberpace (1) |
Cyberse-curity (1) | Cybersecurity (86) | Cybersecurity Act (1) |
cybersecurity areas (1) | cybersecurity attitude (1) | cybersecurity awareness (1) |
cybersecurity behaviour (1) | cybersecurity challenges (1) | cybersecurity community (1) |
cybersecurity competence network (1) | cybersecurity controls (1) | Cybersecurity culture (1) |
cybersecurity cyberattacks scenario space capability requirements (1) | cybersecurity ecosystems (1) | cybersecurity ethics (1) |
cybersecurity governance (1) | Cybersecurity Innovation (1) | cybersecurity knowledge (1) |
cybersecurity management practices (1) | cybersecurity maturity assessment (1) | cybersecurity mesh (1) |
cybersecurity organisation (1) | cybersecurity platform (1) | cybersecurity policy (1) |
cybersecurity policy private sector citizens’ contribution prevention (1) | cybersecurity program (1) | cybersecurity questionnaire (1) |
cybersecurity resilience research management Bulgaria (1) | cybersecurity skills (1) | cybersecurity standards (1) |
cybersecurity strategy (4) | cybersecurity system (1) | cybersecurity taxonomy (1) |
cybersecurity threats (2) | cybersecurity training (1) | cybersecurity training methodology (1) |
cybersecurity transcedents (1) | cyberspace (10) | cyberterrorism (3) |
cyberwar (3) | Cyberwar; information society; risk perception; risk society; cyber risks: physical vs. virtual; US policy response; cyber attacks; critical information infrastructures; information warfare; public-private sector partnership. (1) | cyberwarfare (1) |
Cynefin (1) | CyRADARS (1) | Czech Republic (2) |
Czechoslovakia (2) | daily human needs (1) | dark web (1) |
DAT (1) | data aggregation (1) | data analysis (1) |
data centre (1) | data collection (1) | data engineer (1) |
data engineering (1) | Data Fusion (3) | Data governance (1) |
Data Hiding (1) | data loss (1) | data mining (4) |
Data Modeling (1) | data platforms (1) | data privacy (1) |
data processing; target tracking; adaptive estimation; linear prediction (1) | data protection (1) | data range (1) |
data science (2) | data science as a service (1) | Data/User Privacy (1) |
database (1) | database-as-a-service (1) | Dayton Agreement (1) |
DBSCAN (1) | DCAF (3) | DDoS attacks (1) |
de-globalization (1) | de-perimetrization (1) | decentralized data platforms (1) |
decentral¬ized management (1) | deception (1) | deception operations (1) |
Decision Analysis (1) | decision making (2) | Decision Support (7) |
decision support system (2) | decision support systems (2) | Decision-making (5) |
Decision-making process (2) | Decision-making. (1) | decision-support (1) |
dedovshchina (1) | deductive approach (1) | DEEP (3) |
deep learning (2) | defects (1) | defence (7) |
defence acquisition (2) | defence against terrorism (2) | defence and security (1) |
defence and security policy (1) | defence audit. (1) | defence budget (3) |
defence budgeting (1) | defence capabilities (5) | Defence capability (1) |
defence capabilities (1) | defence ecosystem (1) | defence expenditure (1) |
defence expenditures. (1) | Defence governance (2) | defence industry (1) |
defence institution building (2) | defence institution building. (1) | defence management (4) |
defence planning (5) | Defence Planning Procedure (1) | defence polic defence planning (1) |
defence policy (11) | defence policy model (1) | defence policy review (1) |
Defence procurement (2) | Defence reform (3) | Defence resource management (3) |
defence resources (1) | Defence Sector (3) | defence spending (1) |
defence staff (1) | Defence Support to Civilian Authorities (3) | defence transformation (1) |
defense (4) | defense acquisition (3) | defense acquisition management (1) |
defense and security sector (1) | defense capabilities initiative (1) | defense capability (1) |
defense cooperation (1) | defense economics (1) | Defense Education Enhancement Program (1) |
defense industrial complex (1) | defense industrial policy (1) | Defense Information infrastructure (1) |
Defense Institution Building (6) | defense management (1) | defense planning (1) |
defense planning process (1) | defense planning risks (1) | defense policy (1) |
Defense policy; Foresight-based defense planning; Scenario; Drivers; Defense expenditures (1) | defense politics (1) | Defense procurement (1) |
defense procurement policy (1) | defense R&D. (2) | defense reform (4) |
Defense reorganization (1) | Defense resource management (1) | Defense Resource Management Model (DRMM) (1) |
defense resource program management (1) | defense sector reform (1) | defense support to civilian authorities (2) |
delegated transactions (1) | deliberate planning (1) | democracy (3) |
democratic control (3) | democratic governance (1) | democratic oversight (2) |
democratic resilience (1) | democratization (1) | demographics (1) |
Dempster-Shafer (1) | Dempster-Shafer theory (1) | Dempster’s rule (1) |
denial (1) | dependability indicators (1) | Dependable Computing System (1) |
dependency parsing (1) | deployable air force packages (1) | design (2) |
Design of information security systems (1) | desk research (1) | destructive roles (1) |
determinant (1) | deterministic computer model (1) | deterministic scenario (1) |
Deterrence (9) | deterritorialization (1) | developing countries (1) |
development (1) | development program (1) | development strategy (1) |
Dezert-Smarandache Theory (1) | defense capabilities (1) | diagnostic (1) |
DIB (3) | diceware passphrase (1) | Diffie-Hellman algorithm (1) |
DIGILIENCE (1) | digital citizenship (1) | Digital Competences (2) |
digital development (1) | digital disruption (1) | Digital divide; civil society; global governance decision-making; grass-roots empowerment; plurality of voices (1) |
digital forensics (2) | digital future (1) | digital healthcare (1) |
digital image processing (1) | digital learning infrastructure (1) | digital literacy (1) |
digital signature (1) | Digital Signature. (1) | digital terrain elevation data (1) |
digital transformation (11) | Digital Twin (1) | digitalization (1) |
digitization (1) | diplomacy (1) | direct energy (1) |
direct participation (1) | Direct Task (1) | Directorate for Emergency Management (1) |
disadvantages (1) | disarmament (1) | Disaster (2) |
Disaster Management (2) | disaster preparedness (9) | disaster relief (1) |
disaster response (13) | disaster risk (2) | disaster risk management (1) |
Disaster Scenario (1) | disasters (1) | discourse (1) |
discrete dynamic optimization. (1) | Discrete Logarithm Problem (1) | Discrete Logarithm. (1) |
disinformation (7) | Disintegration (1) | displaced women (1) |
disputed territory (1) | dissemination (1) | Distance course (1) |
distance learning (5) | distance learning systems. (1) | distant work (1) |
distinction (1) | Distributed Computing. (1) | distributed information systems (1) |
Distributed interactive simulation (DIS) (1) | distributed learning (2) | distributed ledger technology (1) |
distributed sensor networks (1) | distributed simulation (3) | distributed systems (1) |
Distributed Technical Knowledge Representation (1) | diversification and optimization (1) | diversity (1) |
DLP (2) | DMA (1) | doctrinal limitations (1) |
doctrine (2) | Document Exchange. (1) | document system (1) |
DoD Architecture Framework (2) | DODAF (2) | domestic operations (1) |
Donbas (1) | Douglas-Peucker algorithm (1) | DRA (1) |
drill (1) | driver dimension (1) | DRIVER+ (1) |
DRM (1) | drone (1) | drone signature (1) |
drones (2) | drug trafficking (1) | DSm model (1) |
DSm rule of combination (1) | DSm theory (1) | DSmT (3) |
DSS (1) | DST (1) | DT coverage (1) |
Dual Capable Aircraft (1) | dual use (1) | Dual use information systems; regulation; computer network operations (1) |
Dubois-Prade’s rule (1) | dynamic analysis (1) | Dynamic Identity (1) |
dynamic modelling (1) | Dynamic Programming (2) | Dynamic programming. (1) |
dynamic risk assessment (1) | dynamics (1) | dynamics of conflict (1) |
E&T (1) | e-Government (4) | e-Government. (1) |
e-learning (10) | e-learning systems (1) | E-MAF (1) |
E-Mail (2) | e-payment (1) | e-Platform (2) |
e-signature (1) | E-skills (1) | e-Voting. (1) |
early warning (3) | early warning system (3) | Early Warnings (1) |
earthquake hazard (1) | earthquake safety (1) | earthquake scenario. (1) |
Eastern Europe (4) | Eastern Flank (4) | ECHO (1) |
ECHO project (7) | ECI (1) | Economic Analysis (1) |
economic and social development (1) | economic coercion (1) | economic crisis (2) |
economic diplomacy (1) | Economic Evaluation of Alternatives (1) | economic footprint (3) |
economic growth (1) | economic impact (2) | economic infiltration (1) |
Economic issues (1) | economic NATO (1) | economic recovery (1) |
ecosystem (2) | ecosystem approach (1) | ECURIE (1) |
EDA. (1) | Editorial (1) | EDRIM (1) |
Education (6) | education & training (2) | education and training (2) |
Education of Maritime Personnel (1) | educational system (2) | educational technologies (1) |
EEoA (1) | Effect-Based Operations (1) | Effect-based operations; battlespace; understanding (1) |
effectiveness (7) | Effects and Criticality Analysis (1) | efficiency (9) |
Egypt (2) | EKS (1) | eLearning platform (1) |
electromagnetic emission. (1) | Electronic Payment Systems (1) | Electronic tender (1) |
Electronic Voting. (1) | Electronic Warfare (2) | ElGamal digital signature (1) |
ElGamal Public Key Crypto-System (1) | Elliptic Curves (1) | Embedded Digital Identity (1) |
emergency management (5) | Emergency Management Architecture (1) | Emergency Management Information System (1) |
Emergency Management Scenarios (1) | Emergency Notification and Alert System for the Danube River Basin (1) | emergency operation center (1) |
emergency planning and response (1) | emergency preparedness (1) | Emergency Response System (1) |
emergency situations (1) | Emerging Security Challenges (1) | emerging technologies (1) |
emotional warfare (1) | emotions mining (1) | empirical analysis (1) |
EMU (1) | Encrypted Data (1) | encryption (1) |
energy dependence (2) | Energy geopolitics (1) | Energy Grid (1) |
energy infrastructure (1) | energy mix (1) | energy reserves (1) |
energy resources (1) | energy sector (1) | energy security (4) |
ENISA (2) | enrolment phase (1) | enterprise (1) |
Enterprise Architecture (3) | enterprise management system (1) | entrepreneurship skills (1) |
Entropy (2) | environmental analysis (1) | Environmental Protection (1) |
Environmental safety (1) | erosion (1) | ERP (1) |
escalation (1) | ESDP (2) | essential services (2) |
ESSO (1) | establishment (1) | estimates (1) |
Estonia (1) | Ethereum (1) | Ethical AI (1) |
Ethics (3) | ethnic conflict (1) | eth¬ics and public service (1) |
EU (7) | EU cybersecurity (1) | EU decision-making (1) |
EU Directive 114/2008 (1) | EU framework (1) | EU global strategy (1) |
EU integration (2) | EU missions (1) | EU security (1) |
EU security research (1) | EUAM (2) | EUCIP (1) |
Eurasian Union (1) | Euro (1) | Europe (2) |
European conflict (1) | European Counter Terrorism Center (1) | European Court of Human Rights (1) |
European Critical Infrastructure Protection (1) | European defence (1) | European defence technological and industrial base (1) |
European intelligence community (1) | European project (1) | European Security (3) |
European Security. (1) | European states (1) | European Union (15) |
European-MENA partnerships (1) | Europol (2) | evaluation (2) |
evaluation criteria (1) | evaluation process (1) | event management (1) |
evidence (1) | evidence reasoning (1) | Evidence Theory (1) |
evolution of Mexican intelligence (1) | Evolution of modelling (1) | evolutionary development. (1) |
evolu¬tion of software (1) | exchange of information (1) | exercise (2) |
exercises (2) | exercising (1) | expanded medical infrastructure vulnerability index (1) |
expected annual lose (1) | expected loss levels (1) | expeditionary air capabilities (1) |
expeditionary operations (1) | experimentation (1) | expert assessment (3) |
expert systems (1) | Experts fusion (1) | exploitation (1) |
Extensible knowledge space (1) | external intelligence (1) | extraction (1) |
Extreme Value Theory (1) | extremism (1) | Factor (1) |
Failure Modes (1) | failures (1) | fair level of PQoS (1) |
fake news (2) | False Negatives. (1) | False Positives (1) |
farming (1) | fault-tolerant architectures (1) | feature selection (1) |
Federal Republic of Yugoslavia (1) | federated (1) | federated identity confidentiality (1) |
Federation Development and Execution Process (FEDEP) (1) | Ferghana (1) | fertilizer prices (2) |
field command and control (1) | fight against corruption (1) | fighter aviation (1) |
fighting terrorism (1) | file name obfuscation (1) | filtering (1) |
fin mixer (1) | Financial Center (1) | financial management (1) |
financial scenarios (1) | financial security (1) | financial transactions (1) |
Finland (1) | fire support (1) | firewall (1) |
first responders (1) | first responders’ community (1) | flood (1) |
flood fighting (1) | flood hazard modeling. (1) | flood protection (1) |
flooding (1) | floods (2) | FMECA (1) |
FOCUS (1) | FOCUS project (1) | food crisis (1) |
footwear impressions (1) | Force Development (2) | force development view (1) |
Force Goals. (1) | Force Information Infrastructure (1) | Force Management (2) |
force management system (1) | force modernization (3) | Force Module (1) |
Force planning (5) | force protection standards (1) | force structure (2) |
force structuring (1) | Forecasting (2) | foreign fighters (3) |
foreign influence operations (1) | foreign investment (1) | foreign policy (4) |
foreign relations (1) | foreign terrorist fighters (1) | Forensic Facial Reconstruction (1) |
foresight (8) | foresighting digital futures (1) | Formal methods (2) |
Formal Task (1) | formalization (1) | former Soviet Union (1) |
forward presence (1) | Forward secrecy (1) | fractal clustering. (1) |
Fractal Dimension (1) | fractal triangle (1) | fragmentegration (1) |
framework (3) | frameworks (1) | framing (1) |
France (2) | fraternal people (1) | Fraud Detection (1) |
Free-Text Processing (1) | frozen conflict (2) | FTP (2) |
full-scale invasion (3) | functional capability (1) | Functional Safety (1) |
Functional-Architectural Model. (1) | functionalities (1) | fundamental rights (1) |
fusion doctrine (1) | fuzzy commitment scheme (1) | fuzzy control (3) |
fuzzy controller (1) | Fuzzy Logic (4) | Fuzzy operators (1) |
fuzzy routing. (1) | Fuzzy sets (2) | Gaddafi (1) |
Game Theory (1) | Gaming (1) | Gamma Methodology (2) |
Gap Diffie-Hellman Groups (1) | Garbled Circuits (1) | GCA (1) |
GDPR Directive (1) | gender (1) | gender attitudes (1) |
gender equality (1) | gender inequality (1) | gender-sensitive approach (1) |
Generalised Security Research System (1) | Generalized Chinese Remainder Theorem (1) | generalized input estimation (1) |
generalized landscape of significance (1) | generalized net (1) | generalized nets (2) |
Genetic Algorithms (2) | genetic code (1) | genocide (2) |
Geodynamic risk mapping (1) | geoeconomic threats (1) | geoeconomics (1) |
Geomorphology (1) | geopolitical implications (1) | geopolitical stability (1) |
geopolitical tensions (1) | geopolitics (3) | Georgia (5) |
geotechnical zonation (1) | Germany (1) | Germany migration (1) |
GHE (2) | GIS (4) | GIS. (1) |
glider (1) | global actor (1) | global crisis (1) |
global governance (1) | Global Health Engagement (2) | global hybrid terrorism (1) |
global power dynamic (1) | global security (1) | global technological development (1) |
global trends (1) | globalisation (1) | globalization (2) |
GMDSS (1) | goals (2) | gold standard (1) |
Good governance (7) | good practices (1) | governance (18) |
governance consulting (2) | governance design (1) | governance functions (1) |
governance management (1) | governance model (2) | GPKI (1) |
GPS (1) | GPS tracker (1) | grain deal (1) |
graph model (1) | graph theory (1) | gray zone (4) |
GRCA (1) | great power (1) | great power competition (2) |
grey zone (3) | grey zone activities (1) | Grid Computing (1) |
grid map (1) | Group decision-making (1) | GroupWare (2) |
GSM (1) | Guatemala (1) | guerrilla (1) |
Guessing attack (1) | hackers (2) | Hague Conventions (1) |
HAL (1) | handling patterns (1) | hard power (1) |
hardware-in-the-loop simulators (1) | harm (1) | harmonization (1) |
harvesting routes (1) | hate speech (1) | hazard assessment (1) |
health security (1) | healthy ageing (1) | heuristic algorithm (1) |
Heuristics. (1) | hierarchical form (1) | High Level Architecture (2) |
high-performance computing (1) | high-resolution tactical simulations (1) | higher education (4) |
Historical earthquakes (1) | historical institutionalism (1) | historical unity of Russians and Ukrainians (1) |
history (1) | HLA (1) | HLS (1) |
Hofstede (3) | Hofstede matrix (1) | homeland defense (1) |
homeland security (4) | honeypot (4) | Horizon 2020 (1) |
Hostage Rescue Operations (1) | hot plug (1) | Hough Transform (1) |
house wives (1) | HQ training (1) | Huba Wass de Czege (1) |
human capital development (2) | human dignity (1) | Human dimension (1) |
human effects (1) | human factor (3) | human factors (8) |
human mobility (1) | human resource management (3) | human resources management (1) |
human rights (6) | Human Safety (1) | Human Security (2) |
Human System (2) | human trafficking (1) | Humanitarian Assistance (1) |
humanitarian intervention (1) | humanitarian operations (2) | humanitarian-assistance scenarios (1) |
Hungarian Defence Forces (1) | Hungary (3) | Hurricane Katrina (1) |
hybrid attacks (1) | hybrid cloud (1) | hybrid conflict (1) |
Hybrid Enterprise Network System (1) | hybrid estimation (1) | hybrid IDS (1) |
hybrid influence (2) | hybrid operations (2) | hybrid resilience (1) |
Hybrid Security (1) | hybrid system estimation (1) | hybrid systems (1) |
Hybrid threat (2) | Hybrid threats (26) | hybrid threats hybrid war interdependence whole-of-society approach resilience (1) |
hybrid threats; conflict; resilience; deterrence; strategy (1) | hybrid threats; hybrid war (1) | hybrid war (10) |
hybrid warfare (25) | hybrid-messianic aggression (1) | hyper-power set (1) |
hypersonic weapons (1) | I&C (1) | ICT (1) |
ICT competences (1) | ICT infrastructure (1) | ICT Personnel development (1) |
ICT security (1) | ICT taxonomies (1) | ICT technologies (1) |
Identification (1) | identification/assessment techniques (1) | ideology (2) |
IDS dataset (1) | IED (1) | Illegal Behavior (1) |
illegal economy (1) | illegal formations (1) | illegal migration (2) |
illegal trafficking (1) | image classification (1) | image formation (1) |
image reparation (1) | Image statistical analysis (1) | IMECA (1) |
IMM estimator (1) | IMM tracking filter design (1) | immediate action (1) |
impact (3) | impact assessment (1) | imperfect information (1) |
imperial role (1) | Implementations (1) | importance (1) |
Improvised Explosive Devices (1) | in-depth protection (1) | incident (1) |
incident command post (1) | incident commander (1) | Incident Management (1) |
incident response (2) | India (1) | indicator (1) |
indicators (1) | Indo-Pacific (2) | Indonesia (1) |
inductive approach (1) | industrial capacity (1) | industrial catastrophes (1) |
industrial control system (1) | industrial control systems (1) | Industrial Internet (1) |
Industrial IoT (1) | industrial pollutants (1) | industrial relations (1) |
industry (2) | industry 4.0 (3) | inequalities (1) |
inertial navigation sensor (1) | infantry (1) | influence (2) |
Infogate (1) | Informal knowledge integration (1) | Information (4) |
information and communication technologies (1) | information and communications technologies (1) | information assurance (5) |
information campaign (1) | information environment (1) | information exchange gateways (1) |
information flow (1) | Information Fusion (3) | information goods (1) |
information infrastructure vulnerability (1) | Information interoperability (1) | information load (1) |
Information Management (1) | information operation recognition (1) | information operations (6) |
information quality (1) | Information Security (21) | information security management (2) |
information security of the state (1) | information security policy (1) | information security programme (1) |
information security standards (1) | information services (1) | information sharing (10) |
information sharing models (1) | Information society (2) | information summarization (1) |
information support (1) | Information System (3) | information system security (1) |
information systems (1) | Information Systems Support (1) | Information systems vulnerability; hacking; hackers; IT-security; critical societal infrastructure. (1) |
information technologies (1) | information technology (2) | information technology impact (1) |
information threats (1) | information trauma (1) | information visualization (1) |
Information warfare (6) | information warfare. (1) | informational warfare (1) |
informers (1) | infrastructure (1) | infrastructure with significant reach (1) |
inherent structural threats (1) | INMARSAT-C (1) | innovation (7) |
innovation management (2) | innovative warfare (1) | input estimation (1) |
Instant messaging malware attack (1) | institution building (1) | institutional (top-down) and bottom-up (individual) recruitment/mobilization (1) |
institutional capabilities (1) | institutional capacity building (1) | institutional Europe (1) |
institutional perspective (1) | institutional resilience (1) | institutionalization (1) |
institutions (4) | insurgency (2) | insurgent networks (1) |
Integrated capability framework (1) | Integrated planning system (1) | integrated security management system (1) |
Integrated Security Sector (2) | integrated security sector; project management (1) | integrated security system (1) |
integrated system (1) | Integration of the European States (1) | integration. (1) |
integrity (13) | integrity policy (1) | intellectual interoperability (1) |
Intellectual Property Right (1) | intelligence (13) | intelligence agencies (1) |
Intelligence assessment (1) | intelligence cooperation (1) | Intelligence governance (2) |
intelligence operations (1) | intelligence oversight (2) | intelligence oversight. (1) |
intelligence reform (2) | intelligence reforms (1) | intelligence sector reforms (1) |
intelligence studies (2) | intelligent agent simulation model (1) | Intelligent Agents (2) |
intelligent complex adaptive system (1) | Intelligent Procurement. (1) | intelligent software agent (1) |
inter-national cooperation (1) | inter-organisational cooperation (1) | Inter-organizational (1) |
Interactive Electronic Technical Manuals (IETMs) (1) | interactive simulation models (1) | interactive verification (1) |
Interagency (2) | interagency cooperation (6) | interdependence (1) |
interdependencies (1) | interdependency (1) | interdisciplinary research (1) |
interests (1) | interface solutions (1) | intermediate force capabilities (6) |
Intermestic Domain (1) | internal and external stakeholders (1) | internal intelligence or counterintelligence (1) |
international aid (1) | international competition (1) | international conflict (1) |
international conventions (1) | international cooperation (2) | international crimes (1) |
international experience (1) | international law (2) | international military cooperation (1) |
international organisations (1) | international relations (1) | international security (3) |
International Terrorism (2) | international law (1) | Internet (4) |
Internet and governance (1) | Internet and state sovereignty/authority (1) | Internet exchanges (1) |
Internet in China; growth in Internet use by civilians; integration of the Internet into military operations (1) | Internet in conflict situations; new conflict environment; proliferation of voices; information operations; information warfare; cyberspace (1) | Internet of Things (5) |
Internet online application (1) | internet service (1) | Internet skirmishes. (1) |
Interoperability (12) | Interoperability. (1) | interoperable simulation (1) |
interorganizational cooperation (2) | intervention (2) | interaction. (1) |
Introduction (2) | intrusion (1) | intrusion avoidance. (1) |
intrusion detection (5) | Intuition-based Decision-making (1) | intuitionist fuzzy logic (1) |
Intuitionistic fuzzy estimation (1) | intuitionistic fuzzy logic (1) | investigation (1) |
investment (1) | investment management (1) | IoT (3) |
IPTV (1) | Iran (2) | Iraq (5) |
Iris Authentication (1) | Iris Recognition (1) | irregular warfare (2) |
ISAF (2) | ISAR Images (1) | ISDN (1) |
ISIL (1) | ISIS (2) | Islam (1) |
Islamic Movement of Uzbekistan (1) | Islamic State (8) | Islamic State Khorasan (1) |
Islamism (1) | Islamist (1) | ISR (1) |
Israel (1) | IT capabilities (2) | IT education (3) |
IT governance (1) | IT management (1) | IT management. (1) |
IT organisations (1) | IT personnel (1) | IT security (5) |
IT services (2) | IT specialist (1) | IT taxonomy (1) |
IT-infrastructures (1) | IT4Sec reports (106) | Italian Mafia (1) |
Jabhat al Nusra (1) | Jabhat Fath al Sham (1) | jamming (1) |
Japan (1) | Java (1) | jet length maximization (1) |
Jihadism (1) | Jihadist (1) | JIM (1) |
Joint and Multinational (1) | joint capabilities (1) | joint fusion centre (1) |
joint mission assurance assessments (1) | Joint National Training Capability (1) | joint operation. (1) |
Joint theater level simulation (JTLS) (2) | Joint Training (1) | judicial control (1) |
just-in-time (1) | K band radar (1) | Kalman Filtering (1) |
Karabakh Conflict (1) | Karachi (1) | Kazakhstan (2) |
key enabling technology (1) | keyword (1) | KGB (1) |
KINEROS (1) | KNIME Analytics Platform (1) | knowledge base (1) |
Knowledge Based Systems (1) | Knowledge Logistics (1) | knowledge management (2) |
knowledge portal (1) | Kolontar (1) | Kosovo (5) |
Kremlinism (2) | kriegsspiel (1) | Kryvyi Rih (1) |
Kurdish question (1) | Kyrgyzstan (2) | land domain (1) |
Land Forces (1) | Landmark Alignment (1) | landscape zoning (1) |
language learning (1) | lateral flows (1) | Latvia (4) |
Latvian resistance (2) | law (2) | law enforcement (6) |
law enforcement agencies (1) | Law of Neutrality (1) | law-enforcement (1) |
lawfulness (1) | Leadership (6) | leadership styles (1) |
leadership theories (1) | leadership theory (1) | leakage-resilience (1) |
learning activities (1) | Learning in Fuzzy Environment (1) | Learning Management System (3) |
learning management system (LMS) (1) | learning objects (1) | learning platform (1) |
learning technology standards (1) | learning tool (1) | learning tools and activities (1) |
legacy architectures (1) | legal base (1) | legal basis (1) |
legal constraints (1) | legal framework (6) | legislation measures (1) |
legislations (1) | legislative base (2) | legislature (1) |
leisure sports (1) | lessons learned (3) | Lethality (1) |
level of ambition (1) | levels of ambition (1) | liberal peacebuilding (1) |
Liberia (1) | Libya (3) | License Plate Recognition (1) |
Liddell Hart (1) | life cycle (1) | life cycle cost. (1) |
Life cycle management (2) | lifelong education (1) | lifelong education program (1) |
limited at-tention (1) | linear prediction. (2) | linguistic nationalism (1) |
liquidation of the consequences of emergency (1) | Lithuania (1) | live streaming (1) |
Live Teleconsultation (1) | LMS (5) | local disaster risk governance (1) |
local safety index (1) | localism (1) | location (1) |
lockdown (1) | Logistics (2) | long-term defence planning (2) |
Long-term defense planning (1) | LoRa (1) | LoRa WAN (1) |
low-laying coastal territories (1) | LSB (1) | lustration (1) |
lustration measures (1) | M-learning (1) | Macedonia (2) |
machine communications (1) | machine learning (10) | machine learning algorithms (1) |
macrograph. (1) | Macros (1) | mafia (1) |
main cyber hygiene rules (1) | mainstreaming (1) | Maintenance (1) |
major security events (1) | malicious (1) | malicious information (1) |
malware (3) | malware analysis (1) | Malware Attacks (1) |
malware intelligence (1) | man-machine interaction (2) | Man-Made Disasters (1) |
management (8) | management environment (1) | management of the organization (1) |
management policy (1) | manager/agent paradigm (1) | managing change (1) |
managing cybersecurity incidents (1) | mandate (1) | maneuvering target tracking (1) |
manning (1) | manpower (1) | Manufacturing (1) |
MAP (1) | Marconi NMS. (1) | marine targets tracking (1) |
marine tourism (1) | maritime (1) | Maritime Crisis Management System analysis and design; Maritime Security Negative Factors evolution; maritime security challenges (1) |
Maritime critical infrastructure (1) | maritime critical infrastructure protection (1) | maritime domain (1) |
maritime industry (1) | maritime presence (1) | maritime sector transformation (1) |
Maritime Security (5) | Maritime Situational Awareness (1) | maritime sovereignty (1) |
maritime superiority (1) | maritime surveillance (2) | Maritime terrorism (1) |
Maritime Transport System (1) | market corruption (1) | Markov and semi-Markov chains (1) |
mass consciousness (1) | mass media (1) | master program (2) |
master studies (1) | Mathematical model (1) | matrix (2) |
maturity (2) | maturity indicators (1) | maturity level (1) |
Mauritania (1) | maximin optimization (1) | Maximizing decision (1) |
measure (1) | measure of uncertainty (1) | measurement (2) |
Measures of Effectiveness and Measures of Performance (1) | measures of uncertainty (1) | measuring results (1) |
media (3) | media ecosystem (1) | medical imaging (1) |
Medical Information Systems (1) | medical readiness (1) | medical terminology (1) |
Mediterranean Dialogue (1) | megacities (1) | megastate (1) |
membership (1) | Membership Action Plan (1) | membership function (1) |
MENA (1) | MENA (БВСА) (1) | mentality (1) |
mercenaries (1) | meta-model (1) | Metadata Modeling (1) |
method (2) | methodology (3) | methods (1) |
Metric (1) | metrics (2) | Microsoft Office (1) |
Microsoft Skype for Linux (1) | Microsoft Teams (1) | MIDI format (1) |
migrants (1) | Migration/Assimilation System (1) | militarism (1) |
military (7) | military assistance (1) | military budgeting (1) |
Military command and control systems (1) | military cooperation (1) | military cyber capabilities (1) |
military deterrence (1) | Military Doctrine (1) | military education (3) |
military education. (1) | military ethos (1) | military exercises (1) |
military expenditures (1) | military higher education institutions (1) | Military Information Support Operations (1) |
military intelligence reform (1) | Military Logistics (1) | military medicine (1) |
Military organisation (1) | military organization (1) | military power (1) |
military professionalization (1) | military strategy (1) | military support (2) |
military threat (1) | military training (1) | military-economic capabilities (1) |
military-industrial complex (1) | Miller-Rabin primality test improvement (1) | Minister of Defence (1) |
ministerial reform (1) | Ministry of Defence (1) | Ministry of Interior (2) |
Ministry of the Interior (1) | Mirai (1) | MISO (1) |
missile (1) | Missile Defence (1) | mission command (1) |
mission-oriented leadership (1) | mitigation (1) | mitigation and avoidance of accidents. (1) |
MITRE ATT@CK framework (1) | mixed digital reality (1) | mixed reality (1) |
MKD-CIRT (1) | ML (1) | MNJTF (1) |
Mobile agents (1) | mobile application (1) | mobile applications (1) |
mobile combat radio network (1) | Mobile Command Post (1) | mobile commerce (1) |
Mobile Communications (1) | mobile devices (1) | Mobile Internet threats (1) |
mobile IP network (1) | mobile learning (2) | mobile lunar base (1) |
Mobile phone (1) | Mobile robot (1) | Mobile Security (1) |
mobile security threats (1) | mobile technology (1) | mobility (1) |
mobilization (2) | modalities (1) | model (5) |
model identification (1) | modeling (5) | Modeling and Simulation (1) |
Modeling and Simulation; Management; Strategy; Analysis; Business Plan; Irregular Warfare; Global War On Terror; GWOT (1) | Modelling (5) | Modelling and Simulation (4) |
Models (2) | modern security. (1) | modernization (2) |
modernization (1) | MODSIM (1) | MOEACA (1) |
MOICA (1) | Moldova (1) | Monetary Policy (1) |
Money Laundering (2) | Mongolia (1) | monitoring (1) |
monitoring network (1) | monitoring station (1) | Monte-Carlo analysis (1) |
Montenegro (2) | Montreux Convention (1) | Moodle (1) |
moral imperative (1) | Morocco (1) | morphological analysis (1) |
Mortgage Market (1) | motiva¬tion (1) | MoU (1) |
MPFSEE. (1) | MSDF (1) | multi detection (1) |
Multi-Agency Operations (1) | multi-agent based distillation system (1) | multi-agent modelling & simulation (1) |
Multi-agent system (1) | Multi-Agent Systems (2) | Multi-Agents Applications (1) |
multi-attribute value theory (1) | multi-criteria approach (1) | multi-criteria decision-making (1) |
multi-national peace support operations. (1) | multi-role fighter (1) | multi-stakeholder approach (1) |
multi-UAV mission planning (1) | multicriteria analysis (1) | multicriteria assessment (1) |
multidimensional security (1) | multidisciplinary studies (1) | Multilateral Interoperability (1) |
multilateralism (1) | multimedia systems (1) | multimedia technologies (1) |
multimodal assessment (1) | multinational (1) | multinational cooperation (3) |
multinational exercise (1) | multiple failures (1) | multiple hypotheses tracking (1) |
Multiple Hypothesis Tracking (1) | multiple maneuvering targets (1) | multiple model estimation and control (1) |
Multipolar world (1) | multirole fighters (2) | Muskovy (1) |
Mutual Authentication (1) | Mutual Information (1) | Nagorno-Karabakh (2) |
narcotic substances (1) | narrative (2) | narratives (1) |
NASA (1) | Nation-building (1) | National Automated Radiation Monitoring System (1) |
National Civil Emergency Plan (1) | national cyber capabilities (1) | National Cybersecurity (1) |
national cybersecurity centre (1) | National cybersecurity management (1) | national cybersecurity strategy (1) |
National Defense University (1) | National Emergency Management System (1) | national experience (1) |
National Firefighting and Rescue System (1) | national interest (2) | national military command center (NMCC) (2) |
National security (4) | national security functions (1) | national security services (1) |
National Security Strategy (1) | national security system (2) | National Situation Center (1) |
Nationalisation of Security Research (1) | nationwide coordination (1) | NATO (52) |
NATO Computer Incident Response Capability (1) | NATO Cyber Defence Management Authority (1) | NATO defense planning (1) |
NATO enlargement (3) | NATO enlargement. (1) | NATO Industry Cyber Partnership (1) |
NATO integration (1) | NATO Response Force (NRF) (1) | NATO response force. (1) |
NATO School Oberammergau (2) | NATO Standards. (1) | NATO training mission (1) |
NATO Transformation (1) | NATO-EU Cooperation (5) | NATO-Russia cooperation (1) |
NATO’s Defence Planning Process (1) | Natural Disasters (6) | natural gas (1) |
Natural gas pipeline network (1) | natural language processing (1) | naval capabilities (1) |
Navy (1) | NC3A (2) | NCIA (1) |
NCIRC (2) | NCIRP (1) | NCO development (1) |
neo-authoritarianism (1) | neo-industrial economy (1) | net context (1) |
network analysis (1) | network attack (1) | network co-creation (1) |
network enabled capabilities (2) | Network Enabled Capability (1) | network evolution (1) |
network governance (2) | network graphs (1) | Network Management System (2) |
network management systems (1) | network monitoring (1) | network organization (1) |
network parameters (1) | network protection (1) | network resource management (1) |
Network Security (1) | Network System Assimilation (1) | network traffic (1) |
Network-based Defence (1) | Network-Centric Warfare (1) | Networked Organisations (1) |
networking (2) | Networks (2) | Neural Networks (1) |
neurobiology (1) | new generation warfare (1) | New Risks and Vulnerabilities (1) |
new world order (1) | next-generation Internet (1) | NI RIO (1) |
niche capabilities (2) | Nigeria (1) | nitrogen feed (1) |
NLP (2) | NMCC (1) | non-commissioned officer (1) |
non-governmental organization (1) | non-kinetic (2) | non-lethal (2) |
Non-Lethal Directed Energy (1) | non-lethal weapons (5) | non-linear warfare (1) |
non-military means (1) | non-proliferation (3) | Non-state actors (1) |
non-traditional threats (1) | non-transferable investments (1) | nonlinearity (1) |
noopolitik. (1) | norms (1) | North Africa (1) |
North Atlantic Treaty Organization (1) | North Korea (1) | North Macednia (1) |
NPP (3) | NSA files (1) | Nuclear (1) |
nuclear armament (1) | Nuclear emergency (1) | nuclear power plant (2) |
Nuclear Regulatory Agency (1) | Obama Administration (1) | object management (1) |
Object Modeling (1) | Object-oriented programming (1) | Objectivity (1) |
Oblivious Transfer (1) | observer status (1) | officer corps (1) |
officer with epaulettes (1) | offset (1) | On-board Instrumentation and Control System (1) |
on-line estimation (1) | one-way function (1) | One-Way Hash Function (2) |
One-Way Property (1) | online learning (1) | online teaching (1) |
online verification (1) | ontological modelling (1) | Ontology (2) |
Ontology Management (1) | Open Architecture (1) | Open Skies Treaty (1) |
open source (1) | open source intelligence (1) | open TX (1) |
operation (1) | Operation Allied Force (1) | operational (2) |
operational analysis (1) | operational energy context (1) | Operational planning (2) |
Operational Research (1) | operational technology (1) | operational view (1) |
Operational Wargaming (1) | operations (3) | operations research (1) |
operations analysis (1) | Optimization (2) | Optimizations (1) |
operational effectiveness (1) | Oranised crime (1) | orchestration (1) |
Orde Baru (1) | Organisational Change (1) | organisational collaboration (2) |
organisational culture (2) | organisational learning (1) | Organization (6) |
organizational change (1) | organizational culture (2) | organizational design (2) |
Organizational Development (1) | organizational framework (1) | organizational learning (1) |
organizational model (1) | Organized crime (9) | Osama bin Laden (1) |
OSINT (3) | OTH-RADARs (1) | OTS component assessment (1) |
OTT; extraterritorial application; telecommunications law; communication privacy; EU; Japan (1) | outlier detection (1) | outreach (1) |
Outsourced Database Services (1) | oversight (5) | PageRank (1) |
Pakistan (2) | pan-European curriculum (1) | panacea (1) |
pandemic (3) | pandemics (1) | PAP-DIB (1) |
paradigmatic deficiency (1) | parameter uncertainty (1) | parastate (1) |
parliamentarian oversight (1) | parliamentary control (1) | parliamentary oversight (3) |
participatory foresight (1) | partnership (2) | Partnership for Peace (9) |
partnership goals (1) | partnerships (1) | password (1) |
Password Authentication (2) | Password Guessing Attacks. (1) | path planning (1) |
Pattern Recognition (1) | Payment System (1) | payment systems (1) |
PBX (2) | PBX security (1) | PDA (1) |
peace (1) | peace and security agenda (1) | peace enforcement (1) |
peace operations (2) | Peace Shield 2000 (1) | Peace-building (1) |
peacebuilding (3) | peacekeeping (3) | Peacekeeping operations (1) |
pedagogical innovations (1) | Pedagogy (1) | peer countries (1) |
perceived quality of service (1) | Perception of security (1) | performance (1) |
performance indicators. (1) | performance management (2) | personality modeling. (1) |
personnel management (1) | PESTLE - analysis (1) | PESTLE – анализ (1) |
Petersberg (1) | Petersberg tasks (1) | PfP (2) |
PfP Consortium (3) | PfP exercise (1) | PhD studies (1) |
Phishing (1) | physical geographic features (1) | PIMS (1) |
Piracy (1) | PKK (1) | plagiarism (1) |
Plan (1) | Planning (2) | planning for disaster protection. (1) |
planning methodology (1) | planning scenarios (2) | planning. (1) |
Plate Detection (1) | platform (1) | plausible and paradoxical reasoning (1) |
plausible deniability (1) | PME (4) | Poland (2) |
Poland; Lockheed Martin F-16; Saab/BAE Systems JAS-39 Gripen; Dassault Mirage 2000-5 Mk II; acquisition; technical comparison; financing; offset; U.S.-Polish relation-ship; fighter competition (1) | police (1) | police cooperation (1) |
police force (1) | police reform (1) | policy (9) |
Policy function (1) | policy guidance (1) | policy recommendations (1) |
policy-making (1) | Polisario (1) | political actors (1) |
political analysis (1) | political economy (1) | political in-stability (1) |
political institutions (1) | political level (1) | political perceptions (1) |
political regimes (1) | political situation (1) | Political stability (1) |
political warfare (1) | politician (1) | politicization (1) |
politicized religion (1) | politics (2) | pollution detection. (1) |
Polyakh (1) | polycentric world (1) | pooling and sharing (1) |
poor countries (1) | Population (1) | portfolio management (3) |
positioning (1) | positive critique (2) | post-communist transition (4) |
post-industrial economy (1) | post-pandemic conditions (1) | post-Soviet space (1) |
post-structuralism (2) | post-truth (1) | post-war (1) |
postconflict reconstruction (1) | potentially pandemic pathogens (1) | power complex (1) |
Power grid safety (1) | Powersim (2) | PPBS (2) |
PQoS (1) | Practical courses on cybersecurity (1) | pre-crisis operations (1) |
precipitation (1) | preemption (1) | preparedness (1) |
presentations (1) | President Putin (1) | prevention (4) |
Primary and Secondary Analysis (1) | primitive capability (1) | prioritisation (1) |
privacy (7) | private cloud (1) | Private Information Retrieval/Storage (1) |
private military companies (1) | private sector (1) | PRNG (1) |
proactive identification (1) | Probability (1) | probability of emission detection (1) |
problem-solving (2) | problematization (2) | procedures (1) |
Processing centre (1) | procurement (3) | procurement (1) |
Professional Military Education (4) | professionalization (1) | professionalization. (1) |
profile (1) | profiling (2) | program (1) |
program structure (1) | program-based resource management (1) | Programming (3) |
progressive framing (1) | Prohibition of War (1) | project (1) |
Project management (2) | project portfolio (1) | projectile or probabilistic hit resolution (1) |
propaganda (6) | proposals (1) | proprietary tools (1) |
protection in emergencies (1) | protection measures (1) | Protection of Civilians (2) |
protection of the population (1) | protests (1) | prototyping (1) |
providing physical protection (1) | proxy server (1) | proxy signature (1) |
proxy war (1) | Pseudo-Random Number Generator. (1) | PSTN (1) |
psychological impact (1) | psychological operations (1) | psychological warfare (1) |
psychological warfare. (1) | psychology (1) | psychology of violence (1) |
public cloud (1) | public diplomacy (1) | public diplomacy; diplomacy; counterterrorism; battle of ideas; State Department; CIST (Countering Ideological Support for Terrorism). (1) |
Public Health Research (1) | Public Key Cryptography (2) | public keys (1) |
public policy (1) | public private partnership (1) | public procurement (1) |
Public Sector (1) | public tenders. (1) | public-private collaboration (1) |
public-private partnership (2) | public-private partnerships (1) | purchasing power parity. (1) |
purpose (1) | Putin (2) | Putin's war in Ukraine (1) |
Putinism (1) | Putin’s regime (1) | QPR (1) |
Qualitative belief (1) | quality assurance (1) | quality management (1) |
Quantitative belief (1) | quantity of intelligence information needed for understanding the information; “pulsation” of information at situation change. (1) | Quantum computing (1) |
quantum cybersecurity (1) | quantum key distribution (1) | quantum resilience (1) |
quantum supremacy (1) | quantum techniques (1) | questionnaire (1) |
R&D (1) | R&D management (1) | R&T management (1) |
radar data processing (1) | radar simulation and modeling (1) | radar technology (1) |
Radiation emergency (1) | radicalism (1) | radicalism threat (1) |
Radio Access Points (1) | radio receiver (1) | radio transmitter (1) |
radio-electronic warfare (1) | Radiological Safety (1) | radon emanation (1) |
RAM (1) | random numbers gen-eration (1) | Randomization (1) |
ranking (1) | ransomware (1) | Raspberry PI (1) |
Rational-Analytic Decision Making Framework (1) | readiness (1) | Real-Time Interactive Telemedical Services (1) |
realpolitik (1) | rearmament (2) | Reconfiguration (1) |
reconnaissance (1) | reconnaissance (1) | recruiting (1) |
recruitment (4) | red teaming (1) | reference scenarios (1) |
Reflexive Control (1) | reflexive model (1) | reform (3) |
refugee women (1) | refugees (1) | regional cooperation (2) |
regional dynamics (1) | regional response (1) | regional security (5) |
Regional Strategies (1) | regional trade agreements (1) | regionalization (1) |
Regulation 630 (1) | reindustrialization (1) | relationship of structure and functions (1) |
Reliability and safety of rocket-space systems (1) | reliability-based model (1) | religion (1) |
Remote Authentication (3) | Remote collaboration (1) | Remote Encrypted Connection (1) |
remote sensing data (1) | Reorganizing C2 (1) | Republic of Moldova (1) |
Reputation (1) | Reputation-based trust systems (1) | requirements (2) |
research (2) | Research and Demonstration Center (1) | research and technology (1) |
research case (1) | research policy (1) | research roadmap (1) |
reservists (1) | resilience (36) | resilience assessment (1) |
resilience control system (1) | resilience for peace (1) | Resilience management (1) |
resilience risk management self-discrepancy theory graphs feedback loops (1) | resilient system (1) | resource allocation (1) |
resource framework (1) | Resource Protection (1) | resources (5) |
response (1) | Responsibility To Protect (1) | responsible science (1) |
Restructuring (1) | retention (2) | revolution (1) |
right to respect for private life (1) | right-to-left Unicode override (1) | rights (1) |
Risk (15) | Risk Analysis (2) | risk appetite (1) |
Risk Assessment (6) | risk assessment. (1) | Risk engineering (1) |
risk management (10) | risk mapping (1) | risk profile assessment (1) |
Risk reduction (1) | Risk reduction. Technical architecture (1) | risks (3) |
risks of orbital carrier rockets and spacecraft failures (1) | RNG (1) | robust AI (1) |
robustness (1) | roles of the Israel Defense Forces (1) | Romania (3) |
RS (1) | RSA (1) | RSA algorithm (1) |
RSS (1) | RTMP (1) | rule of combination (1) |
rule of law (1) | rule-base sentiment analysis (1) | Ruscism (2) |
Ruskiy mir (1) | Russia (28) | Russia- Ukraine war (1) |
Russia-NATO relations (1) | Russia-Ukraine war (4) | Russian aggression (1) |
Russian Federation (7) | Russian Influence (2) | Russian policy (2) |
Russian Transnational Organized Crime (1) | Russian-Ukrainian conflict (2) | Russia’s Intervention (1) |
Russia’s Security Concepts. (1) | Russo-Ukraine war (1) | Russo-Ukrainian war (4) |
RX (1) | S1000D (1) | safety (7) |
safety accident (1) | safety analysis (1) | safety block diagrams (1) |
Safety case core (1) | safety engineering (1) | safety index (1) |
safety management (1) | Safety Management. (1) | Safety of Shipping (1) |
safety-critical software (1) | Sahel (1) | Sahrawi (1) |
sanctions (2) | SAR (1) | satellite (1) |
Satellite Communications (1) | satellite radar interferometry (1) | Satellite-Based Telecommunication Systems (1) |
Saudi Arabia (1) | Saudi Arabia. (1) | SBU (1) |
scalability (1) | scale (2) | scenario (1) |
scenario design (1) | scenario foresight (1) | scenario method (1) |
scenario planning (2) | Scenario Space (1) | Scenario-based capability-oriented planning (1) |
scenario-based planning (2) | Scenarios (3) | school life (1) |
science (1) | Science and Technology (1) | scientific organizations (1) |
scientific support (1) | SCO (1) | scope (1) |
SCORM (5) | SCORM-conformance (1) | SDR (1) |
sea level rise (1) | Sea Surveillance (1) | Search and Rescue (1) |
SeaSparrow (1) | SeaSparrow Program (1) | secrecy (1) |
secret police (1) | Secrets Exchange. (1) | sectarian conflict (1) |
sectarianism (1) | Secure E-Mail (1) | Secure Multi-Party Computation (1) |
secure protocol (1) | secure services (1) | secure transportation (1) |
security (58) | Security Access (1) | security and defence policy (1) |
security and defence reform (1) | security and defence sector (1) | security and defense policy (1) |
security assertion markup language (2) | security capabilities (1) | Security Challenges (1) |
security controls (1) | security cooperation (2) | security discourse (2) |
Security Economics (1) | security engineering (1) | security environment (1) |
security forces (1) | Security foresight (2) | security functions (1) |
security guarantees (1) | security implications of IoT (1) | Security in IoT (1) |
security information and event management (1) | security management (1) | security policies (1) |
security policy (10) | Security Policy Making (1) | Security research (1) |
Security Research 2035 (1) | Security Risks (1) | security sector (2) |
security sector agency (1) | security sector governance (1) | Security Sector Operations (1) |
security sector reform (13) | Security Sector Transformation (2) | security services (1) |
security standards (1) | security strategy (2) | security system (3) |
security threats (2) | security tools (1) | SEDM (1) |
SEE security cooperation (1) | SEECAP (1) | SEEDRMAP (1) |
seismic hazard (1) | Seismic risk (1) | seismic risk management (1) |
Self Organizing Map (1) | self-defense (1) | self-propelled howitzer (1) |
self-regulation (1) | semantic analysis (1) | Semantic Mediation (1) |
semantic similarity search (1) | Sendai Framework (2) | Sensitivity Analysis (1) |
sensor data processing (1) | sensor network (1) | sensor network stability (1) |
sensors (2) | sentiment analysis (1) | separatists. (1) |
Serbia (4) | SEREIN (1) | serious games and gamification (1) |
service design and provision (1) | service management (1) | service provision (1) |
Services. (1) | sex slaves (1) | se¬curity solution (1) |
Shanghai Cooperation Organization (2) | Shannon entropy (1) | Shannon-HartleyTheorem (1) |
shaped charge (1) | SHAPES project (2) | sharable content objects (1) |
sharp power (1) | ship’s computer networks (1) | ship’s cyber defence (1) |
SIGAR (2) | signal processing (1) | signal structure (1) |
signature (1) | Silk Road (1) | Siloviki (1) |
Simmelian backbone (1) | simulation (12) | simulation exploration experience (1) |
simulation of national power and national security. (1) | simulation-based learning (1) | simulation-based training (1) |
simulations (1) | simulators (1) | Sinai Province (1) |
single voice communication (1) | situaitonal awareness (1) | situation analysis (1) |
Situation Assessment. (1) | Situation Center (1) | situation development operations (1) |
Situational awareness (9) | situational scenario. (1) | skeleton units (1) |
skills (1) | skills acquisition (1) | Skype for Business (1) |
Slantrange (1) | sliding window (1) | slopes (1) |
Slovakia (1) | Slovenia (1) | Sly (1) |
small state (1) | small state theory (1) | Smart Card (2) |
Smart Cards (1) | Smart Contracts (1) | smart defence (3) |
smart defence. (1) | Smart Grid (1) | smart house (1) |
smart security (1) | smart substation (1) | smartphone (1) |
smuggling (3) | SOA (1) | Sochi Olympics (1) |
social and labour relations (1) | social instability (1) | social isolation (1) |
social media (3) | social media monitoring (2) | social network (1) |
Social network analysis (1) | social networking service (1) | social networks (7) |
Social networks analysis (1) | Social Resilience (1) | social security (1) |
social structure (1) | social sustainability (1) | Social Systems (1) |
social tension (1) | socialism (1) | societal development (1) |
societal impact assessment (1) | Societal Resilience (3) | Societal Security (1) |
society (2) | socio-constructivism (1) | Socio-Economic Systems (1) |
socio-economic vulnerability (1) | Soeharto (1) | soft Belarusification (1) |
Soft Computing (1) | soft computing agents (1) | soft concerns (1) |
soft deterrence (1) | soft power (2) | Software agent (1) |
Software agents (1) | software architectures (1) | software as a service (1) |
software development (1) | software development process (1) | software faults. (1) |
Software technology (1) | software tool (1) | software tools (1) |
Solidarity Clause (1) | Somalia (1) | South Africa (1) |
South Caucasus (2) | South East Europe (1) | South Eastern Europe (2) |
South Eastern Europe. (1) | South Korea (1) | South Ossetia (1) |
South-Eastern Europe (1) | Southeast Europe (1) | sovereign debt (1) |
Sovereignty (4) | space (1) | space computing simulations (1) |
space surveillance network (1) | space technology transfer (1) | space-based communications (1) |
Spam Detection (1) | spatial data mapping (1) | spatial position (1) |
spatio-temporal structure (1) | Special Antiterrorist Unit (1) | special military operation (1) |
Special Operations Forces (1) | specialised emergency teams (1) | specialization (2) |
spectral analysis (2) | speech recognition (1) | Sphere of influence (1) |
spillover effects (1) | SQL injection (1) | SSD (1) |
SSTR (1) | SSU (2) | SSU Academy (1) |
Stability (4) | Stability Pact for South East Europe (1) | Stability Pact for South Eastern Europe (1) |
stability policing (1) | stabilization (3) | stabilization missions (1) |
Stakeholder Engagement (1) | Stakeholder Engagement Action Plans (1) | stakeholder management (1) |
standard (2) | Standard Operating Procedures (1) | standardization (1) |
standardization organizations (1) | standards (3) | Standing Operating Procedures (1) |
state capture (1) | State Fire and Rescue Service (1) | state influence (1) |
State information resource (1) | State register of potentially dangerous objects (1) | State Security (2) |
state security reform (1) | state sponsor of terrorism (3) | static analysis (1) |
statistical analysis (2) | status of Crimea (1) | Steganographic (1) |
steganography (1) | Steganometric. (1) | stochastic validation (1) |
storm events (1) | stovepipes (1) | StratCom (1) |
StratCom coordination (1) | Strategic Assessment (1) | strategic communication (4) |
strategic communications (2) | strategic competition (3) | Strategic Costing Model. (1) |
strategic defence review (1) | strategic defense review (1) | strategic deterrence (1) |
strategic interdependence (1) | strategic leadership (1) | strategic map (2) |
strategic messaging (1) | strategic narratives (1) | Strategic Objectives (1) |
strategic outcomes (1) | strategic plan (2) | strategic planning (2) |
strategic planning. (1) | strategic power competition (1) | strategic uncertainty (1) |
strategies (1) | strategy (14) | strategy for development (1) |
Strategy Pyramid (1) | strategy. (1) | stress index (1) |
structural constraints (1) | Structural Equation Modelling (1) | structural realism (1) |
structural reform (1) | structural transformation (1) | structured argumentation (1) |
students (2) | Stuxnet. (1) | subculture (1) |
Subject (1) | subject domain (1) | subversion (2) |
Sun Tzu (1) | supply chain (3) | supply chain crime (1) |
supply chain Petersberg tasks (1) | supply chain protection. (1) | supply chain security (2) |
Surface Missile System (1) | surge capacity (1) | surveillance (3) |
surveillance capitalism (1) | sustainable development (1) | SWOT - analysis (1) |
SWOT - анализ (1) | SWOT analysis (1) | synthesis (1) |
synthetic aperture radar (1) | synthetic biology (1) | Syria (5) |
Syrian asylum seekers (1) | Syrian refugees (1) | system (3) |
system analysis (1) | system approach (1) | system architectural frameworks; coalition C2 (1) |
System Architecture (1) | system architectures (1) | System Design (1) |
System Dynamics (2) | System Engineering (1) | System of systems (1) |
system-of-systems (1) | systemic corruption (1) | systems of systems (1) |
TaaS (1) | table-top exercise (1) | TACS (1) |
Tactical Communications Network (1) | Tactical Forms (1) | Tactical Nuclear Weapons (1) |
Tactical Wargaming (1) | Taiwan (2) | Tajikistan (2) |
Taliban (1) | target audience (1) | target tracking (1) |
targets (1) | task list (1) | taxonomy (2) |
teaching methods (1) | technical (2) | technical architecture (1) |
technical architecture framework (1) | technical expertise (1) | technical manuals (1) |
technical regulation (1) | techniques. (1) | techno-social threats & risks (1) |
technological change (1) | technological risk (1) | technologies (1) |
technology (3) | Technology Insertion. (1) | technology-supported training (1) |
telemetry (1) | Telephony (1) | Telnet (1) |
template (1) | TEMPUS (1) | Terrorism (18) |
Terrorism at Sea (1) | Terrorism. (1) | Terrorist Actions (1) |
terrorist attack at Burgas airport (1) | Terrorist Financing (1) | terrorist incident response (1) |
Terrorist Networking (1) | terrorist organizations (1) | Terrorist Recruitment (1) |
terrorist state (3) | terrorist threat (1) | terrorist threat. (1) |
Testing as a Service (1) | testing tools. (1) | tests (1) |
text mining (1) | text similarity (1) | texture-based similarity (1) |
TF-IDF (1) | The Netherlands (1) | the United Kingdom (1) |
theory (1) | thesaurus (1) | third countries (1) |
threat (4) | threat assessment (1) | threat intelligence (1) |
threat multiplier (1) | Threat spectrum (1) | threats (6) |
three-pillar disaster management system (1) | threshold (1) | TIEMS (1) |
time series analysis (1) | time stamp authority (1) | Timestamp (1) |
Timor-Leste (1) | tolerance (1) | tool (1) |
tools (1) | top 10 live threats (1) | Topographical and Topological Data Estimation (1) |
totalitarianism (1) | Tracking (1) | tracking algorithms (1) |
tracking. (1) | trade (1) | Traffic Control. (1) |
trafficking in persons (1) | training (14) | Training and Exercises (1) |
training effectiveness (1) | training program (1) | training programme (1) |
training simulators (1) | trajectory compression (1) | Transaction (1) |
transactional distance (1) | transactions control (1) | transborder conflict (1) |
transdisciplinarity (1) | Transformation (8) | transformation challenges (1) |
transfor¬mation (1) | transition (2) | Transition and Reconstruction (1) |
transition detection (1) | transnational crime (1) | transnational organised crime (1) |
Transparency (19) | tree parity machine (1) | Tree-Based Index Structure (1) |
trends (1) | trial (1) | triangle of contradictions (1) |
tribal networks (1) | tribalism (1) | trilateral relations (1) |
triples (1) | TRL (1) | Trojan life cycle (1) |
Trojans (1) | Trojans detection (1) | trust (4) |
trust models (1) | trusted reporters (1) | trusted routing (1) |
trustworthy AI (2) | Tunisia (1) | Turkey (3) |
Turkish military (1) | Türkiye (2) | TX (1) |
type-variety principle (1) | U.S. Cyber Security Strategy (1) | U.S. security assistance (1) |
U.S. security cooperation (1) | UAV (3) | Uighurs (1) |
Ukraine (24) | Ukrainian Armed Forces (1) | Ukrainian crisis (1) |
Ukrainian Shield (1) | ultra-large database (1) | UML architectural meta-design (1) |
UML архитектурно мета-проектиране (1) | UN Resolution 2178 (1) | UN SCR 1325 (1) |
Uncertainty (5) | uncertainty. (1) | unconventional warfare (1) |
undefined (1) | unified information system (1) | United Kingdom (2) |
United Nations Support Mission in Libya (1) | United States (4) | universal mind (1) |
University (3) | university study programs (1) | Unknown attack (1) |
unmanned aerial vehicles (1) | unrestricted warfare (2) | UNSC Resolution 1325 (1) |
UNSCR 1325 (1) | UNSMIL (1) | Untrusted Server (1) |
uranium ore deposits (1) | uranium ore manifestations (1) | urban operations (1) |
US (1) | US Global Strategy (1) | US intervention (1) |
US Naval Academy (1) | US-Europe Security Issues (1) | User Anonymity (1) |
User Impersonation. (1) | users response (1) | UxVs (1) |
Uzbekistan (1) | validation (1) | valleys (1) |
values (2) | variable parameter (1) | variational problem (1) |
VBA (1) | vehicle theft (1) | velocity control autopilot (1) |
verification (3) | Verkhovna Rada (1) | Vessel Traffic Services (1) |
Videoconferencing (1) | Virtual Breeding Environment (1) | virtual classroom (1) |
Virtual diplomacy; foreign policy in information age; empowerment by networks; rise of non-state actors; realpolitik (1) | virtual reality (1) | Virtualisation (1) |
virtualization (1) | Visibility function (1) | visible areas (1) |
vision (2) | Visual Basic for Applications (1) | visualization (1) |
vital societal functions (1) | vocabulary learning strategies (1) | volunteer battalions (1) |
volunteering system (1) | volunteerism (1) | volunteers (1) |
VR (1) | VTS enhancement (1) | Vulnerabilities (8) |
vulnerability (8) | vulnerability analysis (2) | war (5) |
war crimes (2) | war economy (1) | War on Terror (1) |
War or Terrorism (1) | Warden’s rings (1) | Wardriving (1) |
Warfare (3) | Wargaming (2) | warriors (1) |
Warsaw (1) | water consumption (1) | water management (1) |
water resources (1) | water security (1) | Watermarking (1) |
Watermarking. (1) | way of life (1) | weaponization of interdependence (1) |
Web 2.0 (3) | Web 2.0/Web 3.0 технологии (1) | Web 3.0 (3) |
Web Agents (1) | web application (1) | web attack (1) |
web page categorisation (1) | web service (1) | Web Services (3) |
web sources (1) | web users analysis (1) | web-based learning (2) |
Web-service (1) | welcoming address (1) | wellbeing (1) |
WEP (1) | Western Balkans (2) | Western New Independent States (1) |
Western response (1) | Western Sahara (1) | Western sanctions on Belarus (1) |
whole-of-government (1) | Wi-Fi technology (1) | wiki. (1) |
Wildfire (2) | Wine (1) | Wired Equivalent Privacy (1) |
Wireless mesh network (1) | Wirless Local Area Network (1) | WLAN (1) |
women (2) | women in conflict (1) | women’s empowerment (1) |
word2vec representation (1) | words network (1) | world economy (1) |
world order (1) | WTO (1) | X-ray (1) |
XML (1) | XML Encryption (2) | XML Signature (1) |
Yager’s rule (1) | Yemen (1) | zero trust model (1) |
«Инфогейт» (1) | «капитализм слежки» (1) | «холодная война» (1) |
Абу Бакр (1) | Абхазия (1) | авторитаризм (2) |
агент влияния (1) | агентный (1) | агрессия (2) |
адаптация (1) | Азербайджан (1) | АК (1) |
АКАП (1) | активи (1) | активные мероприятия (1) |
Албания (1) | Александр Лукашенко (1) | Аль-Каида (5) |
Аль-Каида в Исламском Магрибе (1) | Аль-Каида на Аравийском полуострове (1) | Амният (1) |
ан-Нусра (1) | анализ (1) | анализ на алтернативи (1) |
антиквариат (1) | антикризисное управление (1) | антитеррористическое законодательство (1) |
апартеид (1) | апетит към риска (1) | Арабская весна (2) |
армия (1) | асимилиране на мрежова система (1) | асимметричный (1) |
ассемблирование (1) | атаки (1) | атрибутивна теория (2) |
атрибуция (2) | аутрич (1) | Афганистан (3) |
Ахрар аль-Шам (1) | Аш-Шабаб (1) | бакалавър (1) |
баланс (2) | баланс на последствията (2) | балансирана карта от критерии за ефективност (1) |
балансирана система от показатели за оценка на ефективността (1) | Балканы (1) | Балтийский батальон (1) |
Барак Обама (1) | бедствие (2) | беженцы (1) |
безопасность (11) | безопасность на море (1) | безопасность цепочек поставок (1) |
Беларусь (1) | белорусская государственность (1) | белорусско-российские отношения (1) |
бенчмарк (1) | биобезопасность (1) | Биологическое оружие (1) |
Боко Харам (1) | большие данные (1) | борьба с коррупцией (1) |
борьба с наводнениями (1) | Босния и Герцеговина (2) | братские народы (1) |
Будапештская конвенция (1) | България (5) | Българска армия (3) |
бюджет (1) | бюджет за отбрана (2) | Варшава (1) |
ведомство сектора безопасности (1) | великая держава (1) | Венгрия (2) |
верификация (1) | верховенство закона (1) | Верховная Рада (1) |
взаимодействие (1) | взаимозависимость (1) | виртуална класна стая (1) |
висше образование (1) | вклад (1) | влияние государства (1) |
влияние России (1) | внедрена цифрова идентификация; дистанционна криптирана връзка (1) | внешняя политика (3) |
внешняя разведка (1) | внутренняя разведка (1) | военна професия (1) |
военна реформа (1) | военная доктрина (1) | военная игра (1) |
военная медицина (1) | военная мощь (1) | военная организация (1) |
военная помощь (1) | военная реформа (1) | военная стратегия (1) |
военная экономика (1) | военни технологии (1) | военно сътрудничество (1) |
военно-промышленный комплекс (1) | военно-экономический потенциал (1) | военное лидерство в Китае (1) |
военное образование (3) | военные (2) | военные кибер способности (1) |
военные операции (1) | военные преступления (2) | военные расходы (1) |
военные учения (1) | воздействие (1) | возможности коммуникационного контента (1) |
возникающие вызовы безопасности (1) | воины (1) | война (6) |
война Путина против Украины (1) | война с терроризмом (2) | вооруженные силы (1) |
Вооружённые силы Украины (1) | воспрещение (1) | восстановление экономики (1) |
Восточная Европа (3) | Восточная и Центральная Европа (1) | восточный фланг (2) |
ВР (1) | всеобхватна сигурност (1) | Въоръжени сили (3) |
выборы 2016 (1) | вызовы кибербезопасности (1) | гарантии безопасности (1) |
гармонизация (1) | Гватемала (1) | гендер (1) |
гендерное неравенство (1) | гендерное равенство (1) | гендерные отношения (1) |
гендерный подход (1) | геноцид (2) | геополитика (1) |
геополитическая напряжённость (1) | геополитическая стабильность (1) | геополитическое влияние (1) |
геоэкономика (1) | геоэкономические угрозы (1) | гибридная война (14) |
гибридная угроза (1) | гибридная устойчивость (1) | гибридно-мессианская агрессия (1) |
гибридное влияние. (1) | гибридные угрозы (6) | гибридные угрозы; конфликт; устойчивость; сдерживание; стратегия (1) |
ГИС (1) | глобализация (2) | Глобална стратегия на Европейския съюз (1) |
Глобальное медицинское взаимодействие (2) | глобальный гибридный терроризм (1) | гонка кибер вооружений (1) |
государства бывшего СССР (1) | государственная безопасность (1) | государственная политика (1) |
государство-спонсор терроризма (3) | готовность (1) | гражданска защита (3) |
гражданска сигурност (1) | гражданские права (1) | гражданский аспект дипломатии (1) |
гражданский надзор (1) | гражданско общество (1) | гражданское общество (1) |
гражданское общество; политика (1) | Грузия (5) | двойное назначение (1) |
дедовщина (1) | дезинтеграция (1) | дезинформация (7) |
Дейтонское соглашение (1) | демография (1) | демократизация (1) |
демократичен контрол (1) | демократическая устойчивость (1) | демократический контроль (2) |
демократический процесс (1) | демократия (3) | деструктивни роли (1) |
детериториализация (1) | Джамму и Кашмир (1) | Джебхат ан-Нусра (1) |
Джебхат Фатах аш-Шам (1) | джем по безопасности (1) | джихадизм (1) |
джихадистский терроризм (2) | дигитална обучителна инфраструктура (1) | дигитална трансформация (2) |
дигитално бъдеще (1) | динамика на потребителските реакции (1) | дипломатия (1) |
Дирекция за управление при извънредни ситуации (1) | дискурс (1) | дистанционна работа (1) |
дистанционно обучение (1) | ДКВС (1) | добро управление (2) |
добровольческие батальоны (1) | доверие (3) | договор «Открытое небо» (1) |
доктрина (2) | доктрина комплексирования (1) | домохозяйки (1) |
Донбасс (1) | Дополнительный протокол (1) | доставки за отбраната (1) |
дрони (1) | думи: неопределеност (1) | Европа (1) |
Европейска интеграция (1) | Европейска отбрана (1) | европейская безопасность (5) |
Европейский контртеррористический центр (1) | Европейский союз (7) | Европейский суд по правам человека (1) |
Европол (1) | Египет (2) | експертни системи (1) |
електронно обучение (1) | ЕС (5) | Естония (1) |
етичен кодекс (1) | етнически конфликт (1) | ефективност (4) |
ефикасност (3) | женщины (1) | женщины и конфликт (1) |
женщины-беженки (1) | жизнен цикъл (1) | жизнь училища (1) |
Закон за защита при бедствия (1) | законодателна рамка (2) | замороженный конфликт (2) |
Западная Сахара (1) | Западные Балканы (1) | заплаха (1) |
заплахи (3) | захват государства (1) | защита (1) |
защита в дълбочина (1) | защита гражданского населения (1) | защита на критична инфраструктура (1) |
защита на населението (1) | защита от наводнений (1) | защита персональных данных (1) |
защитна стена (1) | зерновая сделка (1) | златен стандарт (1) |
значения (1) | зрелость (1) | зрялост (1) |
ИБТ (1) | ИГИЛ (3) | ИГИШ (1) |
идеология (2) | иерархическая форма (1) | изкуствен интелект (1) |
изменение климата (2) | измерване (1) | изоляция (1) |
изоляция района боевых действий (1) | Израиль (1) | Източна Европа (1) |
инвестиции (1) | индикатор (1) | Индия (1) |
Индо-Тихоокеанский регион (2) | Индонезия (1) | Индустриальный Интернет (1) |
инновации (1) | инновационная война (1) | инновация (1) |
иностранные боевики (3) | иностранные боевики-террористы (2) | иностранные инвестиции (1) |
институты (2) | институциональная устойчивость (1) | институциональное (сверху-вниз) и индивидуальное (снизу-вверх) рекрутирование (1) |
инструменти за разработка на съдържание (1) | интегриран сектор за сигурност (1) | интегритет (6) |
интелигентна отбрана (4) | интеллектуальная оперативная совместимость (1) | интерактивна верификация (1) |
интервенция (1) | интервенция США (1) | интереси (1) |
Интернет (1) | Интернет вещей (1) | Инфовойна (1) |
информационна сигурност (1) | Информационна система за управление при извънредни ситуации (1) | информационная война (4) |
информационная травма (1) | информационни системи (1) | информационное обеспечение военных действий (1) |
информационные операции (4) | информированность (1) | инфраструктура (1) |
инфраструктура ИКТ (1) | инцидент (1) | Ирак (4) |
Иран (2) | искусственный интеллект (1) | искусство (1) |
исламизм (1) | Исламское государство (9) | Исламское государство Хорасан (1) |
Исламское движение Узбекистана (1) | исследования по вопросам разведывательной деятельности (1) | исторический институционализм (1) |
историческое единство русских и украинцев (1) | история (1) | Йемен (1) |
Кавказ (3) | Каддафи (1) | Казахстан (2) |
Карачи (1) | каркасные единицы (1) | картографирование рисков (1) |
квантовая кибербезопасность (1) | квантовая устойчивость (1) | квантовое превосходство (1) |
квантовое распределение ключей (1) | квантовые вычисления (2) | КГБ (1) |
кибер атака (2) | кибер безопасность (1) | кибер война (1) |
кибер домен (1) | кибер заплахи (3) | кибер защита (2) |
кибер конфликт (1) | кибер оборона (1) | кибер операции (4) |
кибер пространство (1) | кибер риски (1) | кибер сигурност (2) |
Кибер угрозы (1) | кибер-война (1) | кибер-социальные уязвимости (1) |
кибер-физические системы (1) | кибератака (2) | кибербезопасность (11) |
кибербезопасность ЕС (1) | кибервойна (2) | кибердомен (1) |
киберзаплахи (2) | киберзащита (1) | кибернавыки (1) |
кибернетика (1) | кибернетична екосистема (1) | кибернетична сигурност (1) |
кибероборона (1) | киберобучение (1) | кибероперации (2) |
киберпреступность (4) | киберпрестъпност (3) | Киберпространство (5) |
киберпространството (1) | киберриск (1) | киберсигурност (13) |
киберсфера (1) | кибертехнологии (1) | киберустойчивост (1) |
киберустойчивость (1) | Китай (8) | клановость (1) |
класификация (2) | класифициране (1) | Клаузевиц (1) |
ключевая технология (1) | Ковид-19 (1) | когнитивная война (1) |
когнитивное хакерство (1) | когнитивный (1) | кодекс поведения (1) |
коллективная безопасность (1) | Колонтар (1) | командване в мисии (1) |
командование и управление (1) | компетентности (1) | комплексни кризисни ситуации (1) |
комплексность (1) | комплексный подход (1) | компьютерная пропаганда (1) |
компютърна графика (1) | компютърно подпомагани учение (КПУ) (1) | конвенциональные силы (1) |
Конвенция о превенции терроризма (1) | конвергенция (1) | конкурентный континуум (1) |
конструктивни роли (1) | контекст (1) | контент-анализ (1) |
контр-повстанческие действия (1) | контр-терроризм (1) | контрабанда (1) |
контроли за киберсигурност (1) | контроли за сигурност (1) | контроль над вооружениями (2) |
контрразведка (3) | контртерроризм (4) | контртеррористические операции (1) |
конфликт (6) | концепции (1) | концепция (1) |
координатор (1) | координация (4) | коронавирус (2) |
коррупция (5) | корупция (1) | корупция; пазарна корупция; мрежова корупция; фактори за корупцията; последици от корупцията; антикорупция (1) |
Косово (3) | креативное право (1) | кремлинизм (2) |
криза (2) | кризис (1) | кризисное управление (1) |
кризисный менеджмент (3) | криминальный бизнес (1) | криптография (2) |
критическая информационная инфраструктура (1) | критическая инфраструктура (4) | критические инфраструктуры (1) |
критические моменты (1) | критична инфраструктура (1) | кросс-культурная компетентность (1) |
Крым (2) | культура (5) | культурная среда (1) |
Кыргызстан (1) | Латвия (2) | летательный аппарат двойного назначения (1) |
летище (2) | либеральное миростроительство (1) | Либерия (1) |
Ливия (3) | Лиддел Гарт (1) | Лидерство (4) |
лингвистические умения (1) | Литва (1) | локализъм (1) |
люстрация (1) | Мавритания (1) | магистър (1) |
Македония (1) | Марокко (1) | матрица (2) |
матрица Хофстеде (1) | мафия (1) | машинные коммуникации (1) |
мащаб (2) | мегаполисы (1) | медиа (1) |
медицинская безопасность (1) | медицинская готовность (1) | межведомственное сотрудничество (1) |
международная безопасность (1) | международная помощь (1) | международное право (1) |
международное соперничество (1) | международные конвенции (1) | международные отношения (2) |
международные преступления (1) | международный опыт (1) | межкультурное сравнение (1) |
мейнстрим (1) | менеджмент конфликтов (1) | менеджмент чрезвычайных ситуаций (1) |
мениджмънт (3) | ментальность (1) | мерки за защита (1) |
меры кибердоверия (1) | меры люстрации (1) | меры по укреплению доверия и безопасности (1) |
метод на сценариите (1) | метод ПЯИО (1) | методы обучения (1) |
Метрика (1) | метрики (1) | мигранты (1) |
миграция в Германии (1) | Министерство на вътрешните работи (2) | Министерство на отбраната (2) |
министър на отбраната (1) | мира и безопасности (1) | мировой порядок (1) |
миротворческие операции (1) | миротворчество (2) | многокритериален анализ (1) |
многонационално сътрудничество (1) | многонациональные формирования (1) | многополярный мир (1) |
мобилизация (3) | мобильность (1) | модел (2) |
модели за измерване на зрелостта на способностите за киберсигурност (1) | модели за поведение (1) | модели зрелости способностей (1) |
моделиране (1) | моделирование (1) | модернизация (3) |
модернизация вооружённых сил (1) | Монголия (1) | моральный императив (1) |
Морское пиратство (1) | Московия (1) | мрежови системи на управление техники за идентифициране/оценяване (1) |
МУДБ (1) | мултиагентно моделиране и симулации (1) | мултимедийни системи (1) |
мултимедийни технологии (1) | мультипликатор угроз (1) | мягкая белорусизация (1) |
на море (1) | на суше (1) | навигация (1) |
наводнения (1) | Нагорный Карабах (1) | надзор (2) |
наркотические вещества (1) | нарратив (2) | НАТО (38) |
Национална противопожарна и спасителна служба (1) | Национална система за противопожарна защита и спасяване (1) | Национална система за управление при извънредни ситуации (1) |
национальная безопасность (1) | национальные интересы (1) | национальный интерес (1) |
Национальный университет обороны (1) | Негосударственные акторы (1) | недопущение (1) |
недостатъци (1) | незаконная торговля (1) | незаконная экономика (1) |
незаконные формирования (1) | нейробиология (1) | некинетический (2) |
нелетальная направленная энергия (1) | нелетальное оружие (5) | нелетальный (2) |
нео-авторитаризм (1) | неоиндустриална икономика (1) | неопределенность (1) |
нераспространение (1) | нерегулярные боевые действия (1) | нетрадиционные угрозы (1) |
нетрансферабельные инвестиции (1) | неядерный конфликт (1) | нива на зрялост (1) |
нишови способности (1) | новый миропорядок (1) | Новый порядок (1) |
нормы (1) | обеспечение правопорядка (1) | области за киберсигурност (1) |
обмен информацией (2) | обмен информации (1) | обобщена картина на значимост (1) |
оборона (4) | оборонная реформа (1) | оборонное планирование на основе способностей (1) |
оборонное сотрудничество (1) | обороноспособность (1) | образ жизни (1) |
образование (1) | образователни технологии (1) | обучение (2) |
обучение на база на информираност (1) | Обща политика за сигурност и отбрана (3) | общевойсковые операции (1) |
общегосударственный (1) | общественная дипломатия (1) | общество (1) |
ОВСЕ (1) | ограничение и воспрещение доступа и манёвра (1) | оказание поддержки гражданским властям военными (1) |
Олимпиада в Сочи (1) | опасност (1) | ОПБО (1) |
оперативная совместимость (3) | операции (1) | операции в городских условиях (1) |
операции иностранного влияния (1) | Операции по стабилизации и восстановлению (1) | операционализация культуры (1) |
определения устойчивости (1) | ОПСО (1) | организационна култура (2) |
организационная модель (1) | организация (2) | организация полиции (1) |
Организация Североатлантического Договора (1) | организованная преступность (4) | ориентированная на результат модель управления (1) |
основное течение (1) | острая сила (1) | отбранителен мениджмънт (1) |
отбранителна аквизиция (1) | отбранителна индустрия (1) | Отбранителна политика (7) |
отбранителна реформа (1) | отбранителни способности (5) | отбранително планиране (1) |
ответственная наука (1) | ответственность за защиту (1) | отвлекающие действия (1) |
отговор при бедствия (8) | отмывание денег (1) | отчетност (3) |
офицер (1) | офицерский корпус (1) | охрана законности и порядка (1) |
охрана правопорядка (4) | оценка зрелости кибербезопасности (1) | оценка устойчивости (1) |
оценяване и управление на риска (1) | очак- вана годишна загуба (1) | Пакистан (2) |
панацея (1) | пандемия (4) | пандемия COVID-19 (1) |
парламентарен контрол (1) | парламентарен надзор (1) | парламентский контроль (1) |
парламентский надзор (2) | партизанская война (1) | партнерства (1) |
партнерства Европа-БВСА (1) | партнерство (2) | Партнерство ради мира (2) |
Партньорство за мир (1) | ПВО (1) | ПД (1) |
педагогические инновации (1) | передовое присутствие сил на передовых рубежах (1) | перемещенные женщины (1) |
пересечение границ (1) | Перестройка (1) | пехота (1) |
ПИВСН (1) | план действий (1) | План действий по обеспечению готовности (1) |
платформа по кибербезопасности (1) | племенные сети (1) | повстанческие сети (1) |
повстанческое движение (1) | повышение добропорядочности (1) | пограничный забор с Россией (1) |
подготовка (10) | подготовка на войските (1) | поддержка гражданских властей со стороны вооруженных сил (1) |
подотчетность (2) | подрывная деятельность (1) | пожари земетресения (1) |
позитивная критика (1) | позициониране (1) | показатели зрелости (1) |
Полисарио (1) | политизация (1) | политизация религии (1) |
политик (1) | политика (5) | политика безопасности (4) |
политика безопасности и обороны (1) | политика за интегритет (1) | политика за сигурност (1) |
политика исследований (1) | политика по вопросам климата (1) | политика развития Европей¬ского оборонного союза (1) |
политики за сигурност (1) | политическая ситуация (1) | политическая экономия (1) |
политические институты (1) | политические режимы (1) | политический анализ (1) |
политическое сознание (1) | полицейское патрулирование для поддержания порядка (1) | полицентрический мир (1) |
полиция (2) | полномасштабное вторжение (3) | полученные уроки (1) |
Полша (1) | Полях (1) | помощь США в сфере безопасности (1) |
порог (1) | портфолио от проекти (2) | после войны (1) |
последствия для людей (1) | последствия ИВ для безопасности (1) | последствия распространения (1) |
пост-пандемийные условия (1) | постиндустриална икономика (1) | посткоммунистический переходный период (1) |
постконфликтное восстановление (1) | постправда (1) | постсоветская территория (1) |
постструктурализм (1) | потенциал (1) | потенциально пандемические патогены (1) |
поуки от практиката (1) | ППБС (1) | права (1) |
права человека (2) | право на уважение частной жизни (1) | правовая база (2) |
правовая основа (1) | правоохранительные органы (1) | превенция (1) |
предвидение (1) | предимства (1) | предшествовавшая дислокации (1) |
презентации (1) | президент Путин (1) | преступление агрессии (1) |
преступная деятельность (1) | преступность (1) | природни бедствия (1) |
природный газ (1) | проблематизация. (1) | проблематика женщин (1) |
провинция Синай (1) | прогнозы (1) | програма за киберсигурност (1) |
програма за развитие (1) | Программа совершенствования образования в сфере обороны (1) | продовольственный кризис (1) |
проектиране на системи за информационна сигурност (1) | прозрачност (4) | прозрачность (2) |
прокси-война (1) | промежуточные силовые возможности (6) | промышленность (1) |
пропаганда (4) | протести (1) | протесты 2020 (1) |
противодействие (1) | противодействие на инциденти с киберсигурността (1) | профессионализация (1) |
профессионализация вооруженных сил (1) | Профессиональное военное образование (4) | профил (1) |
процесс оборонного планирования (1) | психологические операции (1) | психология насилия (1) |
ПСОО (1) | публично-частное сотрудничество (1) | Путин (2) |
путинизм (1) | Путинский режим (1) | Пълно дисково криптиране (1) |
радикализация (1) | радикализм (1) | радиоэлектронная борьба (1) |
разведка (9) | разведывательные данные (1) | развитие (1) |
развитие на въоръжените сили (1) | развитие отношений (1) | развитие сержантского корпуса (1) |
разоружение (1) | разработка и проверка концепции (1) | разрешение конфликтов (1) |
рамки (1) | расширение прав и возможностей женщин (1) | рашизм (2) |
реакция Запада (1) | реальная политика (1) | революция (1) |
регионализация (1) | региональная безопасность (1) | региональная динамика (1) |
резолюция 1325 СБ ООН (1) | Резолюция ООН 2178 (1) | Резолюция СБ ООН 1325 (1) |
Резолюция Совета безопасности ООН 1325 (1) | реиндустриализация (1) | рекомендации по политике (1) |
религиозная доктрина (1) | религия (1) | реорганизации C2 (1) |
ресурси (3) | ресурси за отбрана (1) | ресурсна рамка (1) |
ресурсы (2) | реформа в сфере обороны (1) | реформа военной разведки (1) |
реформа государственной безопасности (1) | реформа министерств (1) | реформа на сектора за сигурност (1) |
реформа полиции (2) | реформа разведки (2) | реформа сектора безопасности (1) |
реформа сектора обороны (1) | реформиране на сектора за сигурност (1) | реформирование разведки (1) |
реформирование разведывательного сектора (1) | реформирование сектора безопасности (1) | реформы (2) |
решение проблем (1) | риск (7) | риск бедствий (1) |
рисков профил (1) | рискове (1) | роль Армии обороны Израиля (1) |
российская агрессия (1) | российская политика (2) | Российская Федерация (4) |
российско-грузинские отношения; внутренняя политика Грузии; Южная Осетия; Абхазия; международные отношения на Кавказе (1) | российско-украинская война (2) | российско-украинский конфликт (1) |
российское влияние (1) | Россия (19) | Румъния (1) |
русские (1) | Русский мир (1) | русско-украинская война (7) |
самокриптиращ (1) | санкции (2) | Саудовская Аравия (1) |
Сахель (1) | Сахрави (1) | САЩ (1) |
СБУ (1) | связь (1) | связь преступность-терроризм (1) |
сдерживание (9) | Северная Африка (1) | Северная Корея (1) |
Северная Македония (1) | Северный Кавказ (1) | сексуальные рабыни (1) |
сектантский конфликт (1) | сектантство (1) | сектор за сигурност (1) |
сектор обороны и безопасности (1) | Сендайская рамочная программа (1) | Сендайская структура (1) |
серая зона (7) | Сербия (3) | сержант (1) |
сети (1) | сигурност (9) | сила (1) |
силовая политика (1) | силовики. (1) | силы безопасности (1) |
Силы обороны Венгрии (1) | симулации (1) | симулационни тренажори (1) |
симуляция (1) | Синефин (1) | синтетическая биология (1) |
Сирия (3) | система (1) | система безопасности (2) |
система за миграция/асимилация (1) | система сдержек и противовесов (1) | систематическая коррупция (1) |
системи за електронно обучение (1) | системи за подпомагане вземането на решения (1) | ситуационный анализ (1) |
Словакия (1) | Словения (1) | службы национальной безопасности. (1) |
служител с пагони (1) | смесената дигитална реалност (1) | соблюдение требований (1) |
Совет Европы (1) | совместимость (1) | совместное создание (1) |
совместный центр комплексирования (1) | Соединенное Королевство (1) | создание потенциала (1) |
создание способностей (1) | СОИ (3) | солидарность ЕС (1) |
Сомали (1) | соответствие (1) | соперничество великих сил (1) |
сотрудничество (8) | сотрудничество в области безопасности (1) | сотрудничество в разведке (1) |
сотрудничество НАТО-ЕС (1) | сотрудничество Россия-НАТО (1) | сотрудничество с США в сфере безопасности (1) |
социализм (1) | социална изолация (1) | социални мрежи (1) |
социальная структура (1) | социальные медиа (1) | социальные сети (2) |
соцсети (1) | Спектър на заплахи (1) | специализация (3) |
специальная военная операция (1) | сплоченность (1) | способности (8) |
способности за сигурност (1) | справляться (1) | сравнительное развитие (1) |
среда за управление на КПУ (1) | средства массовой информации (1) | стабилизационные миссии (1) |
стабилизация (3) | стабильность (2) | стандарт (1) |
стандарти за защита (1) | стандартни оперативни процедури (1) | статус наблюдателя (1) |
стойкость (3) | стохастична валидация (1) | стра¬тегический обзор обороны (1) |
стратегическа карта (1) | стратегическая коммуникация (3) | стратегические коммуникации (2) |
стратегические нарративы (1) | стратегические послания. (1) | стратегический диалог ЕС-США (1) |
стратегический менеджмент (1) | стратегический риск (1) | стратегическое планирование (1) |
стратегическое противоборство (1) | стратегическое сдерживание (1) | стратегическое управление (1) |
стратегия (8) | стратегия за развитие (1) | стратегия кибербезопасности (1) |
Стратегия национальной безопасности (1) | строительство институтов обороны (1) | строительство институционального потенциала (1) |
Строительство Оборонных Институтов (5) | структури за управление при кризи (1) | структурна реформа (1) |
структурная трансформация (1) | студенти (1) | субкультура (1) |
субъекты перемен (1) | суверенитет (2) | суверенитет Беларуси (1) |
Сун Цзы (1) | Сухарто (1) | сценарии (1) |
сценарии за планиране (1) | сценарий (1) | США (3) |
сътрудничество (1) | Таджикистан (1) | Тайвань (2) |
тайная полиция (1) | таксономия (2) | таксономия устойчивости (1) |
тактическое ядерное оружие (1) | Талибан (1) | Твиттер (1) |
теории лидерства (1) | теория (1) | теория игр (1) |
теория сложности (1) | теория сложности вычислений (1) | теория управления (1) |
терроризм (12) | террористическое государство (3) | тестове (1) |
техники (1) | техно-социални рискове и заплахи (1) | технологии (2) |
технология (1) | Тимор-Лешти (1) | толерантность (1) |
топ 10 актуални заплахи (1) | торговая политика (1) | торговля людьми (1) |
тоталитаризм (1) | трансгранично въздействие (1) | трансформация (2) |
тристълбова система за управление при бедствия (1) | триъгълник на противоречията (1) | Тунис (1) |
Турция (1) | угон автомобилей (1) | угроза радикализма (1) |
угрозы кибербезопасности (1) | уеб услуги (1) | Узбекистан (1) |
уйгуры (1) | Украина (17) | Украина7 (1) |
украинский кризис (1) | Украйна (2) | укрепване на отбранителни институции (1) |
укрепление доверия (1) | улучшение имиджа (1) | умения (1) |
Унгария (1) | университет (1) | управление (8) |
управление данными (1) | управление кадрами (2) | управление на проекти/програми (1) |
Управление при кризи (1) | уравновешивание (1) | условия (1) |
устойчи¬вость (1) | устойчивост (2) | устойчивость (11) |
устойчивость граждан (1) | устойчивость для мира (1) | устойчивость к конфликту (1) |
учебная программа (1) | учебные программы вуза (1) | учения (1) |
уязвимост (1) | уязвимости (3) | Федерированная информационная система для миссий (1) |
фейковые новости (1) | фирма (1) | формирование имиджа (1) |
Франция (1) | функции на сигурността (1) | функция (1) |
фьюжн центр (1) | хакери (1) | халифат (2) |
хибриден конфликт (1) | хибридна корпоративна мрежова система (1) | хорошее управление (1) |
Хофстеде (3) | Хуба Васс де Чезе (1) | цел (2) |
ценности (1) | централизация (2) | централизирана структура (1) |
Централна Азия (2) | Центральная Азия (2) | Центральная Европа (1) |
цены на удобрения (2) | цифровая грамотность (1) | цифровая ответственность (1) |
человеческое измерение (1) | Черна гора (1) | Черногория (2) |
Чёрное море (1) | черноморская безопасность (1) | Черноморский регион (1) |
Чехословакия (1) | Чечня (1) | Чешская Республика (1) |
членство (1) | Шанхайская организация сотрудничества (1) | Шелковый путь (1) |
Школа НАТО в Обераммергау (2) | экономическая дипломатия (1) | экономическая инфильтрация (1) |
экономические последствия (2) | экономический рост (1) | экономический след (1) |
экономическое НАТО (1) | экономическое принуждение (1) | экосистема (1) |
экспедиционные операции (1) | экстремизм (1) | электронное обучение (2) |
эмоциональная война (1) | энергетическая безопасность (1) | энергетическая геополитика (1) |
энергетическая зависимость (2) | энергетическая инфраструктура (1) | энергетический комплекс (1) |
энергоресурсы (1) | эскалация (1) | этика и государственная служба (1) |
эффективность (1) | Южная Африка (1) | Южная Корея (1) |
Южная Осетия (1) | Южный Кавказ (2) | язык ненависти (2) |
языковое обучение (1) | языковой национализм (1) | Япония (1) |
“Cost-Effec-tiveness” Analysis. (1) | „balance of consequences“ (1) | |