|
2013-2014 Action Plan (1) | 2020 Belarus protests (1) | 24/7 Network (1) |
24/7 сеть (1) | 2D simulation engine (1) | 3D (1) |
3D modeling (1) | 3D simulation (1) | 3D simulation engine (1) |
3D моделиране (1) | 3M-Conception (1) | A2/AD (2) |
Abkhazia (2) | Abu Bakr (1) | academic dishonesty (1) |
academic major (1) | academic network (1) | access control (2) |
access to information (1) | accident (1) | accountability (13) |
accreditation bodies (1) | ACCS (1) | acquisition (3) |
acquisition management (1) | acqusition (1) | action plan (2) |
Active Endeavour (1) | active measures (1) | Active Reserve (1) |
actor (1) | actors of change (1) | adaptability (1) |
adaptation (1) | adaptive control (1) | adaptive Doppler filtering (2) |
adaptive hybrid estimation (1) | adaptiveness (1) | Additional Protocol (1) |
ADKAR (1) | ADL (6) | advanced air capabilities. (1) |
advanced distributed learning (4) | Advanced Information Technology (1) | advanced persistent threats (1) |
advanced security assurance case (1) | Advanced Technology Demonstrations (1) | advantages (1) |
adversarial images (1) | advertisement (1) | aerodynamic (1) |
Afghanistan (3) | Africa (1) | agency (1) |
agent (1) | Agent Architecture (1) | agent models (1) |
agent of influence (1) | agent-based (1) | agent-based simulation (1) |
aggregated combat simulations (1) | aggression (2) | agility (4) |
agriculture (1) | AHP (2) | Ahrar al Sham (1) |
AI (4) | Air Doctrine (1) | Air Expeditionary Wing (1) |
air force capabilities (1) | Air Force Missions (1) | Air Force Modernisation (1) |
air force technologies (1) | Air Force Transformation (3) | air operations (1) |
Air power (1) | Air Situation Simulator (1) | aircraft motion models (1) |
airport (2) | airport security (2) | airpower (2) |
Airpower Model (1) | airspace (1) | airspace control authority (1) |
Al Qaeda (1) | al-Nusra (1) | Al-Qaeda (3) |
al-Qaeda in the Arabian Peninsula (1) | Al-Qaeda in the Islamic Maghreb (1) | al-Qaida (1) |
al-Shabaab (1) | alarm receiving system. (1) | Albania (2) |
Aleksandr Lukashenka (1) | algorithmic noise (1) | allied operations (1) |
Alternative futures (2) | alumni (1) | ambiguity (1) |
Amniyat (1) | analysis (3) | Analysis of Alternatives (2) |
analysis tool (1) | analytical hierarchy process. (1) | and post-crisis operations. (1) |
and threats; system approach to security systems’ functional aspects analysis (1) | Anglo-Saxons (1) | annexation (1) |
anomaly (1) | anomaly detection (1) | anonymity (2) |
ANSSI (1) | anti-access (1) | anti-corruption (1) |
antiquities (1) | antiterrorist operation (1) | antivirus software. (1) |
anyplace (1) | anytime (1) | Apartheid (1) |
applied competences (1) | AQ (1) | AQAP (1) |
Arab Spring (2) | architectural models (1) | architecture (3) |
Architecture for Model Integration (1) | Arctic (1) | area denial (1) |
argumentative negotiation (1) | armaments planning (1) | armed conflict (1) |
armed forces (7) | armed forces modernization (1) | Armed Forces transformation (3) |
arms control (2) | army (1) | art (1) |
artificial immune systems (1) | artificial inteligence (1) | artificial intelligence (12) |
artificial neural networks (1) | artillery (1) | ASAC (1) |
ASCE plug-in (1) | ASEAN (1) | aspect-based sentiment analysis (1) |
assemblage (2) | assessment (3) | assets (1) |
assignment (1) | assignments (1) | Assumption-based Planning (1) |
assurance level. (1) | Assurance Method (1) | assurance requirements (1) |
asylum (1) | asymmetric cryptosystems (1) | asymmetric response (1) |
Asymmetric Threats (2) | attack (1) | attack surface parameters (1) |
attack-surface (1) | attacks against IoT. (1) | attribute data processing (1) |
attribution (2) | attribution theory (2) | atypical employment (1) |
audio (1) | audit (2) | auditing (1) |
augmented reality (1) | authenticated encryption (1) | authentication (6) |
Authoring tools (1) | authoritarianism (2) | authorization (1) |
auto-encoding (1) | automated design (1) | automated learning (1) |
automated management system (1) | Automatic identification system (1) | automatic translation (1) |
automation (2) | automaton (1) | Autonomous guided vehicles. (1) |
autonomous platform (1) | autonomy (1) | availability (1) |
awareness (5) | awareness based training (1) | awareness-raising (1) |
Ayman al-Zawahiri (1) | Azerbaijan (1) | B-61 (2) |
B-method (1) | bachelor program (1) | balance (2) |
balance of consequences (1) | balance of threat theory (1) | balanced scorecard (8) |
Balkan Region (1) | Balkans (2) | ballistic missile (1) |
Baltic Battalion (1) | Baltics (1) | bank card (1) |
bank clearing (1) | Barack Obama (2) | Bayesian algorithms (1) |
Bayesian Decision-Making (1) | behavioural model (1) | behavioural patterns (1) |
Belarus (1) | Belarus-Russia relations (1) | Belarusian sovereignty (1) |
Belarusian statehood (1) | belief functions (2) | benchmark (1) |
benefits (1) | BI (1) | bias (1) |
big data (8) | bilinear Pairing (1) | BIN (2) |
binary relation (1) | bio-integrated systems (2) | bio-terrorism (1) |
Biological weapons (1) | biomedical ethics (1) | Biometric (2) |
biometric identification (1) | biometric system (1) | BIOS (1) |
biosecurity (1) | Black Sea (6) | Black Sea region (2) |
Black Sea security (3) | Black Swan theory (1) | Blacklists (1) |
BlackSeaFor (2) | Blind Signature (1) | block chain (1) |
block cypher (1) | Block Truncation Coding (1) | blockchain (3) |
Blurring Borders between External and Internal Security (1) | Boko Haram (2) | Boolean Algebra (1) |
border crossing (1) | border security (1) | borders (1) |
Bosnia (1) | Bosnia and Herzegovina (2) | botnet (1) |
Britain (1) | Browser Indicators (1) | Budapest Convention (1) |
budget (1) | budget transparency (2) | Budget Transparency Initiative (1) |
budgeting (3) | budgeting. (1) | Building Integrity (1) |
Bulgaria (9) | Bulgarian Armed Forces (2) | Bulgarian universities. (1) |
Bulgaria’s defence reform (1) | business model (1) | business risk (1) |
business-critical infrastructure (1) | C2 (1) | C2 capabilities (1) |
C2 management (1) | C2 principles (1) | C2IS (1) |
C3 (1) | C4 (1) | C4 project management (1) |
C4I (3) | C4I systems (3) | C4ISR (5) |
C4ISR Architecture (1) | C4ISR capabilities (1) | C4ISR Structural Approach (1) |
C4ISR systems; operational (1) | caliphate (1) | caliphate; internet; ISIS; radicalization; relational development; social media; terrorism; Twitter (1) |
CALL (2) | CAM (1) | campaigns (1) |
CAOC (1) | capabilities (9) | Capabilities Development (1) |
capabilities-based assessment (1) | capabilities-based defense planning (1) | capabilities-based planning (3) |
capability (2) | Capability Assessment Methodology (1) | Capability costing (1) |
capability delivery (1) | capability development (5) | Capability Discussion Matrix (1) |
capability divelopment (1) | capability gaps (1) | capability maturity models (1) |
capability portfolio (1) | capability prioritization (1) | capability requirements review (1) |
capacity (1) | capacity building (2) | capture the flag (1) |
case study (1) | CASoS (1) | Catastrophe Loss Models (1) |
Caucasus (3) | cause-effect relation (1) | CAX (9) |
CAX Management environment (1) | CBRN (1) | CBRNE (1) |
CCIS (1) | CCNA Security curriculum (1) | CCP (1) |
CDMA (1) | cellular automata (1) | cellular automata model of conflict (1) |
cellular communications (1) | Central Asia (8) | Central Europe (1) |
Central Ukrainian Uranium Province (1) | centralisation (2) | centralised organisation (1) |
centralized management (1) | Centre of Excellence (1) | centre of gravity. (1) |
CERT (3) | certification (1) | certification authority (1) |
certification program (1) | CFACC (1) | CFE (1) |
Chad (1) | challenge-response (1) | challenges (2) |
change management (4) | chaos (1) | Character Segmentation (1) |
characteristics (1) | charge back (1) | Charter of the United Nations (1) |
Chechnya (1) | checks and balances (1) | chemical elements migration (1) |
chemical weapons (1) | Chief Information Officer (2) | child abuse material (1) |
China (13) | China military leadership (1) | Chinese Communist Party (1) |
cholera (1) | CIED (2) | CIIP; security; cyber threats; conventional vs. IT-related security threats; infrastructure vulnerability; CIIP R&D; network society. (1) |
CIMIC (1) | CIO (2) | CIO Responsibilities (1) |
CIO Roles (1) | CIP (3) | CIRC (2) |
Cisco Systems’ courses (1) | citizen resilience (1) | civ-mil coordination (3) |
civil assistance (1) | Civil Emergencies (1) | Civil protection (7) |
civil rights (1) | Civil Security (3) | civil society (4) |
civil society organizations (1) | civil society; policy (1) | Civil to Military cooperation and integration (1) |
civil watchdogs (1) | civil-military (1) | Civil-Military Combination Strategies (1) |
civil-military cooperation (4) | Civil-military interaction (1) | Civil-Military Interoperability (5) |
Civil-military relations (5) | civil-military teachers (1) | civilian aspect of diplomacy (1) |
civilian control (3) | civilian oversight (1) | civilians (1) |
CJTF (1) | classification (3) | classroom (1) |
Clausewitz (1) | client-server complexes (1) | client/server. (1) |
climate (1) | climate change (4) | cloud (1) |
Cloud computing (4) | cloud environment (1) | cloud technologies (1) |
cloud testing (1) | cluster (1) | clustering (1) |
Clustering algorithm (2) | clustering method (1) | clustering with outliers (1) |
clusters (1) | cluttered environment (1) | CNO (1) |
CNO; malicious computer-mediated activities; interdependencies created by network-based power; private sector - government cooperation; IT-related security regimes. (1) | CNOs (1) | co-creation (1) |
co-reference resolution (1) | coalition (2) | coalition aerospace operations center (1) |
coalition ATO (1) | coalition command and control (1) | coalition interoperability (1) |
Coalition operations (2) | coastal areas risks (1) | coastal cellular coverage (1) |
code of conduct (2) | code of ethics (1) | coding (1) |
cognitive (2) | Cognitive Approach (1) | cognitive aspects (1) |
Cognitive attack (1) | cognitive bias (1) | cognitive hacking (1) |
Cognitive Modeling (1) | cognitive visualization (1) | cognitive warfare (1) |
coherence (1) | cohesion (1) | cold boot (1) |
Cold War (2) | collaboration (3) | collaboration-oriented architecture (1) |
collaborations (1) | collaborative decision-making (1) | collaborative development (1) |
collaborative learning (1) | collaborative network organisation (2) | Collaborative Network Organization (2) |
Collaborative Network Organizations (2) | collaborative networked organisation (1) | Collaborative Networked Organisations (1) |
collaborative networks (1) | collaborative work (1) | collective security (1) |
collective West (1) | com-parative analysis (1) | Combat Potential (1) |
Combination rules (1) | combined operation (1) | Combined Operations (1) |
ComBlackSeaNavMet (1) | Command & Control (1) | command and control (12) |
Command and Control Information Systems (1) | Command and control technologies (1) | Command Post Exercise (2) |
commissioned officer (1) | common cause failures (2) | common challenges (1) |
common criteria. (1) | Common Foreign and Security Policy (1) | common funding (2) |
Common Security and Defence Policy (2) | common threat perception (1) | communication (3) |
communication technology (1) | communication-content capabilities (1) | Communications (5) |
Communications and Information Systems (1) | community (1) | company (1) |
comparative analysis (1) | comparative development (1) | comparative legal analysis (1) |
competence (1) | competence development (2) | competence framework (1) |
competencies (2) | competition (2) | competition continuum (1) |
complex adaptive systems (1) | complex crisis situations (1) | complex dynamic systems (1) |
Complex man-machine systems (1) | complex systems (1) | Complex systems; object-modelling techniques; monitoring (1) |
complexity (3) | complexity studies (1) | complexity theory (2) |
compliance (2) | compliant motion (1) | composite cyber risk (1) |
Comprehensive approach (14) | Comprehensive Approach. (1) | comprehensive approach (1) |
Comprehensive security (2) | comprehen¬sive approach (1) | Computation Node (1) |
Computational Intelligence (1) | computational propaganda (1) | Computer Aided Dispatch (1) |
computer aided exercises (CAX). (2) | Computer Assisted eXercises (1) | Computer Assisted Exercises (CAX) (2) |
Computer generated forces (2) | computer graphics (1) | computer networks (2) |
computer security (2) | computer systems reliability (1) | Computer Virology (1) |
computer-assisted language learning (1) | Computing Laboratory (1) | concept (3) |
Concept Development & Experimentation (1) | Concept Development and Experimentation (1) | conceptual (1) |
Conceptual model (1) | Conceptual Research Oriented Combat Agent Distillation Implemented in the Littoral Environment (1) | Conference Key Distribution System (1) |
confidence building (2) | confidence- and security-building measures (1) | confidence-building (1) |
confidentiality (1) | conflict (11) | Conflict management (1) |
conflict modeling (1) | conflict modelling (1) | conflict resilience (1) |
conflict resolution (1) | Conjunctive rule (1) | CONOPS (1) |
consolidation (1) | Consortium. (1) | conspiracy theories (1) |
Constraint Satisfaction/Propagation (1) | construction (2) | constructive roles (1) |
contact point (1) | content analysis (1) | content monitoring system (1) |
context (2) | context scenario (2) | context scenarios (1) |
context translation (1) | contextual scenario (1) | Continuous DSmT (1) |
contract management (1) | contribution (1) | control (1) |
control system (2) | Convention on the Prevention of Terrorism (1) | conventional conflict (1) |
conventional forces (1) | convergence (1) | convex combination (1) |
con¬trol (1) | Cookies (1) | cooperation (19) |
Cooperative Defence Projects (1) | Cooperative development team (1) | cooperative procurement (2) |
cooperative security (2) | coordination (8) | coping (1) |
Copy attack (1) | copyright (1) | Copyright Protection Scheme (1) |
corona virus (1) | correlation infrastructure (1) | corrupt government (1) |
corruption (13) | corruption effects (1) | corruption factors (1) |
corruption networks (1) | cost effectiveness (1) | Cost Module (1) |
cost-effectiveness (1) | costing (1) | COTS (1) |
COTS software (1) | Council of Europe (1) | counter-cyberterrorism (1) |
counter-intelligence (1) | Counter-terrorism (6) | counterbalance (1) |
countering hybrid threats (1) | countering violent extremism (1) | counterinsurgency (2) |
counterintelligence (1) | Counterterrorism (9) | coupling factors (1) |
coverage radius (1) | Covid 19 (1) | COVID-19 (31) |
Covid-19 pandemic (2) | COVID19 (1) | creating profiles (1) |
creative law (1) | credit card. (1) | Creeping Dissolution of the Monopoly of National Power (1) |
crew training (1) | crime (1) | crime of aggression (1) |
crime-terror nexus (1) | Crimea (3) | criminal activity (1) |
criminal business (1) | crises (2) | crisis (6) |
crisis generalized net (1) | crisis management (22) | crisis management architecture (1) |
crisis management operations (1) | crisis management strategy (1) | crisis management structures (1) |
crisis management. (1) | crisis operations (1) | crisis plans (1) |
Crisis Response (1) | crisis response operations (1) | criteria for non-flammability (1) |
critical energy infrastructure (1) | critical energy infrastructure protection (2) | critical information infrastructure (2) |
Critical Information Infrastructure Protection (3) | Critical Infrastructure (21) | Critical Infrastructure Protection (7) |
critical infrastructure; Critical Infrastructure Protection; comprehensive security; security policy; coordination; collaboration (1) | Critical infrastructures (2) | critical infrastruc¬ture (1) |
critical junctures (1) | Critical Success (1) | critique (1) |
CROCADILE (1) | cross-border resiliency (1) | cross-cultural comparison (1) |
cross-domain coercion (2) | cross-impact (1) | cross-sectoral approach (1) |
cryptanalysis (1) | cryptocurrency (1) | cryptographic keys generation (1) |
cryptographic software (1) | cryptography (12) | cryptography protocols (1) |
CSBMs (1) | CSDM Views (15) | CSDP (3) |
CSOs (1) | CSTO (1) | CTF (1) |
cultural environments (1) | culture (6) | curriculum (3) |
Customer Relationship Management (1) | cyber (4) | Cyber Aggregator (1) |
cyber arms race (1) | cyber attack prevention (1) | cyber attacks (2) |
cyber confidence-building measures (1) | cyber conflict (1) | Cyber defence (8) |
cyber defense (2) | cyber digital skills (1) | cyber diversity (1) |
cyber domain (3) | Cyber Ecosystem (1) | cyber education cybersecurity education cyber range serverless faas (1) |
cyber hygiene (1) | cyber maturity (1) | cyber model (1) |
cyber operations (8) | cyber picture (1) | cyber protection (1) |
cyber range (6) | cyber range platform (1) | cyber research exercises (1) |
cyber resilience (7) | cyber risk (2) | cyber risk assessment (1) |
cyber risks (2) | cyber security (20) | Cyber security community (1) |
cyber security culture (1) | Cyber Situational Awareness (1) | cyber skills (1) |
cyber space (1) | cyber systems (1) | cyber technologies (1) |
cyber threat (2) | cyber threat information sharing (1) | cyber threat intelligence (1) |
cyber threats (12) | cyber training (1) | cyber war (3) |
cyber warfare (3) | cyber warfare; morphology; human mind as target; neocortical warfare; information attacks; international law. (1) | cyber-energy nexus (1) |
Cyber-physical system (1) | cyber-physical systems (2) | cyber-social vulnerabilities (1) |
cyber-terrorism (1) | CyberAggregator (1) | cyberat-tack (1) |
cyberattack (7) | cyberattacks (2) | cybercrime (12) |
cybercrime roles (1) | cyberpace (1) | Cyberse-curity (1) |
Cybersecurity (86) | Cybersecurity Act (1) | cybersecurity areas (1) |
cybersecurity attitude (1) | cybersecurity awareness (1) | cybersecurity behaviour (1) |
cybersecurity challenges (1) | cybersecurity community (1) | cybersecurity competence network (1) |
cybersecurity controls (1) | Cybersecurity culture (1) | cybersecurity cyberattacks scenario space capability requirements (1) |
cybersecurity ecosystems (1) | cybersecurity ethics (1) | cybersecurity governance (1) |
Cybersecurity Innovation (1) | cybersecurity knowledge (1) | cybersecurity management practices (1) |
cybersecurity maturity assessment (1) | cybersecurity mesh (1) | cybersecurity organisation (1) |
cybersecurity platform (1) | cybersecurity policy (1) | cybersecurity policy private sector citizens’ contribution prevention (1) |
cybersecurity program (1) | cybersecurity questionnaire (1) | cybersecurity resilience research management Bulgaria (1) |
cybersecurity skills (1) | cybersecurity standards (1) | cybersecurity strategy (4) |
cybersecurity system (1) | cybersecurity taxonomy (1) | cybersecurity threats (2) |
cybersecurity training (1) | cybersecurity training methodology (1) | cybersecurity transcedents (1) |
cyberspace (10) | cyberterrorism (3) | cyberwar (3) |
Cyberwar; information society; risk perception; risk society; cyber risks: physical vs. virtual; US policy response; cyber attacks; critical information infrastructures; information warfare; public-private sector partnership. (1) | cyberwarfare (1) | Cynefin (1) |
CyRADARS (1) | Czech Republic (2) | Czechoslovakia (2) |
daily human needs (1) | dark web (1) | DAT (1) |
data aggregation (1) | data analysis (1) | data centre (1) |
data collection (1) | data engineer (1) | data engineering (1) |
Data Fusion (3) | Data governance (1) | Data Hiding (1) |
data loss (1) | data mining (4) | Data Modeling (1) |
data platforms (1) | data privacy (1) | data processing; target tracking; adaptive estimation; linear prediction (1) |
data protection (1) | data range (1) | data science (2) |
data science as a service (1) | Data/User Privacy (1) | database (1) |
database-as-a-service (1) | Dayton Agreement (1) | DBSCAN (1) |
DCAF (3) | DDoS attacks (1) | de-globalization (1) |
de-perimetrization (1) | decentralized data platforms (1) | decentral¬ized management (1) |
deception (1) | deception operations (1) | Decision Analysis (1) |
decision making (2) | Decision Support (7) | decision support system (2) |
decision support systems (2) | Decision-making (5) | Decision-making process (2) |
Decision-making. (1) | decision-support (1) | dedovshchina (1) |
deductive approach (1) | DEEP (3) | deep learning (2) |
defects (1) | defence (7) | defence acquisition (2) |
defence against terrorism (2) | defence and security (1) | defence and security policy (1) |
defence audit. (1) | defence budget (3) | defence budgeting (1) |
defence capabilities (5) | Defence capability (1) | defence capabilities (1) |
defence ecosystem (1) | defence expenditure (1) | defence expenditures. (1) |
Defence governance (2) | defence industry (1) | defence institution building (2) |
defence institution building. (1) | defence management (4) | defence planning (5) |
Defence Planning Procedure (1) | defence polic defence planning (1) | defence policy (11) |
defence policy model (1) | defence policy review (1) | Defence procurement (2) |
Defence reform (3) | Defence resource management (3) | defence resources (1) |
Defence Sector (3) | defence spending (1) | defence staff (1) |
Defence Support to Civilian Authorities (3) | defence transformation (1) | defense (4) |
defense acquisition (3) | defense acquisition management (1) | defense and security sector (1) |
defense capabilities initiative (1) | defense capability (1) | defense cooperation (1) |
defense economics (1) | Defense Education Enhancement Program (1) | defense industrial complex (1) |
defense industrial policy (1) | Defense Information infrastructure (1) | defense innovation (1) |
Defense Institution Building (6) | defense management (1) | defense planning (1) |
defense planning process (1) | defense planning risks (1) | defense policy (1) |
Defense policy; Foresight-based defense planning; Scenario; Drivers; Defense expenditures (1) | defense politics (1) | Defense procurement (1) |
defense procurement policy (1) | defense R&D. (2) | defense reform (4) |
Defense reorganization (1) | Defense resource management (1) | Defense Resource Management Model (DRMM) (1) |
defense resource program management (1) | defense sector reform (1) | defense support to civilian authorities (2) |
delegated transactions (1) | deliberate planning (1) | democracy (3) |
democratic control (3) | democratic governance (1) | democratic oversight (2) |
democratic resilience (1) | democratization (1) | demographics (1) |
Dempster-Shafer (1) | Dempster-Shafer theory (1) | Dempster’s rule (1) |
denial (1) | dependability indicators (1) | Dependable Computing System (1) |
dependency parsing (1) | deployable air force packages (1) | design (2) |
Design of information security systems (1) | desk research (1) | destructive roles (1) |
determinant (1) | deterministic computer model (1) | deterministic scenario (1) |
Deterrence (9) | deterritorialization (1) | developing countries (1) |
development (1) | development program (1) | development strategy (1) |
Dezert-Smarandache Theory (1) | defense capabilities (1) | diagnostic (1) |
DIB (3) | diceware passphrase (1) | Diffie-Hellman algorithm (1) |
DIGILIENCE (1) | digital citizenship (1) | Digital Competences (2) |
digital development (1) | digital disruption (1) | Digital divide; civil society; global governance decision-making; grass-roots empowerment; plurality of voices (1) |
digital forensics (2) | digital future (1) | digital healthcare (1) |
digital image processing (1) | digital learning infrastructure (1) | digital literacy (1) |
digital signature (1) | Digital Signature. (1) | digital terrain elevation data (1) |
digital transformation (11) | Digital Twin (1) | digitalization (1) |
digitization (1) | diplomacy (1) | direct energy (1) |
direct participation (1) | Direct Task (1) | Directorate for Emergency Management (1) |
disadvantages (1) | disarmament (1) | Disaster (2) |
Disaster Management (2) | disaster preparedness (9) | disaster relief (1) |
disaster response (13) | disaster risk (2) | disaster risk management (1) |
Disaster Scenario (1) | disasters (1) | discourse (1) |
discrete dynamic optimization. (1) | Discrete Logarithm Problem (1) | Discrete Logarithm. (1) |
disinformation (7) | Disintegration (1) | displaced women (1) |
disputed territory (1) | dissemination (1) | Distance course (1) |
distance learning (5) | distance learning systems. (1) | distant work (1) |
distinction (1) | Distributed Computing. (1) | distributed information systems (1) |
Distributed interactive simulation (DIS) (1) | distributed learning (2) | distributed ledger technology (1) |
distributed sensor networks (1) | distributed simulation (3) | distributed systems (1) |
Distributed Technical Knowledge Representation (1) | diversification and optimization (1) | diversity (1) |
DLP (2) | DMA (1) | doctrinal limitations (1) |
doctrine (2) | Document Exchange. (1) | document system (1) |
DoD Architecture Framework (2) | DODAF (2) | domestic operations (1) |
Donbas (1) | Douglas-Peucker algorithm (1) | DRA (1) |
drill (1) | driver dimension (1) | DRIVER+ (1) |
DRM (1) | drone (1) | drone signature (1) |
drones (2) | drug trafficking (1) | DSm model (1) |
DSm rule of combination (1) | DSm theory (1) | DSmT (3) |
DSS (1) | DST (1) | DT coverage (1) |
Dual Capable Aircraft (1) | dual use (1) | Dual use information systems; regulation; computer network operations (1) |
dual-use technology (1) | Dubois-Prade’s rule (1) | dynamic analysis (1) |
Dynamic Identity (1) | dynamic modelling (1) | Dynamic Programming (2) |
Dynamic programming. (1) | dynamic risk assessment (1) | dynamics (1) |
dynamics of conflict (1) | E&T (1) | e-Government (4) |
e-Government. (1) | e-learning (10) | e-learning systems (1) |
E-MAF (1) | E-Mail (2) | e-payment (1) |
e-Platform (2) | e-signature (1) | E-skills (1) |
e-Voting. (1) | early warning (3) | early warning system (3) |
Early Warnings (1) | earthquake hazard (1) | earthquake safety (1) |
earthquake scenario. (1) | Eastern Europe (4) | Eastern Flank (4) |
ECHO (1) | ECHO project (7) | ECI (1) |
Economic Analysis (1) | economic and social development (1) | economic coercion (1) |
economic crisis (2) | economic diplomacy (1) | Economic Evaluation of Alternatives (1) |
economic footprint (3) | economic growth (1) | economic impact (2) |
economic infiltration (1) | Economic issues (1) | economic NATO (1) |
economic recovery (1) | ecosystem (2) | ecosystem approach (1) |
ECURIE (1) | EDA. (1) | Editorial (1) |
EDRIM (1) | Education (6) | education & training (2) |
education and training (2) | Education of Maritime Personnel (1) | educational system (2) |
educational technologies (1) | EEoA (1) | Effect-Based Operations (1) |
Effect-based operations; battlespace; understanding (1) | effectiveness (7) | Effects and Criticality Analysis (1) |
efficiency (9) | Egypt (2) | EKS (1) |
eLearning platform (1) | electromagnetic emission. (1) | Electronic Payment Systems (1) |
Electronic tender (1) | Electronic Voting. (1) | Electronic Warfare (2) |
ElGamal digital signature (1) | ElGamal Public Key Crypto-System (1) | Elliptic Curves (1) |
Embedded Digital Identity (1) | emergency management (5) | Emergency Management Architecture (1) |
Emergency Management Information System (1) | Emergency Management Scenarios (1) | Emergency Notification and Alert System for the Danube River Basin (1) |
emergency operation center (1) | emergency planning and response (1) | emergency preparedness (1) |
Emergency Response System (1) | emergency situations (1) | Emerging Security Challenges (1) |
emerging technologies (1) | emotional warfare (1) | emotions mining (1) |
empirical analysis (1) | EMU (1) | Encrypted Data (1) |
encryption (1) | energy dependence (2) | Energy geopolitics (1) |
Energy Grid (1) | energy infrastructure (1) | energy mix (1) |
energy reserves (1) | energy resources (1) | energy sector (1) |
energy security (4) | ENISA (2) | enrolment phase (1) |
enterprise (1) | Enterprise Architecture (3) | enterprise management system (1) |
entrepreneurship skills (1) | Entropy (2) | environmental analysis (1) |
Environmental Protection (1) | Environmental safety (1) | erosion (1) |
ERP (1) | escalation (1) | ESDP (2) |
essential services (2) | ESSO (1) | establishment (1) |
estimates (1) | Estonia (1) | Ethereum (1) |
Ethical AI (1) | Ethics (3) | ethnic conflict (1) |
eth¬ics and public service (1) | EU (8) | EU cybersecurity (1) |
EU decision-making (1) | EU Directive 114/2008 (1) | EU framework (1) |
EU global strategy (1) | EU integration (2) | EU missions (1) |
EU security (1) | EU security research (1) | EUAM (2) |
EUCIP (1) | Eurasian Union (1) | Euro (1) |
Europe (3) | European conflict (1) | European Counter Terrorism Center (1) |
European Court of Human Rights (1) | European Critical Infrastructure Protection (1) | European defence (1) |
European defence technological and industrial base (1) | European intelligence community (1) | European project (1) |
European Security (3) | European Security. (1) | European states (1) |
European Union (17) | European-MENA partnerships (1) | Europol (2) |
evaluation (2) | evaluation criteria (1) | evaluation process (1) |
event management (1) | evidence (1) | evidence reasoning (1) |
Evidence Theory (1) | evolution of Mexican intelligence (1) | Evolution of modelling (1) |
evolutionary development. (1) | evolu¬tion of software (1) | exchange of information (1) |
exercise (2) | exercises (2) | exercising (1) |
expanded medical infrastructure vulnerability index (1) | expected annual lose (1) | expected loss levels (1) |
expeditionary air capabilities (1) | expeditionary operations (1) | experimentation (1) |
expert assessment (3) | expert systems (1) | Experts fusion (1) |
exploitation (1) | Extensible knowledge space (1) | external intelligence (1) |
extraction (1) | Extreme Value Theory (1) | extremism (1) |
Factor (1) | Failure Modes (1) | failures (1) |
fair level of PQoS (1) | fake news (2) | False Negatives. (1) |
False Positives (1) | farming (1) | fascist (1) |
fault-tolerant architectures (1) | feature selection (1) | Federal Republic of Yugoslavia (1) |
federated (1) | federated identity confidentiality (1) | Federation Development and Execution Process (FEDEP) (1) |
Ferghana (1) | fertilizer prices (2) | field command and control (1) |
fifth column (1) | fight against corruption (1) | fighter aviation (1) |
fighting terrorism (1) | file name obfuscation (1) | filtering (1) |
fin mixer (1) | Financial Center (1) | financial management (1) |
financial scenarios (1) | financial security (1) | financial transactions (1) |
Finland (1) | fire support (1) | firewall (1) |
first responders (1) | first responders’ community (1) | flights (1) |
flood (1) | flood fighting (1) | flood hazard modeling. (1) |
flood protection (1) | flooding (1) | floods (2) |
FMECA (1) | FOCUS (1) | FOCUS project (1) |
food crisis (1) | footwear impressions (1) | Force Development (2) |
force development view (1) | Force Goals. (1) | Force Information Infrastructure (1) |
Force Management (2) | force management system (1) | force modernization (3) |
Force Module (1) | Force planning (5) | force protection standards (1) |
force structure (2) | force structuring (1) | Forecasting (2) |
foreign agent (1) | foreign fighters (3) | foreign influence operations (1) |
foreign investment (1) | foreign policy (5) | foreign relations (1) |
foreign terrorist fighters (1) | Forensic Facial Reconstruction (1) | foresight (8) |
foresighting digital futures (1) | Formal methods (2) | Formal Task (1) |
formalization (1) | former Soviet Union (1) | forward presence (1) |
Forward secrecy (1) | fractal clustering. (1) | Fractal Dimension (1) |
fractal triangle (1) | fragmentegration (1) | framework (3) |
frameworks (1) | framing (1) | France (2) |
fraternal people (1) | Fraud Detection (1) | Free-Text Processing (1) |
frozen conflict (2) | FTP (2) | full-scale invasion (3) |
functional capability (1) | Functional Safety (1) | Functional-Architectural Model. (1) |
functionalities (1) | fundamental rights (1) | fusion doctrine (1) |
fuzzy commitment scheme (1) | fuzzy control (3) | fuzzy controller (1) |
Fuzzy Logic (4) | Fuzzy operators (1) | fuzzy routing. (1) |
Fuzzy sets (2) | Gaddafi (1) | Game Theory (1) |
Gaming (1) | Gamma Methodology (2) | Gap Diffie-Hellman Groups (1) |
Garbled Circuits (1) | GCA (1) | GDPR Directive (1) |
gender (1) | gender attitudes (1) | gender equality (1) |
gender inequality (1) | gender-sensitive approach (1) | Generalised Security Research System (1) |
Generalized Chinese Remainder Theorem (1) | generalized input estimation (1) | generalized landscape of significance (1) |
generalized net (1) | generalized nets (2) | Genetic Algorithms (2) |
genetic code (1) | genocide (2) | Geodynamic risk mapping (1) |
geoeconomic threats (1) | geoeconomics (1) | Geomorphology (1) |
geopolitical implications (1) | geopolitical stability (1) | geopolitical tensions (1) |
geopolitics (4) | Georgia (6) | geotechnical zonation (1) |
Germany (1) | Germany migration (1) | GHE (2) |
GIS (4) | GIS. (1) | glider (1) |
global actor (1) | global crisis (1) | global governance (1) |
Global Health Engagement (2) | global hybrid terrorism (1) | global power dynamic (1) |
global security (1) | Global South (2) | global technological development (1) |
global trends (1) | globalisation (1) | globalization (3) |
GMDSS (1) | goals (2) | gold standard (1) |
Good governance (7) | good practices (1) | governance (18) |
governance consulting (2) | governance design (1) | governance functions (1) |
governance management (1) | governance model (2) | GPKI (1) |
GPS (1) | GPS tracker (1) | grain deal (1) |
graph model (1) | graph theory (1) | gray zone (4) |
GRCA (1) | great power (1) | great power competition (3) |
great powers (1) | grey zone (3) | grey zone activities (1) |
Grid Computing (1) | grid map (1) | Group decision-making (1) |
GroupWare (2) | GSM (1) | Guatemala (1) |
guerrilla (1) | Guessing attack (1) | hackers (2) |
Hague Conventions (1) | HAL (1) | handling patterns (1) |
hard power (1) | hardware-in-the-loop simulators (1) | harm (1) |
harmonization (1) | harvesting routes (1) | hate speech (1) |
hazard assessment (1) | health security (1) | healthy ageing (1) |
heuristic algorithm (1) | Heuristics. (1) | hierarchical form (1) |
High Level Architecture (2) | high-performance computing (1) | high-resolution tactical simulations (1) |
higher education (4) | Historical earthquakes (1) | historical institutionalism (1) |
historical unity of Russians and Ukrainians (1) | history (1) | HLA (1) |
HLS (1) | Hofstede (3) | Hofstede matrix (1) |
homeland defense (1) | homeland security (4) | honeypot (4) |
Horizon 2020 (1) | Hostage Rescue Operations (1) | hot plug (1) |
Hough Transform (1) | house wives (1) | HQ training (1) |
Huba Wass de Czege (1) | human capital development (2) | human dignity (1) |
Human dimension (1) | human effects (1) | human factor (3) |
human factors (8) | human mobility (1) | human resource management (3) |
human resources management (1) | human rights (6) | Human Safety (1) |
Human Security (2) | Human System (2) | human trafficking (1) |
Humanitarian Assistance (1) | humanitarian intervention (1) | humanitarian operations (2) |
humanitarian-assistance scenarios (1) | Hungarian Defence Forces (1) | Hungary (3) |
Hurricane Katrina (1) | hybrid attacks (1) | hybrid cloud (1) |
hybrid conflict (1) | Hybrid Enterprise Network System (1) | hybrid estimation (1) |
hybrid IDS (1) | hybrid influence (2) | hybrid operations (2) |
hybrid resilience (1) | Hybrid Security (1) | hybrid system estimation (1) |
hybrid systems (1) | Hybrid threat (2) | Hybrid threats (26) |
hybrid threats hybrid war interdependence whole-of-society approach resilience (1) | hybrid threats; conflict; resilience; deterrence; strategy (1) | hybrid threats; hybrid war (1) |
hybrid war (10) | hybrid warfare (25) | hybrid-messianic aggression (1) |
hyper-power set (1) | hypersonic weapons (1) | I&C (1) |
ICT (1) | ICT competences (1) | ICT infrastructure (1) |
ICT Personnel development (1) | ICT security (1) | ICT taxonomies (1) |
ICT technologies (1) | Identification (1) | identification/assessment techniques (1) |
ideologeme (1) | ideology (2) | IDS dataset (1) |
IED (1) | Illegal Behavior (1) | illegal economy (1) |
illegal formations (1) | illegal migration (2) | illegal trafficking (1) |
image classification (1) | image formation (1) | image reparation (1) |
Image statistical analysis (1) | IMECA (1) | IMM estimator (1) |
IMM tracking filter design (1) | immediate action (1) | impact (3) |
impact assessment (1) | imperfect information (1) | imperial role (1) |
Implementations (1) | importance (1) | Improvised Explosive Devices (1) |
in-depth protection (1) | incident (1) | incident command post (1) |
incident commander (1) | Incident Management (1) | incident response (2) |
India (2) | indicator (1) | indicators (1) |
Indo-Pacific (4) | Indonesia (1) | inductive approach (1) |
industrial capacity (1) | industrial catastrophes (1) | industrial control system (1) |
industrial control systems (1) | Industrial Internet (1) | Industrial IoT (1) |
industrial pollutants (1) | industrial relations (1) | industry (2) |
industry 4.0 (3) | inequalities (1) | inertial navigation sensor (1) |
infantry (1) | influence (2) | Infogate (1) |
Informal knowledge integration (1) | Information (4) | information and communication technologies (1) |
information and communications technologies (1) | information assurance (5) | information campaign (1) |
information environment (1) | information exchange gateways (1) | information flow (1) |
Information Fusion (3) | information goods (1) | information infrastructure vulnerability (1) |
Information interoperability (1) | information load (1) | Information Management (1) |
information operation recognition (1) | information operations (6) | information quality (1) |
Information Security (21) | information security management (2) | information security of the state (1) |
information security policy (1) | information security programme (1) | information security standards (1) |
information services (1) | information sharing (10) | information sharing models (1) |
Information society (2) | information summarization (1) | information support (1) |
Information System (3) | information system security (1) | information systems (1) |
Information Systems Support (1) | Information systems vulnerability; hacking; hackers; IT-security; critical societal infrastructure. (1) | information technologies (1) |
information technology (2) | information technology impact (1) | information threats (1) |
information trauma (1) | information visualization (1) | Information warfare (6) |
information warfare. (1) | informational warfare (1) | informers (1) |
infrastructure (1) | infrastructure with significant reach (1) | inherent structural threats (1) |
INMARSAT-C (1) | innovation (7) | innovation management (2) |
innovative warfare (1) | input estimation (1) | Instant messaging malware attack (1) |
institution building (1) | institutional (top-down) and bottom-up (individual) recruitment/mobilization (1) | institutional capabilities (1) |
institutional capacity building (1) | institutional Europe (1) | institutional perspective (1) |
institutional resilience (1) | institutionalization (1) | institutions (4) |
insurgency (2) | insurgent networks (1) | Integrated capability framework (1) |
Integrated planning system (1) | integrated security management system (1) | Integrated Security Sector (2) |
integrated security sector; project management (1) | integrated security system (1) | integrated system (1) |
Integration of the European States (1) | integration. (1) | integrity (13) |
integrity policy (1) | intellectual interoperability (1) | Intellectual Property Right (1) |
intelligence (13) | intelligence agencies (1) | Intelligence assessment (1) |
intelligence cooperation (1) | Intelligence governance (2) | intelligence operations (1) |
intelligence oversight (2) | intelligence oversight. (1) | intelligence reform (2) |
intelligence reforms (1) | intelligence sector reforms (1) | intelligence studies (2) |
intelligent agent simulation model (1) | Intelligent Agents (2) | intelligent complex adaptive system (1) |
Intelligent Procurement. (1) | intelligent software agent (1) | inter-national cooperation (1) |
inter-organisational cooperation (1) | Inter-organizational (1) | Interactive Electronic Technical Manuals (IETMs) (1) |
interactive simulation models (1) | interactive verification (1) | Interagency (2) |
interagency cooperation (6) | interdependence (1) | interdependencies (1) |
interdependency (1) | interdisciplinary research (1) | interests (1) |
interface solutions (1) | intermediate force capabilities (6) | Intermestic Domain (1) |
internal and external stakeholders (1) | internal intelligence or counterintelligence (1) | international aid (1) |
international competition (1) | international conflict (1) | international conventions (1) |
international cooperation (2) | international crimes (1) | international experience (1) |
international law (2) | international military cooperation (1) | international organisations (1) |
international relations (1) | international security (3) | international system (1) |
International Terrorism (2) | international trade (1) | international law (1) |
Internet (4) | Internet and governance (1) | Internet and state sovereignty/authority (1) |
Internet exchanges (1) | Internet in China; growth in Internet use by civilians; integration of the Internet into military operations (1) | Internet in conflict situations; new conflict environment; proliferation of voices; information operations; information warfare; cyberspace (1) |
Internet of Things (5) | Internet online application (1) | internet service (1) |
Internet skirmishes. (1) | Interoperability (12) | Interoperability. (1) |
interoperable simulation (1) | interorganizational cooperation (2) | intervention (2) |
interaction. (1) | Introduction (2) | intrusion (1) |
intrusion avoidance. (1) | intrusion detection (5) | Intuition-based Decision-making (1) |
intuitionist fuzzy logic (1) | Intuitionistic fuzzy estimation (1) | intuitionistic fuzzy logic (1) |
investigation (1) | investment (1) | investment management (1) |
IoT (3) | IPTV (1) | Iran (2) |
Iraq (5) | Iris Authentication (1) | Iris Recognition (1) |
irregular warfare (2) | ISAF (2) | ISAR Images (1) |
ISDN (1) | ISIL (1) | ISIS (2) |
Islam (1) | Islamic Movement of Uzbekistan (1) | Islamic State (8) |
Islamic State Khorasan (1) | Islamism (1) | Islamist (1) |
ISR (1) | Israel (1) | IT capabilities (2) |
IT education (3) | IT governance (1) | IT management (1) |
IT management. (1) | IT organisations (1) | IT personnel (1) |
IT security (5) | IT services (2) | IT specialist (1) |
IT taxonomy (1) | IT-infrastructures (1) | IT4Sec reports (106) |
Italian Mafia (1) | Jabhat al Nusra (1) | Jabhat Fath al Sham (1) |
jamming (1) | Japan (1) | Java (1) |
jet length maximization (1) | Jihadism (1) | Jihadist (1) |
JIM (1) | Joint and Multinational (1) | joint capabilities (1) |
joint fusion centre (1) | joint mission assurance assessments (1) | Joint National Training Capability (1) |
joint operation. (1) | Joint theater level simulation (JTLS) (2) | Joint Training (1) |
judicial control (1) | just-in-time (1) | K band radar (1) |
Kalman Filtering (1) | Karabakh Conflict (1) | Karachi (1) |
Kazakhstan (2) | key enabling technology (1) | keyword (1) |
KGB (1) | KINEROS (1) | KNIME Analytics Platform (1) |
knowledge base (1) | Knowledge Based Systems (1) | Knowledge Logistics (1) |
knowledge management (2) | knowledge portal (1) | Kolontar (1) |
Kosovo (5) | Kremlinism (2) | kriegsspiel (1) |
Kryvyi Rih (1) | Kurdish question (1) | Kyrgyzstan (2) |
land domain (1) | Land Forces (1) | Landmark Alignment (1) |
landscape zoning (1) | language learning (1) | lateral flows (1) |
Latvia (4) | Latvian resistance (2) | law (2) |
law enforcement (6) | law enforcement agencies (1) | Law of Neutrality (1) |
law-enforcement (1) | lawfulness (1) | Leadership (6) |
leadership styles (1) | leadership theories (1) | leadership theory (1) |
leakage-resilience (1) | learning activities (1) | Learning in Fuzzy Environment (1) |
Learning Management System (3) | learning management system (LMS) (1) | learning objects (1) |
learning platform (1) | learning technology standards (1) | learning tool (1) |
learning tools and activities (1) | legacy architectures (1) | legal base (1) |
legal basis (1) | legal constraints (1) | legal framework (6) |
legislation measures (1) | legislations (1) | legislative base (2) |
legislature (1) | leisure sports (1) | lessons learned (3) |
Lethality (1) | level of ambition (1) | levels of ambition (1) |
liberal peacebuilding (1) | Liberia (1) | Libya (3) |
License Plate Recognition (1) | Liddell Hart (1) | life cycle (1) |
life cycle cost. (1) | Life cycle management (2) | lifelong education (1) |
lifelong education program (1) | limited at-tention (1) | linear prediction. (2) |
linguistic nationalism (1) | liquidation of the consequences of emergency (1) | Lithuania (1) |
live streaming (1) | Live Teleconsultation (1) | LMS (5) |
local disaster risk governance (1) | local safety index (1) | localism (1) |
location (1) | lockdown (1) | Logistics (2) |
long-term defence planning (2) | Long-term defense planning (1) | LoRa (1) |
LoRa WAN (1) | low-laying coastal territories (1) | LSB (1) |
lustration (1) | lustration measures (1) | M-learning (1) |
Macedonia (2) | machine communications (1) | machine learning (10) |
machine learning algorithms (1) | macrograph. (1) | Macros (1) |
mafia (1) | main cyber hygiene rules (1) | mainstreaming (1) |
Maintenance (1) | major security events (1) | malicious (1) |
malicious information (1) | malware (3) | malware analysis (1) |
Malware Attacks (1) | malware intelligence (1) | man-machine interaction (2) |
Man-Made Disasters (1) | management (8) | management environment (1) |
management of the organization (1) | management policy (1) | manager/agent paradigm (1) |
managing change (1) | managing cybersecurity incidents (1) | mandate (1) |
maneuvering target tracking (1) | manning (1) | manpower (1) |
Manufacturing (1) | MAP (1) | Marconi NMS. (1) |
marine targets tracking (1) | marine tourism (1) | maritime (1) |
Maritime Crisis Management System analysis and design; Maritime Security Negative Factors evolution; maritime security challenges (1) | Maritime critical infrastructure (1) | maritime critical infrastructure protection (1) |
maritime domain (1) | maritime industry (1) | maritime presence (1) |
maritime sector transformation (1) | Maritime Security (5) | Maritime Situational Awareness (1) |
maritime sovereignty (1) | maritime superiority (1) | maritime surveillance (2) |
Maritime terrorism (1) | Maritime Transport System (1) | market corruption (1) |
Markov and semi-Markov chains (1) | Marshall Center (1) | mass consciousness (1) |
mass media (1) | master program (2) | master studies (1) |
Mathematical model (1) | matrix (2) | maturity (2) |
maturity indicators (1) | maturity level (1) | Mauritania (1) |
maximin optimization (1) | Maximizing decision (1) | measure (1) |
measure of uncertainty (1) | measurement (2) | Measures of Effectiveness and Measures of Performance (1) |
measures of uncertainty (1) | measuring results (1) | media (3) |
media ecosystem (1) | medical imaging (1) | Medical Information Systems (1) |
medical readiness (1) | medical terminology (1) | Mediterranean Dialogue (1) |
megacities (1) | megastate (1) | membership (1) |
Membership Action Plan (1) | membership function (1) | MENA (1) |
MENA (БВСА) (1) | mentality (1) | mercenaries (1) |
meta-model (1) | Metadata Modeling (1) | method (2) |
methodology (3) | methods (1) | Metric (1) |
metrics (2) | Microsoft Office (1) | Microsoft Skype for Linux (1) |
Microsoft Teams (1) | MIDI format (1) | migrants (1) |
Migration/Assimilation System (1) | militarism (1) | military (7) |
military assistance (1) | military budgeting (1) | Military command and control systems (1) |
military cooperation (1) | military cyber capabilities (1) | military deterrence (1) |
Military Doctrine (1) | military education (3) | military education. (1) |
military ethos (1) | military exercises (1) | military expenditures (1) |
military higher education institutions (1) | Military Information Support Operations (1) | military intelligence reform (1) |
Military Logistics (1) | military medicine (1) | Military organisation (1) |
military organization (1) | military power (1) | military professionalization (1) |
military strategy (1) | military support (2) | military threat (1) |
military threats (1) | military training (1) | military-economic capabilities (1) |
military-industrial complex (1) | military-technical partnership (1) | Miller-Rabin primality test improvement (1) |
Minister of Defence (1) | ministerial reform (1) | Ministry of Defence (1) |
Ministry of Interior (2) | Ministry of the Interior (1) | Mirai (1) |
MISO (1) | missile (1) | Missile Defence (1) |
mission command (1) | mission-oriented leadership (1) | mitigation (1) |
mitigation and avoidance of accidents. (1) | MITRE ATT@CK framework (1) | mixed digital reality (1) |
mixed reality (1) | MKD-CIRT (1) | ML (1) |
MNJTF (1) | Mobile agents (1) | mobile application (1) |
mobile applications (1) | mobile combat radio network (1) | Mobile Command Post (1) |
mobile commerce (1) | Mobile Communications (1) | mobile devices (1) |
Mobile Internet threats (1) | mobile IP network (1) | mobile learning (2) |
mobile lunar base (1) | Mobile phone (1) | Mobile robot (1) |
Mobile Security (1) | mobile security threats (1) | mobile technology (1) |
mobility (1) | mobilization (2) | modalities (1) |
model (5) | model identification (1) | modeling (5) |
Modeling and Simulation (1) | Modeling and Simulation; Management; Strategy; Analysis; Business Plan; Irregular Warfare; Global War On Terror; GWOT (1) | Modelling (5) |
Modelling and Simulation (4) | Models (2) | modern security. (1) |
modernization (2) | modernization (1) | MODSIM (1) |
MOEACA (1) | MOICA (1) | Moldova (1) |
Monetary Policy (1) | Money Laundering (2) | Mongolia (1) |
monitoring (1) | monitoring network (1) | monitoring station (1) |
Monte-Carlo analysis (1) | Montenegro (2) | Montreux Convention (1) |
Moodle (1) | moral imperative (1) | Morocco (1) |
morphological analysis (1) | Mortgage Market (1) | motiva¬tion (1) |
MoU (1) | MPFSEE. (1) | MSDF (1) |
multi detection (1) | Multi-Agency Operations (1) | multi-agent based distillation system (1) |
multi-agent modelling & simulation (1) | Multi-agent system (1) | Multi-Agent Systems (2) |
Multi-Agents Applications (1) | multi-attribute value theory (1) | multi-criteria approach (1) |
multi-criteria decision-making (1) | multi-national peace support operations. (1) | multi-role fighter (1) |
multi-stakeholder approach (1) | multi-UAV mission planning (1) | multicriteria analysis (1) |
multicriteria assessment (1) | multidimensional security (1) | multidisciplinary studies (1) |
multilateral engagement (1) | Multilateral Interoperability (1) | multilateralism (1) |
multimedia systems (1) | multimedia technologies (1) | multimodal assessment (1) |
multinational (1) | multinational cooperation (3) | multinational exercise (1) |
multiple failures (1) | multiple hypotheses tracking (1) | Multiple Hypothesis Tracking (1) |
multiple maneuvering targets (1) | multiple model estimation and control (1) | Multipolar world (1) |
multirole fighters (2) | Muskovy (1) | Mutual Authentication (1) |
Mutual Information (1) | Nagorno-Karabakh (2) | narcotic substances (1) |
narrative (2) | narratives (1) | NASA (1) |
Nation-building (1) | National Automated Radiation Monitoring System (1) | National Civil Emergency Plan (1) |
national cyber capabilities (1) | National Cybersecurity (1) | national cybersecurity centre (1) |
National cybersecurity management (1) | national cybersecurity strategy (1) | National Defense University (1) |
National Emergency Management System (1) | national experience (1) | National Firefighting and Rescue System (1) |
national interest (2) | national military command center (NMCC) (2) | National security (4) |
national security functions (1) | national security services (1) | National Security Strategy (2) |
national security system (2) | National Situation Center (1) | Nationalisation of Security Research (1) |
nationwide coordination (1) | NATO (52) | NATO Computer Incident Response Capability (1) |
NATO Cyber Defence Management Authority (1) | NATO defense planning (1) | NATO enlargement (3) |
NATO enlargement. (1) | NATO Industry Cyber Partnership (1) | NATO integration (1) |
NATO Response Force (NRF) (1) | NATO response force. (1) | NATO School Oberammergau (2) |
NATO Standards. (1) | NATO training mission (1) | NATO Transformation (1) |
NATO-EU Cooperation (5) | NATO-Russia cooperation (1) | NATO’s Defence Planning Process (1) |
Natural Disasters (6) | natural gas (1) | Natural gas pipeline network (1) |
natural language processing (1) | naval capabilities (1) | Navy (1) |
Nazis (1) | NC3A (2) | NCIA (1) |
NCIRC (2) | NCIRP (1) | NCO development (1) |
neo-authoritarianism (1) | neo-industrial economy (1) | net context (1) |
network (1) | network analysis (1) | network attack (1) |
network co-creation (1) | network enabled capabilities (2) | Network Enabled Capability (1) |
network evolution (1) | network governance (2) | network graphs (1) |
Network Management System (2) | network management systems (1) | network monitoring (1) |
network organization (1) | network parameters (1) | network protection (1) |
network resource management (1) | Network Security (1) | Network System Assimilation (1) |
network traffic (1) | Network-based Defence (1) | Network-Centric Warfare (1) |
Networked Organisations (1) | networking (2) | Networks (2) |
Neural Networks (1) | neurobiology (1) | new generation warfare (1) |
New Risks and Vulnerabilities (1) | new world order (2) | next-generation Internet (1) |
NI RIO (1) | niche capabilities (2) | Nigeria (1) |
nitrogen feed (1) | NLP (2) | NMCC (1) |
non-commissioned officer (1) | non-governmental organization (1) | non-kinetic (2) |
non-lethal (2) | Non-Lethal Directed Energy (1) | non-lethal weapons (5) |
non-linear warfare (1) | non-military means (1) | non-proliferation (3) |
Non-state actors (1) | non-traditional threats (1) | non-transferable investments (1) |
nonlinearity (1) | noopolitik. (1) | norms (1) |
North Africa (1) | North Atlantic Treaty Organization (1) | North Korea (1) |
North Macednia (1) | NPP (3) | NSA files (1) |
Nuclear (1) | nuclear armament (1) | Nuclear emergency (1) |
nuclear power plant (2) | Nuclear Regulatory Agency (1) | Obama Administration (1) |
object management (1) | Object Modeling (1) | Object-oriented programming (1) |
Objectivity (1) | Oblivious Transfer (1) | observer status (1) |
officer corps (1) | officer with epaulettes (1) | offset (1) |
On-board Instrumentation and Control System (1) | on-line estimation (1) | one-way function (1) |
One-Way Hash Function (2) | One-Way Property (1) | online learning (1) |
online teaching (1) | online verification (1) | ontological modelling (1) |
Ontology (2) | Ontology Management (1) | Open Architecture (1) |
Open Skies Treaty (1) | open source (1) | open source intelligence (1) |
open TX (1) | operation (1) | Operation Allied Force (1) |
operational (2) | operational analysis (1) | operational energy context (1) |
Operational planning (2) | Operational Research (1) | operational technology (1) |
operational view (1) | Operational Wargaming (1) | operations (3) |
operations research (1) | operations analysis (1) | Optimization (2) |
Optimizations (1) | operational effectiveness (1) | Oranised crime (1) |
orchestration (1) | Orde Baru (1) | Organisational Change (1) |
organisational collaboration (2) | organisational culture (2) | organisational learning (1) |
Organization (6) | organizational change (1) | organizational culture (2) |
organizational design (2) | Organizational Development (1) | organizational framework (1) |
organizational learning (1) | organizational model (1) | Organized crime (9) |
Osama bin Laden (1) | OSINT (3) | OTH-RADARs (1) |
OTS component assessment (1) | OTT; extraterritorial application; telecommunications law; communication privacy; EU; Japan (1) | outlier detection (1) |
outreach (1) | Outsourced Database Services (1) | oversight (5) |
PageRank (1) | Pakistan (2) | pan-European curriculum (1) |
panacea (1) | pandemic (3) | pandemics (1) |
PAP-DIB (1) | paradigmatic deficiency (1) | parameter uncertainty (1) |
parastate (1) | parliamentarian oversight (1) | parliamentary control (1) |
parliamentary oversight (3) | participatory foresight (1) | partnership (2) |
Partnership for Peace (9) | Partnership for Peace Consortium (1) | partnership goals (1) |
partnerships (1) | password (1) | Password Authentication (2) |
Password Guessing Attacks. (1) | path planning (1) | Pattern Recognition (1) |
Payment System (1) | payment systems (1) | PBX (2) |
PBX security (1) | PDA (1) | peace (1) |
peace and security agenda (1) | peace enforcement (1) | peace operations (2) |
Peace Shield 2000 (1) | Peace-building (1) | peacebuilding (3) |
peacekeeping (3) | Peacekeeping operations (1) | pedagogical innovations (1) |
Pedagogy (1) | peer countries (1) | perceived quality of service (1) |
Perception of security (1) | performance (1) | performance indicators. (1) |
performance management (2) | personality modeling. (1) | personnel management (1) |
PESTLE - analysis (1) | PESTLE – анализ (1) | Petersberg (1) |
Petersberg tasks (1) | PfP (2) | PfP Consortium (3) |
PfP exercise (1) | PhD studies (1) | Phishing (1) |
physical geographic features (1) | PIMS (1) | Piracy (1) |
PKK (1) | plagiarism (1) | Plan (1) |
Planning (2) | planning for disaster protection. (1) | planning methodology (1) |
planning scenarios (2) | planning. (1) | Plate Detection (1) |
platform (1) | plausible and paradoxical reasoning (1) | plausible deniability (1) |
PME (4) | Poland (2) | Poland; Lockheed Martin F-16; Saab/BAE Systems JAS-39 Gripen; Dassault Mirage 2000-5 Mk II; acquisition; technical comparison; financing; offset; U.S.-Polish relation-ship; fighter competition (1) |
police (1) | police cooperation (1) | police force (1) |
police reform (1) | policy (9) | Policy function (1) |
policy guidance (1) | policy recommendations (1) | policy-making (1) |
Polisario (1) | political actors (1) | political analysis (1) |
political economy (1) | political in-stability (1) | political institutions (1) |
political level (1) | political perceptions (1) | political regimes (1) |
political situation (1) | Political stability (1) | political warfare (1) |
politician (1) | politicization (1) | politicized religion (1) |
politics (2) | pollution detection. (1) | Polyakh (1) |
polycentric world (1) | pooling and sharing (1) | poor countries (1) |
Population (1) | portfolio management (3) | positioning (1) |
positive critique (2) | post-communist transition (4) | post-industrial economy (1) |
post-pandemic conditions (1) | post-Soviet space (1) | post-structuralism (2) |
post-truth (1) | post-war (1) | postconflict reconstruction (1) |
potentially pandemic pathogens (1) | power complex (1) | Power grid safety (1) |
Powersim (2) | PPBS (2) | PQoS (1) |
Practical courses on cybersecurity (1) | pre-crisis operations (1) | precipitation (1) |
preemption (1) | preparedness (1) | presentations (1) |
President Putin (1) | prevention (4) | Primary and Secondary Analysis (1) |
primitive capability (1) | prioritisation (1) | privacy (7) |
private cloud (1) | Private Information Retrieval/Storage (1) | private military companies (1) |
private sector (1) | PRNG (1) | proactive identification (1) |
Probability (1) | probability of emission detection (1) | problem-solving (2) |
problematization (2) | procedures (1) | Processing centre (1) |
procurement (3) | procurement (1) | Professional Military Education (4) |
professionalization (1) | professionalization. (1) | profile (1) |
profiling (2) | program (1) | program structure (1) |
program-based resource management (1) | Programming (3) | progressive framing (1) |
Prohibition of War (1) | project (1) | Project management (2) |
project portfolio (1) | projectile or probabilistic hit resolution (1) | propaganda (7) |
proposals (1) | proprietary tools (1) | protection in emergencies (1) |
protection measures (1) | Protection of Civilians (2) | protection of the population (1) |
protests (1) | prototyping (1) | providing physical protection (1) |
proxy server (1) | proxy signature (1) | proxy war (1) |
Pseudo-Random Number Generator. (1) | PSTN (1) | psychological impact (1) |
psychological operations (1) | psychological warfare (1) | psychological warfare. (1) |
psychology (1) | psychology of violence (1) | public cloud (1) |
public diplomacy (1) | public diplomacy; diplomacy; counterterrorism; battle of ideas; State Department; CIST (Countering Ideological Support for Terrorism). (1) | Public Health Research (1) |
Public Key Cryptography (2) | public keys (1) | public policy (1) |
public private partnership (1) | public procurement (1) | Public Sector (1) |
public tenders. (1) | public-private collaboration (1) | public-private partnership (2) |
public-private partnerships (1) | purchasing power parity. (1) | purpose (1) |
Putin (2) | Putin's war in Ukraine (1) | Putinism (1) |
Putin’s regime (1) | QPR (1) | Quad (1) |
Qualitative belief (1) | quality assurance (1) | quality management (1) |
Quantitative belief (1) | quantity of intelligence information needed for understanding the information; “pulsation” of information at situation change. (1) | Quantum computing (1) |
quantum cybersecurity (1) | quantum key distribution (1) | quantum resilience (1) |
quantum supremacy (1) | quantum techniques (1) | questionnaire (1) |
R&D (1) | R&D management (1) | R&T management (1) |
radar data processing (1) | radar simulation and modeling (1) | radar technology (1) |
Radiation emergency (1) | radicalism (1) | radicalism threat (1) |
Radio Access Points (1) | radio receiver (1) | radio transmitter (1) |
radio-electronic warfare (1) | Radiological Safety (1) | radon emanation (1) |
RAM (1) | random numbers gen-eration (1) | Randomization (1) |
ranking (1) | ransomware (1) | Raspberry PI (1) |
Rational-Analytic Decision Making Framework (1) | readiness (1) | Real-Time Interactive Telemedical Services (1) |
realpolitik (1) | rearmament (2) | Reconfiguration (1) |
reconnaissance (1) | reconnaissance (1) | recruiting (1) |
recruitment (4) | red teaming (1) | reference scenarios (1) |
Reflexive Control (1) | reflexive model (1) | reform (3) |
refugee women (1) | refugees (1) | regional cooperation (2) |
regional dynamics (1) | regional response (1) | regional security (5) |
Regional Strategies (1) | regional trade agreements (1) | regionalization (1) |
Regulation 630 (1) | reindustrialization (1) | relationship of structure and functions (1) |
Reliability and safety of rocket-space systems (1) | reliability-based model (1) | religion (1) |
Remote Authentication (3) | Remote collaboration (1) | Remote Encrypted Connection (1) |
remote sensing data (1) | Reorganizing C2 (1) | Republic of Moldova (1) |
Reputation (1) | Reputation-based trust systems (1) | requirements (2) |
research (2) | Research and Demonstration Center (1) | research and technology (1) |
research case (1) | research policy (1) | research roadmap (1) |
reservists (1) | resilience (36) | resilience assessment (1) |
resilience control system (1) | resilience for peace (1) | Resilience management (1) |
resilience risk management self-discrepancy theory graphs feedback loops (1) | resilient system (1) | resource allocation (1) |
resource framework (1) | Resource Protection (1) | resources (5) |
response (1) | Responsibility To Protect (1) | responsible science (1) |
Restructuring (1) | retention (2) | revolution (1) |
right to respect for private life (1) | right-to-left Unicode override (1) | rights (1) |
Risk (15) | Risk Analysis (2) | risk appetite (1) |
Risk Assessment (6) | risk assessment. (1) | Risk engineering (1) |
risk management (10) | risk mapping (1) | risk profile assessment (1) |
Risk reduction (1) | Risk reduction. Technical architecture (1) | risks (3) |
risks of orbital carrier rockets and spacecraft failures (1) | rivalry (1) | RNG (1) |
robust AI (1) | robustness (1) | roles of the Israel Defense Forces (1) |
Romania (3) | RS (1) | RSA (1) |
RSA algorithm (1) | RSS (1) | RTMP (1) |
rule of combination (1) | rule of law (1) | rule-base sentiment analysis (1) |
Ruscism (2) | Ruskiy mir (1) | Russia (33) |
Russia- Ukraine war (1) | Russia-NATO relations (1) | Russia-Ukraine war (6) |
Russian aggression (1) | Russian Federation (7) | Russian Influence (2) |
Russian policy (2) | Russian Transnational Organized Crime (1) | Russian-Ukrainian conflict (2) |
Russia’s Intervention (1) | Russia’s Security Concepts. (1) | Russo-Ukraine war (1) |
Russo-Ukrainian war (5) | RX (1) | S1000D (1) |
safety (7) | safety accident (1) | safety analysis (1) |
safety block diagrams (1) | Safety case core (1) | safety engineering (1) |
safety index (1) | safety management (1) | Safety Management. (1) |
Safety of Shipping (1) | safety-critical software (1) | Sahel (1) |
Sahrawi (1) | sanctions (3) | SAR (1) |
satellite (1) | Satellite Communications (1) | satellite radar interferometry (1) |
Satellite-Based Telecommunication Systems (1) | Saudi Arabia (1) | Saudi Arabia. (1) |
SBU (1) | scalability (1) | scale (2) |
scenario (1) | scenario design (1) | scenario foresight (1) |
scenario method (1) | scenario planning (2) | Scenario Space (1) |
Scenario-based capability-oriented planning (1) | scenario-based planning (2) | Scenarios (3) |
school life (1) | science (1) | Science and Technology (1) |
scientific organizations (1) | scientific support (1) | SCO (1) |
scope (1) | SCORM (5) | SCORM-conformance (1) |
SDR (1) | sea level rise (1) | Sea Surveillance (1) |
Search and Rescue (1) | SeaSparrow (1) | SeaSparrow Program (1) |
secrecy (1) | secret police (1) | Secrets Exchange. (1) |
sectarian conflict (1) | sectarianism (1) | Secure E-Mail (1) |
Secure Multi-Party Computation (1) | secure protocol (1) | secure services (1) |
secure transportation (1) | security (58) | Security Access (1) |
security and defence policy (1) | security and defence reform (1) | security and defence sector (1) |
security and defense policy (1) | security assertion markup language (2) | security capabilities (1) |
Security Challenges (1) | security controls (1) | security cooperation (2) |
security discourse (2) | Security Economics (1) | security engineering (1) |
security environment (1) | security forces (1) | Security foresight (2) |
security functions (1) | security guarantees (1) | security implications of IoT (1) |
Security in IoT (1) | security information and event management (1) | security management (1) |
security policies (1) | security policy (10) | Security Policy Making (1) |
Security research (1) | Security Research 2035 (1) | Security Risks (1) |
security sector (2) | security sector agency (1) | security sector governance (1) |
Security Sector Operations (1) | security sector reform (13) | Security Sector Transformation (2) |
security services (1) | security standards (1) | security strategy (2) |
security system (3) | security threats (2) | security tools (1) |
SEDM (1) | SEE security cooperation (1) | SEECAP (1) |
SEEDRMAP (1) | seismic hazard (1) | Seismic risk (1) |
seismic risk management (1) | Self Organizing Map (1) | self-defense (1) |
self-propelled howitzer (1) | self-regulation (1) | semantic analysis (1) |
Semantic Mediation (1) | semantic similarity search (1) | Sendai Framework (2) |
Sensitivity Analysis (1) | sensor data processing (1) | sensor network (1) |
sensor network stability (1) | sensors (2) | sentiment analysis (1) |
separatists. (1) | Serbia (4) | SEREIN (1) |
serious games and gamification (1) | service design and provision (1) | service management (1) |
service provision (1) | Services. (1) | sex slaves (1) |
se¬curity solution (1) | Shanghai Cooperation Organization (2) | Shannon entropy (1) |
Shannon-HartleyTheorem (1) | shaped charge (1) | SHAPES project (2) |
sharable content objects (1) | sharp power (1) | ship’s computer networks (1) |
ship’s cyber defence (1) | SIGAR (2) | signal processing (1) |
signal structure (1) | signature (1) | Silk Road (1) |
Siloviki (1) | Simmelian backbone (1) | simulation (12) |
simulation exploration experience (1) | simulation of national power and national security. (1) | simulation-based learning (1) |
simulation-based training (1) | simulations (1) | simulators (1) |
Sinai Province (1) | single voice communication (1) | situaitonal awareness (1) |
situation analysis (1) | Situation Assessment. (1) | Situation Center (1) |
situation development operations (1) | Situational awareness (9) | situational scenario. (1) |
skeleton units (1) | skills (1) | skills acquisition (1) |
Skype for Business (1) | Slantrange (1) | sliding window (1) |
slopes (1) | Slovakia (1) | Slovenia (1) |
Sly (1) | small state (1) | small state theory (1) |
Smart Card (2) | Smart Cards (1) | Smart Contracts (1) |
smart defence (3) | smart defence. (1) | Smart Grid (1) |
smart house (1) | smart security (1) | smart substation (1) |
smartphone (1) | smuggling (3) | SOA (1) |
Sochi Olympics (1) | social and labour relations (1) | social instability (1) |
social isolation (1) | social media (3) | social media monitoring (2) |
social network (1) | Social network analysis (1) | social networking service (1) |
social networks (7) | Social networks analysis (1) | Social Resilience (1) |
social security (1) | social structure (1) | social sustainability (1) |
Social Systems (1) | social tension (1) | socialism (1) |
societal development (1) | societal impact assessment (1) | Societal Resilience (3) |
Societal Security (1) | society (2) | socio-constructivism (1) |
Socio-Economic Systems (1) | socio-economic vulnerability (1) | Soeharto (1) |
soft Belarusification (1) | Soft Computing (1) | soft computing agents (1) |
soft concerns (1) | soft deterrence (1) | soft power (2) |
Software agent (1) | Software agents (1) | software architectures (1) |
software as a service (1) | software development (1) | software development process (1) |
software faults. (1) | Software technology (1) | software tool (1) |
software tools (1) | Solidarity Clause (1) | Somalia (1) |
South Africa (1) | South Caucasus (2) | South East Europe (1) |
South Eastern Europe (2) | South Eastern Europe. (1) | South Korea (1) |
South Ossetia (1) | South-Eastern Europe (1) | Southeast Europe (1) |
sovereign debt (1) | Sovereignty (4) | space (1) |
space computing simulations (1) | space surveillance network (1) | space technology transfer (1) |
space-based communications (1) | Spam Detection (1) | spatial data mapping (1) |
spatial position (1) | spatio-temporal structure (1) | Special Antiterrorist Unit (1) |
special military operation (1) | Special Operations Forces (1) | specialised emergency teams (1) |
specialization (2) | spectral analysis (2) | speech recognition (1) |
Sphere of influence (1) | spillover effects (1) | SQL injection (1) |
SSD (1) | SSTR (1) | SSU (2) |
SSU Academy (1) | Stability (4) | Stability Pact for South East Europe (1) |
Stability Pact for South Eastern Europe (1) | stability policing (1) | stabilization (3) |
stabilization missions (1) | Stakeholder Engagement (1) | Stakeholder Engagement Action Plans (1) |
stakeholder management (1) | standard (2) | Standard Operating Procedures (1) |
standardization (1) | standardization organizations (1) | standards (3) |
Standing Operating Procedures (1) | state capture (1) | State Fire and Rescue Service (1) |
state influence (1) | State information resource (1) | State register of potentially dangerous objects (1) |
State Security (2) | state security reform (1) | state sponsor of terrorism (3) |
static analysis (1) | statistical analysis (2) | status of Crimea (1) |
Steganographic (1) | steganography (1) | Steganometric. (1) |
stochastic validation (1) | storm events (1) | stovepipes (1) |
StratCom (1) | StratCom coordination (1) | Strategic Assessment (1) |
strategic autonomy (1) | strategic communication (4) | strategic communications (2) |
strategic competition (11) | Strategic Costing Model. (1) | strategic defence review (1) |
strategic defense review (1) | strategic deterrence (1) | strategic interdependence (2) |
strategic leadership (1) | strategic map (2) | strategic messaging (1) |
strategic narratives (2) | Strategic Objectives (1) | strategic outcomes (1) |
strategic plan (2) | strategic planning (2) | strategic planning. (1) |
strategic power competition (1) | strategic rivalry (1) | strategic trilemma (1) |
strategic uncertainty (1) | strategies (1) | strategy (14) |
strategy for development (1) | Strategy Pyramid (1) | strategy. (1) |
stress index (1) | structural constraints (1) | Structural Equation Modelling (1) |
structural realism (1) | structural reform (1) | structural transformation (1) |
structured argumentation (1) | students (2) | Stuxnet. (1) |
subculture (1) | Subject (1) | subject domain (1) |
subversion (2) | Sun Tzu (1) | supply chain (3) |
supply chain crime (1) | supply chain Petersberg tasks (1) | supply chain protection. (1) |
supply chain security (2) | Surface Missile System (1) | surge capacity (1) |
surveillance (3) | surveillance capitalism (1) | sustainable development (1) |
SWOT - analysis (1) | SWOT - анализ (1) | SWOT analysis (1) |
synthesis (1) | synthetic aperture radar (1) | synthetic biology (1) |
Syria (5) | Syrian asylum seekers (1) | Syrian refugees (1) |
system (3) | system analysis (1) | system approach (1) |
system architectural frameworks; coalition C2 (1) | System Architecture (1) | system architectures (1) |
System Design (1) | System Dynamics (2) | System Engineering (1) |
System of systems (1) | system-of-systems (1) | systemic corruption (1) |
systems of systems (1) | TaaS (1) | table-top exercise (1) |
TACS (1) | Tactical Communications Network (1) | Tactical Forms (1) |
Tactical Nuclear Weapons (1) | Tactical Wargaming (1) | Taiwan (2) |
Tajikistan (2) | Taliban (1) | target audience (1) |
target tracking (1) | targets (1) | task list (1) |
taxonomy (2) | teaching methods (1) | technical (2) |
technical architecture (1) | technical architecture framework (1) | technical expertise (1) |
technical manuals (1) | technical regulation (1) | techniques. (1) |
techno-social threats & risks (1) | technological change (1) | technological risk (1) |
technologies (1) | technology (3) | Technology Insertion. (1) |
technology-supported training (1) | telemetry (1) | Telephony (1) |
Telnet (1) | template (1) | TEMPUS (1) |
Terrorism (18) | Terrorism at Sea (1) | Terrorism. (1) |
Terrorist Actions (1) | terrorist attack at Burgas airport (1) | Terrorist Financing (1) |
terrorist incident response (1) | Terrorist Networking (1) | terrorist organizations (1) |
Terrorist Recruitment (1) | terrorist state (3) | terrorist threat (1) |
terrorist threat. (1) | Testing as a Service (1) | testing tools. (1) |
tests (1) | text mining (1) | text similarity (1) |
texture-based similarity (1) | TF-IDF (1) | The Netherlands (1) |
the United Kingdom (1) | theory (1) | thesaurus (1) |
third countries (1) | threat (4) | threat assessment (1) |
threat intelligence (1) | threat multiplier (1) | Threat spectrum (1) |
threats (6) | three-pillar disaster management system (1) | threshold (1) |
Thucydides Trap (1) | Tian Xia (1) | TIEMS (1) |
time series analysis (1) | time stamp authority (1) | Timestamp (1) |
Timor-Leste (1) | tolerance (1) | tool (1) |
tools (1) | top 10 live threats (1) | Topographical and Topological Data Estimation (1) |
totalitarianism (1) | Tracking (1) | tracking algorithms (1) |
tracking. (1) | trade (1) | Traffic Control. (1) |
trafficking in persons (1) | training (14) | Training and Exercises (1) |
training effectiveness (1) | training program (1) | training programme (1) |
training simulators (1) | trajectory compression (1) | Transaction (1) |
transactional distance (1) | transactions control (1) | transborder conflict (1) |
transdisciplinarity (1) | Transformation (8) | transformation challenges (1) |
transfor¬mation (1) | transit (1) | transition (2) |
Transition and Reconstruction (1) | transition detection (1) | transnational crime (1) |
transnational organised crime (1) | Transparency (19) | tree parity machine (1) |
Tree-Based Index Structure (1) | trends (1) | trial (1) |
triangle of contradictions (1) | tribal networks (1) | tribalism (1) |
trilateral relations (1) | triples (1) | TRL (1) |
Trojan life cycle (1) | Trojans (1) | Trojans detection (1) |
trust (4) | trust models (1) | trusted reporters (1) |
trusted routing (1) | trustworthy AI (2) | Tunisia (1) |
Turkey (3) | Turkish military (1) | Türkiye (3) |
TX (1) | type-variety principle (1) | U.S. Cyber Security Strategy (1) |
U.S. security assistance (1) | U.S. security cooperation (1) | UAV (3) |
Uighurs (1) | Ukraine (25) | Ukrainian Armed Forces (1) |
Ukrainian crisis (1) | Ukrainian Shield (1) | ultra-large database (1) |
UML architectural meta-design (1) | UML архитектурно мета-проектиране (1) | UN Resolution 2178 (1) |
UN SCR 1325 (1) | Uncertainty (5) | uncertainty. (1) |
unconventional warfare (1) | undefined (1) | unified information system (1) |
United Kingdom (2) | United Nations Support Mission in Libya (1) | United States (7) |
universal mind (1) | University (3) | university study programs (1) |
Unknown attack (1) | unmanned aerial vehicles (1) | unrestricted warfare (2) |
UNSC Resolution 1325 (1) | UNSCR 1325 (1) | UNSMIL (1) |
Untrusted Server (1) | uranium ore deposits (1) | uranium ore manifestations (1) |
urban operations (1) | US (1) | US Global Strategy (1) |
US intervention (1) | US Naval Academy (1) | US-Europe Security Issues (1) |
User Anonymity (1) | User Impersonation. (1) | users response (1) |
UxVs (1) | Uzbekistan (1) | validation (1) |
valleys (1) | values (2) | variable parameter (1) |
variational problem (1) | VBA (1) | vehicle theft (1) |
velocity control autopilot (1) | verification (3) | Verkhovna Rada (1) |
Vessel Traffic Services (1) | Videoconferencing (1) | Virtual Breeding Environment (1) |
virtual classroom (1) | Virtual diplomacy; foreign policy in information age; empowerment by networks; rise of non-state actors; realpolitik (1) | virtual reality (1) |
Virtualisation (1) | virtualization (1) | Visibility function (1) |
visible areas (1) | vision (2) | Visual Basic for Applications (1) |
visualization (1) | vital societal functions (1) | vocabulary learning strategies (1) |
volunteer battalions (1) | volunteering system (1) | volunteerism (1) |
volunteers (1) | VR (1) | VTS enhancement (1) |
Vulnerabilities (8) | vulnerability (8) | vulnerability analysis (2) |
war (5) | war crimes (2) | war economy (1) |
War on Terror (1) | War or Terrorism (1) | Warden’s rings (1) |
Wardriving (1) | Warfare (3) | Wargaming (2) |
warriors (1) | Warsaw (1) | water consumption (1) |
water management (1) | water resources (1) | water security (1) |
Watermarking (1) | Watermarking. (1) | way of life (1) |
weaponization of interdependence (1) | Web 2.0 (3) | Web 2.0/Web 3.0 технологии (1) |
Web 3.0 (3) | Web Agents (1) | web application (1) |
web attack (1) | web page categorisation (1) | web service (1) |
Web Services (3) | web sources (1) | web users analysis (1) |
web-based learning (2) | Web-service (1) | welcoming address (1) |
wellbeing (1) | WEP (1) | Western Balkans (2) |
Western New Independent States (1) | Western response (1) | Western Sahara (1) |
Western sanctions on Belarus (1) | whole-of-government (1) | Wi-Fi technology (1) |
wiki. (1) | Wildfire (2) | Wine (1) |
Wired Equivalent Privacy (1) | Wireless mesh network (1) | Wirless Local Area Network (1) |
WLAN (1) | women (2) | women in conflict (1) |
women’s empowerment (1) | word2vec representation (1) | words network (1) |
world economy (1) | world order (2) | WTO (1) |
X-ray (1) | Xi Jinping (1) | XML (1) |
XML Encryption (2) | XML Signature (1) | Yager’s rule (1) |
Yemen (1) | zero trust model (1) | «Инфогейт» (1) |
«капитализм слежки» (1) | «холодная война» (1) | Абу Бакр (1) |
Абхазия (1) | авторитаризм (2) | агент влияния (1) |
агентный (1) | агрессия (2) | адаптация (1) |
Азербайджан (1) | АК (1) | АКАП (1) |
активи (1) | активные мероприятия (1) | Албания (1) |
Александр Лукашенко (1) | Аль-Каида (5) | Аль-Каида в Исламском Магрибе (1) |
Аль-Каида на Аравийском полуострове (1) | Амният (1) | ан-Нусра (1) |
анализ (1) | анализ на алтернативи (1) | антиквариат (1) |
антикризисное управление (1) | антитеррористическое законодательство (1) | апартеид (1) |
апетит към риска (1) | Арабская весна (2) | армия (1) |
асимилиране на мрежова система (1) | асимметричный (1) | ассемблирование (1) |
атаки (1) | атрибутивна теория (2) | атрибуция (2) |
аутрич (1) | Афганистан (3) | Ахрар аль-Шам (1) |
Аш-Шабаб (1) | бакалавър (1) | баланс (2) |
баланс на последствията (2) | балансирана карта от критерии за ефективност (1) | балансирана система от показатели за оценка на ефективността (1) |
Балканы (1) | Балтийский батальон (1) | Барак Обама (1) |
бедствие (2) | беженцы (1) | безопасность (11) |
безопасность на море (1) | безопасность цепочек поставок (1) | Беларусь (1) |
белорусская государственность (1) | белорусско-российские отношения (1) | бенчмарк (1) |
биобезопасность (1) | Биологическое оружие (1) | Боко Харам (1) |
большие данные (1) | борьба с коррупцией (1) | борьба с наводнениями (1) |
Босния и Герцеговина (2) | братские народы (1) | Будапештская конвенция (1) |
България (5) | Българска армия (3) | бюджет (1) |
бюджет за отбрана (2) | Варшава (1) | ведомство сектора безопасности (1) |
великая держава (1) | Венгрия (2) | верификация (1) |
верховенство закона (1) | Верховная Рада (1) | взаимодействие (1) |
взаимозависимость (1) | виртуална класна стая (1) | висше образование (1) |
вклад (1) | влияние государства (1) | влияние России (1) |
внедрена цифрова идентификация; дистанционна криптирана връзка (1) | внешняя политика (3) | внешняя разведка (1) |
внутренняя разведка (1) | военна професия (1) | военна реформа (1) |
военная доктрина (1) | военная игра (1) | военная медицина (1) |
военная мощь (1) | военная организация (1) | военная помощь (1) |
военная реформа (1) | военная стратегия (1) | военная экономика (1) |
военни технологии (1) | военно сътрудничество (1) | военно-промышленный комплекс (1) |
военно-экономический потенциал (1) | военное лидерство в Китае (1) | военное образование (3) |
военные (2) | военные кибер способности (1) | военные операции (1) |
военные преступления (2) | военные расходы (1) | военные учения (1) |
воздействие (1) | возможности коммуникационного контента (1) | возникающие вызовы безопасности (1) |
воины (1) | война (6) | война Путина против Украины (1) |
война с терроризмом (2) | вооруженные силы (1) | Вооружённые силы Украины (1) |
воспрещение (1) | восстановление экономики (1) | Восточная Европа (3) |
Восточная и Центральная Европа (1) | восточный фланг (2) | ВР (1) |
всеобхватна сигурност (1) | Въоръжени сили (3) | выборы 2016 (1) |
вызовы кибербезопасности (1) | гарантии безопасности (1) | гармонизация (1) |
Гватемала (1) | гендер (1) | гендерное неравенство (1) |
гендерное равенство (1) | гендерные отношения (1) | гендерный подход (1) |
геноцид (2) | геополитика (1) | геополитическая напряжённость (1) |
геополитическая стабильность (1) | геополитическое влияние (1) | геоэкономика (1) |
геоэкономические угрозы (1) | гибридная война (14) | гибридная угроза (1) |
гибридная устойчивость (1) | гибридно-мессианская агрессия (1) | гибридное влияние. (1) |
гибридные угрозы (6) | гибридные угрозы; конфликт; устойчивость; сдерживание; стратегия (1) | ГИС (1) |
глобализация (2) | Глобална стратегия на Европейския съюз (1) | Глобальное медицинское взаимодействие (2) |
глобальный гибридный терроризм (1) | гонка кибер вооружений (1) | государства бывшего СССР (1) |
государственная безопасность (1) | государственная политика (1) | государство-спонсор терроризма (3) |
готовность (1) | гражданска защита (3) | гражданска сигурност (1) |
гражданские права (1) | гражданский аспект дипломатии (1) | гражданский надзор (1) |
гражданско общество (1) | гражданское общество (1) | гражданское общество; политика (1) |
Грузия (5) | двойное назначение (1) | дедовщина (1) |
дезинтеграция (1) | дезинформация (7) | Дейтонское соглашение (1) |
демография (1) | демократизация (1) | демократичен контрол (1) |
демократическая устойчивость (1) | демократический контроль (2) | демократический процесс (1) |
демократия (3) | деструктивни роли (1) | детериториализация (1) |
Джамму и Кашмир (1) | Джебхат ан-Нусра (1) | Джебхат Фатах аш-Шам (1) |
джем по безопасности (1) | джихадизм (1) | джихадистский терроризм (2) |
дигитална обучителна инфраструктура (1) | дигитална трансформация (2) | дигитално бъдеще (1) |
динамика на потребителските реакции (1) | дипломатия (1) | Дирекция за управление при извънредни ситуации (1) |
дискурс (1) | дистанционна работа (1) | дистанционно обучение (1) |
ДКВС (1) | добро управление (2) | добровольческие батальоны (1) |
доверие (3) | договор «Открытое небо» (1) | доктрина (2) |
доктрина комплексирования (1) | домохозяйки (1) | Донбасс (1) |
Дополнительный протокол (1) | доставки за отбраната (1) | дрони (1) |
думи: неопределеност (1) | Европа (1) | Европейска интеграция (1) |
Европейска отбрана (1) | европейская безопасность (5) | Европейский контртеррористический центр (1) |
Европейский союз (7) | Европейский суд по правам человека (1) | Европол (1) |
Египет (2) | експертни системи (1) | електронно обучение (1) |
ЕС (5) | Естония (1) | етичен кодекс (1) |
етнически конфликт (1) | ефективност (4) | ефикасност (3) |
женщины (1) | женщины и конфликт (1) | женщины-беженки (1) |
жизнен цикъл (1) | жизнь училища (1) | Закон за защита при бедствия (1) |
законодателна рамка (2) | замороженный конфликт (2) | Западная Сахара (1) |
Западные Балканы (1) | заплаха (1) | заплахи (3) |
захват государства (1) | защита (1) | защита в дълбочина (1) |
защита гражданского населения (1) | защита на критична инфраструктура (1) | защита на населението (1) |
защита от наводнений (1) | защита персональных данных (1) | защитна стена (1) |
зерновая сделка (1) | златен стандарт (1) | значения (1) |
зрелость (1) | зрялост (1) | ИБТ (1) |
ИГИЛ (3) | ИГИШ (1) | идеология (2) |
иерархическая форма (1) | изкуствен интелект (1) | изменение климата (2) |
измерване (1) | изоляция (1) | изоляция района боевых действий (1) |
Израиль (1) | Източна Европа (1) | инвестиции (1) |
индикатор (1) | Индия (1) | Индо-Тихоокеанский регион (2) |
Индонезия (1) | Индустриальный Интернет (1) | инновации (1) |
инновационная война (1) | инновация (1) | иностранные боевики (3) |
иностранные боевики-террористы (2) | иностранные инвестиции (1) | институты (2) |
институциональная устойчивость (1) | институциональное (сверху-вниз) и индивидуальное (снизу-вверх) рекрутирование (1) | инструменти за разработка на съдържание (1) |
интегриран сектор за сигурност (1) | интегритет (6) | интелигентна отбрана (4) |
интеллектуальная оперативная совместимость (1) | интерактивна верификация (1) | интервенция (1) |
интервенция США (1) | интереси (1) | Интернет (1) |
Интернет вещей (1) | Инфовойна (1) | информационна сигурност (1) |
Информационна система за управление при извънредни ситуации (1) | информационная война (4) | информационная травма (1) |
информационни системи (1) | информационное обеспечение военных действий (1) | информационные операции (4) |
информированность (1) | инфраструктура (1) | инфраструктура ИКТ (1) |
инцидент (1) | Ирак (4) | Иран (2) |
искусственный интеллект (1) | искусство (1) | исламизм (1) |
Исламское государство (9) | Исламское государство Хорасан (1) | Исламское движение Узбекистана (1) |
исследования по вопросам разведывательной деятельности (1) | исторический институционализм (1) | историческое единство русских и украинцев (1) |
история (1) | Йемен (1) | Кавказ (3) |
Каддафи (1) | Казахстан (2) | Карачи (1) |
каркасные единицы (1) | картографирование рисков (1) | квантовая кибербезопасность (1) |
квантовая устойчивость (1) | квантовое превосходство (1) | квантовое распределение ключей (1) |
квантовые вычисления (2) | КГБ (1) | кибер атака (2) |
кибер безопасность (1) | кибер война (1) | кибер домен (1) |
кибер заплахи (3) | кибер защита (2) | кибер конфликт (1) |
кибер оборона (1) | кибер операции (4) | кибер пространство (1) |
кибер риски (1) | кибер сигурност (2) | Кибер угрозы (1) |
кибер-война (1) | кибер-социальные уязвимости (1) | кибер-физические системы (1) |
кибератака (2) | кибербезопасность (11) | кибербезопасность ЕС (1) |
кибервойна (2) | кибердомен (1) | киберзаплахи (2) |
киберзащита (1) | кибернавыки (1) | кибернетика (1) |
кибернетична екосистема (1) | кибернетична сигурност (1) | кибероборона (1) |
киберобучение (1) | кибероперации (2) | киберпреступность (4) |
киберпрестъпност (3) | Киберпространство (5) | киберпространството (1) |
киберриск (1) | киберсигурност (13) | киберсфера (1) |
кибертехнологии (1) | киберустойчивост (1) | киберустойчивость (1) |
Китай (8) | клановость (1) | класификация (2) |
класифициране (1) | Клаузевиц (1) | ключевая технология (1) |
Ковид-19 (1) | когнитивная война (1) | когнитивное хакерство (1) |
когнитивный (1) | кодекс поведения (1) | коллективная безопасность (1) |
Колонтар (1) | командване в мисии (1) | командование и управление (1) |
компетентности (1) | комплексни кризисни ситуации (1) | комплексность (1) |
комплексный подход (1) | компьютерная пропаганда (1) | компютърна графика (1) |
компютърно подпомагани учение (КПУ) (1) | конвенциональные силы (1) | Конвенция о превенции терроризма (1) |
конвергенция (1) | конкурентный континуум (1) | конструктивни роли (1) |
контекст (1) | контент-анализ (1) | контр-повстанческие действия (1) |
контр-терроризм (1) | контрабанда (1) | контроли за киберсигурност (1) |
контроли за сигурност (1) | контроль над вооружениями (2) | контрразведка (3) |
контртерроризм (4) | контртеррористические операции (1) | конфликт (6) |
концепции (1) | концепция (1) | координатор (1) |
координация (4) | коронавирус (2) | коррупция (5) |
корупция (1) | корупция; пазарна корупция; мрежова корупция; фактори за корупцията; последици от корупцията; антикорупция (1) | Косово (3) |
креативное право (1) | кремлинизм (2) | криза (2) |
кризис (1) | кризисное управление (1) | кризисный менеджмент (3) |
криминальный бизнес (1) | криптография (2) | критическая информационная инфраструктура (1) |
критическая инфраструктура (4) | критические инфраструктуры (1) | критические моменты (1) |
критична инфраструктура (1) | кросс-культурная компетентность (1) | Крым (2) |
культура (5) | культурная среда (1) | Кыргызстан (1) |
Латвия (2) | летательный аппарат двойного назначения (1) | летище (2) |
либеральное миростроительство (1) | Либерия (1) | Ливия (3) |
Лиддел Гарт (1) | Лидерство (4) | лингвистические умения (1) |
Литва (1) | локализъм (1) | люстрация (1) |
Мавритания (1) | магистър (1) | Македония (1) |
Марокко (1) | матрица (2) | матрица Хофстеде (1) |
мафия (1) | машинные коммуникации (1) | мащаб (2) |
мегаполисы (1) | медиа (1) | медицинская безопасность (1) |
медицинская готовность (1) | межведомственное сотрудничество (1) | международная безопасность (1) |
международная помощь (1) | международное право (1) | международное соперничество (1) |
международные конвенции (1) | международные отношения (2) | международные преступления (1) |
международный опыт (1) | межкультурное сравнение (1) | мейнстрим (1) |
менеджмент конфликтов (1) | менеджмент чрезвычайных ситуаций (1) | мениджмънт (3) |
ментальность (1) | мерки за защита (1) | меры кибердоверия (1) |
меры люстрации (1) | меры по укреплению доверия и безопасности (1) | метод на сценариите (1) |
метод ПЯИО (1) | методы обучения (1) | Метрика (1) |
метрики (1) | мигранты (1) | миграция в Германии (1) |
Министерство на вътрешните работи (2) | Министерство на отбраната (2) | министър на отбраната (1) |
мира и безопасности (1) | мировой порядок (1) | миротворческие операции (1) |
миротворчество (2) | многокритериален анализ (1) | многонационално сътрудничество (1) |
многонациональные формирования (1) | многополярный мир (1) | мобилизация (3) |
мобильность (1) | модел (2) | модели за измерване на зрелостта на способностите за киберсигурност (1) |
модели за поведение (1) | модели зрелости способностей (1) | моделиране (1) |
моделирование (1) | модернизация (3) | модернизация вооружённых сил (1) |
Монголия (1) | моральный императив (1) | Морское пиратство (1) |
Московия (1) | мрежови системи на управление техники за идентифициране/оценяване (1) | МУДБ (1) |
мултиагентно моделиране и симулации (1) | мултимедийни системи (1) | мултимедийни технологии (1) |
мультипликатор угроз (1) | мягкая белорусизация (1) | на море (1) |
на суше (1) | навигация (1) | наводнения (1) |
Нагорный Карабах (1) | надзор (2) | наркотические вещества (1) |
нарратив (2) | НАТО (38) | Национална противопожарна и спасителна служба (1) |
Национална система за противопожарна защита и спасяване (1) | Национална система за управление при извънредни ситуации (1) | национальная безопасность (1) |
национальные интересы (1) | национальный интерес (1) | Национальный университет обороны (1) |
Негосударственные акторы (1) | недопущение (1) | недостатъци (1) |
незаконная торговля (1) | незаконная экономика (1) | незаконные формирования (1) |
нейробиология (1) | некинетический (2) | нелетальная направленная энергия (1) |
нелетальное оружие (5) | нелетальный (2) | нео-авторитаризм (1) |
неоиндустриална икономика (1) | неопределенность (1) | нераспространение (1) |
нерегулярные боевые действия (1) | нетрадиционные угрозы (1) | нетрансферабельные инвестиции (1) |
неядерный конфликт (1) | нива на зрялост (1) | нишови способности (1) |
новый миропорядок (1) | Новый порядок (1) | нормы (1) |
обеспечение правопорядка (1) | области за киберсигурност (1) | обмен информацией (2) |
обмен информации (1) | обобщена картина на значимост (1) | оборона (4) |
оборонная реформа (1) | оборонное планирование на основе способностей (1) | оборонное сотрудничество (1) |
обороноспособность (1) | образ жизни (1) | образование (1) |
образователни технологии (1) | обучение (2) | обучение на база на информираност (1) |
Обща политика за сигурност и отбрана (3) | общевойсковые операции (1) | общегосударственный (1) |
общественная дипломатия (1) | общество (1) | ОВСЕ (1) |
ограничение и воспрещение доступа и манёвра (1) | оказание поддержки гражданским властям военными (1) | Олимпиада в Сочи (1) |
опасност (1) | ОПБО (1) | оперативная совместимость (3) |
операции (1) | операции в городских условиях (1) | операции иностранного влияния (1) |
Операции по стабилизации и восстановлению (1) | операционализация культуры (1) | определения устойчивости (1) |
ОПСО (1) | организационна култура (2) | организационная модель (1) |
организация (2) | организация полиции (1) | Организация Североатлантического Договора (1) |
организованная преступность (4) | ориентированная на результат модель управления (1) | основное течение (1) |
острая сила (1) | отбранителен мениджмънт (1) | отбранителна аквизиция (1) |
отбранителна индустрия (1) | Отбранителна политика (7) | отбранителна реформа (1) |
отбранителни способности (5) | отбранително планиране (1) | ответственная наука (1) |
ответственность за защиту (1) | отвлекающие действия (1) | отговор при бедствия (8) |
отмывание денег (1) | отчетност (3) | офицер (1) |
офицерский корпус (1) | охрана законности и порядка (1) | охрана правопорядка (4) |
оценка зрелости кибербезопасности (1) | оценка устойчивости (1) | оценяване и управление на риска (1) |
очак- вана годишна загуба (1) | Пакистан (2) | панацея (1) |
пандемия (4) | пандемия COVID-19 (1) | парламентарен контрол (1) |
парламентарен надзор (1) | парламентский контроль (1) | парламентский надзор (2) |
партизанская война (1) | партнерства (1) | партнерства Европа-БВСА (1) |
партнерство (2) | Партнерство ради мира (2) | Партньорство за мир (1) |
ПВО (1) | ПД (1) | педагогические инновации (1) |
передовое присутствие сил на передовых рубежах (1) | перемещенные женщины (1) | пересечение границ (1) |
Перестройка (1) | пехота (1) | ПИВСН (1) |
план действий (1) | План действий по обеспечению готовности (1) | платформа по кибербезопасности (1) |
племенные сети (1) | повстанческие сети (1) | повстанческое движение (1) |
повышение добропорядочности (1) | пограничный забор с Россией (1) | подготовка (10) |
подготовка на войските (1) | поддержка гражданских властей со стороны вооруженных сил (1) | подотчетность (2) |
подрывная деятельность (1) | пожари земетресения (1) | позитивная критика (1) |
позициониране (1) | показатели зрелости (1) | Полисарио (1) |
политизация (1) | политизация религии (1) | политик (1) |
политика (5) | политика безопасности (4) | политика безопасности и обороны (1) |
политика за интегритет (1) | политика за сигурност (1) | политика исследований (1) |
политика по вопросам климата (1) | политика развития Европей¬ского оборонного союза (1) | политики за сигурност (1) |
политическая ситуация (1) | политическая экономия (1) | политические институты (1) |
политические режимы (1) | политический анализ (1) | политическое сознание (1) |
полицейское патрулирование для поддержания порядка (1) | полицентрический мир (1) | полиция (2) |
полномасштабное вторжение (3) | полученные уроки (1) | Полша (1) |
Полях (1) | помощь США в сфере безопасности (1) | порог (1) |
портфолио от проекти (2) | после войны (1) | последствия для людей (1) |
последствия ИВ для безопасности (1) | последствия распространения (1) | пост-пандемийные условия (1) |
постиндустриална икономика (1) | посткоммунистический переходный период (1) | постконфликтное восстановление (1) |
постправда (1) | постсоветская территория (1) | постструктурализм (1) |
потенциал (1) | потенциально пандемические патогены (1) | поуки от практиката (1) |
ППБС (1) | права (1) | права человека (2) |
право на уважение частной жизни (1) | правовая база (2) | правовая основа (1) |
правоохранительные органы (1) | превенция (1) | предвидение (1) |
предимства (1) | предшествовавшая дислокации (1) | презентации (1) |
президент Путин (1) | преступление агрессии (1) | преступная деятельность (1) |
преступность (1) | природни бедствия (1) | природный газ (1) |
проблематизация. (1) | проблематика женщин (1) | провинция Синай (1) |
прогнозы (1) | програма за киберсигурност (1) | програма за развитие (1) |
Программа совершенствования образования в сфере обороны (1) | продовольственный кризис (1) | проектиране на системи за информационна сигурност (1) |
прозрачност (4) | прозрачность (2) | прокси-война (1) |
промежуточные силовые возможности (6) | промышленность (1) | пропаганда (4) |
протести (1) | протесты 2020 (1) | противодействие (1) |
противодействие на инциденти с киберсигурността (1) | профессионализация (1) | профессионализация вооруженных сил (1) |
Профессиональное военное образование (4) | профил (1) | процесс оборонного планирования (1) |
психологические операции (1) | психология насилия (1) | ПСОО (1) |
публично-частное сотрудничество (1) | Путин (2) | путинизм (1) |
Путинский режим (1) | Пълно дисково криптиране (1) | радикализация (1) |
радикализм (1) | радиоэлектронная борьба (1) | разведка (9) |
разведывательные данные (1) | развитие (1) | развитие на въоръжените сили (1) |
развитие отношений (1) | развитие сержантского корпуса (1) | разоружение (1) |
разработка и проверка концепции (1) | разрешение конфликтов (1) | рамки (1) |
расширение прав и возможностей женщин (1) | рашизм (2) | реакция Запада (1) |
реальная политика (1) | революция (1) | регионализация (1) |
региональная безопасность (1) | региональная динамика (1) | резолюция 1325 СБ ООН (1) |
Резолюция ООН 2178 (1) | Резолюция СБ ООН 1325 (1) | Резолюция Совета безопасности ООН 1325 (1) |
реиндустриализация (1) | рекомендации по политике (1) | религиозная доктрина (1) |
религия (1) | реорганизации C2 (1) | ресурси (3) |
ресурси за отбрана (1) | ресурсна рамка (1) | ресурсы (2) |
реформа в сфере обороны (1) | реформа военной разведки (1) | реформа государственной безопасности (1) |
реформа министерств (1) | реформа на сектора за сигурност (1) | реформа полиции (2) |
реформа разведки (2) | реформа сектора безопасности (1) | реформа сектора обороны (1) |
реформиране на сектора за сигурност (1) | реформирование разведки (1) | реформирование разведывательного сектора (1) |
реформирование сектора безопасности (1) | реформы (2) | решение проблем (1) |
риск (7) | риск бедствий (1) | рисков профил (1) |
рискове (1) | роль Армии обороны Израиля (1) | российская агрессия (1) |
российская политика (2) | Российская Федерация (4) | российско-грузинские отношения; внутренняя политика Грузии; Южная Осетия; Абхазия; международные отношения на Кавказе (1) |
российско-украинская война (2) | российско-украинский конфликт (1) | российское влияние (1) |
Россия (19) | Румъния (1) | русские (1) |
Русский мир (1) | русско-украинская война (7) | самокриптиращ (1) |
санкции (2) | Саудовская Аравия (1) | Сахель (1) |
Сахрави (1) | САЩ (1) | СБУ (1) |
связь (1) | связь преступность-терроризм (1) | сдерживание (9) |
Северная Африка (1) | Северная Корея (1) | Северная Македония (1) |
Северный Кавказ (1) | сексуальные рабыни (1) | сектантский конфликт (1) |
сектантство (1) | сектор за сигурност (1) | сектор обороны и безопасности (1) |
Сендайская рамочная программа (1) | Сендайская структура (1) | серая зона (7) |
Сербия (3) | сержант (1) | сети (1) |
сигурност (9) | сила (1) | силовая политика (1) |
силовики. (1) | силы безопасности (1) | Силы обороны Венгрии (1) |
симулации (1) | симулационни тренажори (1) | симуляция (1) |
Синефин (1) | синтетическая биология (1) | Сирия (3) |
система (1) | система безопасности (2) | система за миграция/асимилация (1) |
система сдержек и противовесов (1) | систематическая коррупция (1) | системи за електронно обучение (1) |
системи за подпомагане вземането на решения (1) | ситуационный анализ (1) | Словакия (1) |
Словения (1) | службы национальной безопасности. (1) | служител с пагони (1) |
смесената дигитална реалност (1) | соблюдение требований (1) | Совет Европы (1) |
совместимость (1) | совместное создание (1) | совместный центр комплексирования (1) |
Соединенное Королевство (1) | создание потенциала (1) | создание способностей (1) |
СОИ (3) | солидарность ЕС (1) | Сомали (1) |
соответствие (1) | соперничество великих сил (1) | сотрудничество (8) |
сотрудничество в области безопасности (1) | сотрудничество в разведке (1) | сотрудничество НАТО-ЕС (1) |
сотрудничество Россия-НАТО (1) | сотрудничество с США в сфере безопасности (1) | социализм (1) |
социална изолация (1) | социални мрежи (1) | социальная структура (1) |
социальные медиа (1) | социальные сети (2) | соцсети (1) |
Спектър на заплахи (1) | специализация (3) | специальная военная операция (1) |
сплоченность (1) | способности (8) | способности за сигурност (1) |
справляться (1) | сравнительное развитие (1) | среда за управление на КПУ (1) |
средства массовой информации (1) | стабилизационные миссии (1) | стабилизация (3) |
стабильность (2) | стандарт (1) | стандарти за защита (1) |
стандартни оперативни процедури (1) | статус наблюдателя (1) | стойкость (3) |
стохастична валидация (1) | стра¬тегический обзор обороны (1) | стратегическа карта (1) |
стратегическая коммуникация (3) | стратегические коммуникации (2) | стратегические нарративы (1) |
стратегические послания. (1) | стратегический диалог ЕС-США (1) | стратегический менеджмент (1) |
стратегический риск (1) | стратегическое планирование (1) | стратегическое противоборство (1) |
стратегическое сдерживание (1) | стратегическое управление (1) | стратегия (8) |
стратегия за развитие (1) | стратегия кибербезопасности (1) | Стратегия национальной безопасности (1) |
строительство институтов обороны (1) | строительство институционального потенциала (1) | Строительство Оборонных Институтов (5) |
структури за управление при кризи (1) | структурна реформа (1) | структурная трансформация (1) |
студенти (1) | субкультура (1) | субъекты перемен (1) |
суверенитет (2) | суверенитет Беларуси (1) | Сун Цзы (1) |
Сухарто (1) | сценарии (1) | сценарии за планиране (1) |
сценарий (1) | США (3) | сътрудничество (1) |
Таджикистан (1) | Тайвань (2) | тайная полиция (1) |
таксономия (2) | таксономия устойчивости (1) | тактическое ядерное оружие (1) |
Талибан (1) | Твиттер (1) | теории лидерства (1) |
теория (1) | теория игр (1) | теория сложности (1) |
теория сложности вычислений (1) | теория управления (1) | терроризм (12) |
террористическое государство (3) | тестове (1) | техники (1) |
техно-социални рискове и заплахи (1) | технологии (2) | технология (1) |
Тимор-Лешти (1) | толерантность (1) | топ 10 актуални заплахи (1) |
торговая политика (1) | торговля людьми (1) | тоталитаризм (1) |
трансгранично въздействие (1) | трансформация (2) | тристълбова система за управление при бедствия (1) |
триъгълник на противоречията (1) | Тунис (1) | Турция (1) |
угон автомобилей (1) | угроза радикализма (1) | угрозы кибербезопасности (1) |
уеб услуги (1) | Узбекистан (1) | уйгуры (1) |
Украина (17) | Украина7 (1) | украинский кризис (1) |
Украйна (2) | укрепване на отбранителни институции (1) | укрепление доверия (1) |
улучшение имиджа (1) | умения (1) | Унгария (1) |
университет (1) | управление (8) | управление данными (1) |
управление кадрами (2) | управление на проекти/програми (1) | Управление при кризи (1) |
уравновешивание (1) | условия (1) | устойчи¬вость (1) |
устойчивост (2) | устойчивость (11) | устойчивость граждан (1) |
устойчивость для мира (1) | устойчивость к конфликту (1) | учебная программа (1) |
учебные программы вуза (1) | учения (1) | уязвимост (1) |
уязвимости (3) | Федерированная информационная система для миссий (1) | фейковые новости (1) |
фирма (1) | формирование имиджа (1) | Франция (1) |
функции на сигурността (1) | функция (1) | фьюжн центр (1) |
хакери (1) | халифат (2) | хибриден конфликт (1) |
хибридна корпоративна мрежова система (1) | хорошее управление (1) | Хофстеде (3) |
Хуба Васс де Чезе (1) | цел (2) | ценности (1) |
централизация (2) | централизирана структура (1) | Централна Азия (2) |
Центральная Азия (2) | Центральная Европа (1) | цены на удобрения (2) |
цифровая грамотность (1) | цифровая ответственность (1) | человеческое измерение (1) |
Черна гора (1) | Черногория (2) | Чёрное море (1) |
черноморская безопасность (1) | Черноморский регион (1) | Чехословакия (1) |
Чечня (1) | Чешская Республика (1) | членство (1) |
Шанхайская организация сотрудничества (1) | Шелковый путь (1) | Школа НАТО в Обераммергау (2) |
экономическая дипломатия (1) | экономическая инфильтрация (1) | экономические последствия (2) |
экономический рост (1) | экономический след (1) | экономическое НАТО (1) |
экономическое принуждение (1) | экосистема (1) | экспедиционные операции (1) |
экстремизм (1) | электронное обучение (2) | эмоциональная война (1) |
энергетическая безопасность (1) | энергетическая геополитика (1) | энергетическая зависимость (2) |
энергетическая инфраструктура (1) | энергетический комплекс (1) | энергоресурсы (1) |
эскалация (1) | этика и государственная служба (1) | эффективность (1) |
Южная Африка (1) | Южная Корея (1) | Южная Осетия (1) |
Южный Кавказ (2) | язык ненависти (2) | языковое обучение (1) |
языковой национализм (1) | Япония (1) | “Cost-Effec-tiveness” Analysis. (1) |
„balance of consequences“ (1) | | |