Best Practices in the Application of the Concept of Resilience: Building Hybrid Warfare and Cybersecurity Capabilities in the Hungarian Defense Forces Author(s): A. Hugyik 20 Dec 2020
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine Author(s): M. Pleskach; V. Pleskach; A. Semenchenko; D. Myalkovsky; T. Stanislavsky 02 Dec 2020
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages Author(s): P. Poptchev 17 Nov 2020
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack Author(s): D. Dimov; Y. Tsonev 14 Sep 2020
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies Author(s): I. Skiter; I. Burmaka; A. Sigayov 14 Sep 2020
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices Author(s): S. Mechev; E. Staneva; M. Rachev 14 Sep 2020
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base Author(s): E. Andreev; M. Nikolova; V. Radeva 14 Sep 2020
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy Author(s): N. Georgieva 14 Sep 2020
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour Author(s): L.C. de Kok; D. Oosting; M. Spruit 14 Sep 2020
Model Fooling Attacks Against Medical Imaging: A Short Survey Author(s): T. Sipola; S. Puuska; T. Kokkonen 14 Sep 2020
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence Author(s): J. Rajamäki; V. Katos 14 Sep 2020
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information Author(s): N. Stoianov; M. Bozhilova 14 Sep 2020
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness Author(s): G. Sharkov; Y. Papazov; C. Todorova; G. Koykov; G. Zahariev 14 Sep 2020
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON Author(s): G. Penchev; A. Shalamanova 10 Sep 2020
Organizational Learning in the Academic Literature – Systematic Literature Review Author(s): H. Ruoslahti; A. Trent 10 Sep 2020
Societal Impact Assessment of a Cyber Security Network Project Author(s): K. Aaltola; H. Ruoslahti 10 Sep 2020
A New Steganographic Algorithm for Hiding Messages in Music Author(s): M. Bajor; M. Niemiec 15 May 2020
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space Author(s): V. Shevchenko; G. Dimitrov; D. Berestov; P. Petrova; I. Sinitcyn; E. Kovatcheva; I. Garvanov; I. Kostadinova 15 May 2020
Signature-based Intrusion Detection Hardware-Software Complex Author(s): I.V. Stetsenko; M. Demydenko 15 May 2020
Cyber Threat Prediction with Machine Learning Author(s): A. Kok; I.Ilic Mestric; G. Valiyev; M. Street 15 May 2020