Most cited

Article Authors Citations
A Software Agent-based Collaborative Approach for Humanitarian-Assistance Scenarios Z. Maamar; N. Sahli; B. Moulin; P. Labbé (15)
Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains T. Tagarev; V. Georgiev; J. Ahokas (14)
Future Security Trends and Their Impact from an Industry Point of View R. Munné (14)
Natural Disasters’ Management and Detection of Priority Problems for Future Research D. Procházková (14)
Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains D. López; O. Pastor (14)
The EU Civil Protection Upgrading Needs D. Procházková (14)
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective V. Shalamanov (23)
Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects V. Georgiev (14)
Referencing the Future: The EU’s Projected Security Roles and Their R&D Implications B. Tigner (14)
Scenario Space for Alternative Futures of Security Research T. Benesch; J. Goellner; A. Peer; J. Hoechtl; W. Seboeck (14)
Information Support for Effective Resource Management D. Totev; B. Boudinova (22)
Data Science as a Service: The Data Range P. Lenk; M. Street; I.Ilic Mestric; A. Kok; G. Valiyev; P. Le Cerf; B. Lorincz (12)
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application V. Kharchenko; S. Dotsenko; Y. Ponochovnyi; O. Illiashenko (12)
e-Platform Architecture for Organisational Collaboration and IT Education S. Matern (12)
A Cost-Effective Approach to Securing Systems through Partial Decentralization N. Savchenko; V. Tsyganok; O. Andriichuk (12)
Instrumental Equipment for Cyberattack Prevention A. Kolev; P. Nikolova (12)
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer D. Angelova; E. Semerdjiev; L. Mihaylova; R. Li (14)
Public Key Generation Principles Impact Cybersecurity N. Stoianov; A. Ivanov (12)
3D Facial Reconstruction from 2D Portrait Imagery M. Caruana; J.G. Vella (12)
A New Steganographic Algorithm for Hiding Messages in Music M. Bajor; M. Niemiec (12)
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data J. Rajamäki (12)
Security Analysis of Diceware Passphrases P. Antonov; N. Georgieva (12)
National Military Command Center - From Idea to Implementation N. Petrov (11)
Preparation of the Population and the Healthcare System for Action in Cases of Radiation Accidents and Nuclear Terrorism J. Djounova; L. Hadjiiski; N. Chobanova (11)
Towards Creation of a Unified Information System of the Navies of the Black Sea Countries P. Petrov (27)

Pages