{"title":"Work Package: Real-time Data Processing in Adaptive Sensor Interfaces","authors":"I. Monitor","doi":"10.11610/ISIJ.0913","DOIUrl":"https://doi.org/10.11610/ISIJ.0913","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid development of information technologies in the last decades of the twentieth century created opportunities to increase the effectiveness in practically every area of human activity. The use of ever more powerful computers contributed to a better understanding of the nature of many social, economic, physical and physiological phenomena. Somewhat surprising was the discovery that the increase of data collection and information processing power does not necessarily increase our ability to define cause-effect relationships and to predict the development of realworld processes. Computers helped us to discard certain paradigms and to reveal some characteristics of nonlinear behavior and complex interaction. Nevertheless, our abilities to analyze, model, and predict is still rather limited. A number of methods have been proposed that combine the power of computer processing with attempts to imitate biological processing and human intellect. A new framework recently emerged – computational intelligence (CI). The application of CI methods to the problem of fusing data and information from multiple sources has significant potential, not yet fully discovered.
{"title":"Computational Intelligence in Multi-Source Data and Information Fusion","authors":"T. Tagarev, Petya I. Ivanova","doi":"10.11610/ISIJ.0203","DOIUrl":"https://doi.org/10.11610/ISIJ.0203","url":null,"abstract":"The rapid development of information technologies in the last decades of the twentieth century created opportunities to increase the effectiveness in practically every area of human activity. The use of ever more powerful computers contributed to a better understanding of the nature of many social, economic, physical and physiological phenomena. Somewhat surprising was the discovery that the increase of data collection and information processing power does not necessarily increase our ability to define cause-effect relationships and to predict the development of realworld processes. Computers helped us to discard certain paradigms and to reveal some characteristics of nonlinear behavior and complex interaction. Nevertheless, our abilities to analyze, model, and predict is still rather limited. A number of methods have been proposed that combine the power of computer processing with attempts to imitate biological processing and human intellect. A new framework recently emerged – computational intelligence (CI). The application of CI methods to the problem of fusing data and information from multiple sources has significant potential, not yet fully discovered.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116128769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The White Paper of Civil Protection of the Republic of Bulgaria","authors":"I. Monitor","doi":"10.11610/ISIJ.1614","DOIUrl":"https://doi.org/10.11610/ISIJ.1614","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122709101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article elaborates on an important aspect of Navy transformation - the role of C4ISR concept. It provides a comprehensive treatment of enabling the transformation C4ISR issues, such as the role and importance of network centricity and the joint research in general, the necessity for and the benefits of concept de- velopment and experimentation and advanced technology demonstrations, etc. The author shares his opinion on a topic that deserves special attention - that of the suc- cessful development and insertion of the C4ISR systems in the navy establishments. The role of the academia represented by the Center for National Security and De- fense Research (CNSDR) in the Bulgarian Academy of Sciences (BAS) as a key element in Navy transformation is particularly emphasized.
{"title":"C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations","authors":"Velizar Shalamanov","doi":"10.11610/ISIJ.1303","DOIUrl":"https://doi.org/10.11610/ISIJ.1303","url":null,"abstract":"This article elaborates on an important aspect of Navy transformation - the role of C4ISR concept. It provides a comprehensive treatment of enabling the transformation C4ISR issues, such as the role and importance of network centricity and the joint research in general, the necessity for and the benefits of concept de- velopment and experimentation and advanced technology demonstrations, etc. The author shares his opinion on a topic that deserves special attention - that of the suc- cessful development and insertion of the C4ISR systems in the navy establishments. The role of the academia represented by the Center for National Security and De- fense Research (CNSDR) in the Bulgarian Academy of Sciences (BAS) as a key element in Navy transformation is particularly emphasized.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"674 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information warfare principles and operations","authors":"I. Monitor","doi":"10.11610/isij.0212","DOIUrl":"https://doi.org/10.11610/isij.0212","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114294599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bulgarian Air Force - Challenges and Prospects","authors":"S. Simeonov","doi":"10.11610/ISIJ.2101","DOIUrl":"https://doi.org/10.11610/ISIJ.2101","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121885915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of modern information technologies and innovations in all areas of life resulted in new threats to national and international security. Over the past decade, such threats as transnational cybercrime, cyber terrorism, the use of cyber weapons transformed from potential and hypothetical into real ones. Combating those threats has become a priority of the national security and defence sector. The article focuses on how the profound changes in the global security system, in combination with the evolution of the cyber threats, influenced the activities of the Security Service of Ukraine (SBU), turning the Service in a key element of the future national cybersecurity system. The author reasons for enhanced international cooperation and systematises practical examples of effective international efforts to counter cyber threats.
{"title":"Protecting the National Interests in the Domain of Information Security as a Functional Task of the SBU","authors":"V. Bik","doi":"10.11610/isij.3103","DOIUrl":"https://doi.org/10.11610/isij.3103","url":null,"abstract":"The development of modern information technologies and innovations in all areas of life resulted in new threats to national and international security. Over the past decade, such threats as transnational cybercrime, cyber terrorism, the use of cyber weapons transformed from potential and hypothetical into real ones. Combating those threats has become a priority of the national security and defence sector. The article focuses on how the profound changes in the global security system, in combination with the evolution of the cyber threats, influenced the activities of the Security Service of Ukraine (SBU), turning the Service in a key element of the future national cybersecurity system. The author reasons for enhanced international cooperation and systematises practical examples of effective international efforts to counter cyber threats.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122142714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet brings together people geographically and culturally unrelated to each other. This is one of the most remarkable features of electronic communities. In such context there is an extended sense of anonymity where trust and confidence might take place easier than in real life. Information Agencies may benefit from this feature of electronic communication in their endeavour to acquire secret information from previously unknown sources.
{"title":"ARGUMENTATIVE NEGOTIATIONS WITH ANONYMOUS INFORMER AGENTS","authors":"J. Carbo, J. M. Molina, J. Davila","doi":"10.11610/ISIJ.0811","DOIUrl":"https://doi.org/10.11610/ISIJ.0811","url":null,"abstract":"Internet brings together people geographically and culturally unrelated to each other. This is one of the most remarkable features of electronic communities. In such context there is an extended sense of anonymity where trust and confidence might take place easier than in real life. Information Agencies may benefit from this feature of electronic communication in their endeavour to acquire secret information from previously unknown sources.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129610913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
n May 12, 2000, in Varna on the Bulgarian Black Sea coast new Chapter of the Armed Forces Communications and Electronics Association (AFCEA) was founded. This second Bulgarian Chapter of AFCEA will pursue the objectives and abide to the principles of AFCEA International paying special attention to the Navy and marine technologies and, thus, contributing to the success of the Bulgarian military reform, as well as to strengthening the maritime power and national security.
{"title":"New AFCEA Chapter in South-East Europe","authors":"I. Monitor","doi":"10.11610/ISIJ.0510","DOIUrl":"https://doi.org/10.11610/ISIJ.0510","url":null,"abstract":"n May 12, 2000, in Varna on the Bulgarian Black Sea coast new Chapter of the Armed Forces Communications and Electronics Association (AFCEA) was founded. This second Bulgarian Chapter of AFCEA will pursue the objectives and abide to the principles of AFCEA International paying special attention to the Navy and marine technologies and, thus, contributing to the success of the Bulgarian military reform, as well as to strengthening the maritime power and national security.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129784601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The same Information and Communication Technologies (ICT) that have contributed tremendously to the productivity of supply chain companies and gov¬ ernments alike, as well as to the global competit ...
同样的信息和通信技术(ICT)对供应链公司和政府的生产力以及全球竞争做出了巨大贡献……
{"title":"Supply Chain Cyber Security – Potential Threats","authors":"L. Urciuoli, T. Männistö, J. Hintsa, Tamanna Khan","doi":"10.11610/ISIJ.2904","DOIUrl":"https://doi.org/10.11610/ISIJ.2904","url":null,"abstract":"The same Information and Communication Technologies (ICT) that have contributed tremendously to the productivity of supply chain companies and gov¬ ernments alike, as well as to the global competit ...","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}