{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Semenenko, Oleh, Liliia Semenenko, Roman Sirchenko, Mariia Yarmolchyk, and Vitalii Kostrach. "Modernizing Personnel Management in the Armed Forces of Ukraine During Military Conflict: Training New Officers." \i Connections: The Quarterly Journal\i0  22, no. 2 (2023): 105-124.\par \par Sink\'f3, G\'e1bor, and J\'e1nos Beseny?. "More than Survival: The Role of al-Shabaab Secret Service, Amniyat, in Information-Gathering." \i Connections: The Quarterly Journal\i0  22, no. 1 (2023): 99-111.\par \par Georgiev, Venelin. \i Rights, Goals, Security\i0  In \i CSDM Views\i0 ., 2023.\par \par Ivanov, Bozhidar. "Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment." \i Information & Security: An International Journal\i0  51, no. 1 (2022): 25-35.\par \par Bald?ran, Selen, Din\'e7er Bayer, and H\'fcseyin Gen\'e7er. "The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022." \i Information & Security: An International Journal\i0  51, no. 1 (2022): 11-23.\par \par Shalamanov, Velizar, Ivan Blagoev, and Iliyan Iliev. \i Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg\i0  In \i IT4Sec Reports\i0 ., 2022.\par \par Kovalenko, Anna. "Neo-Authoritarianism and Leadership: Outcomes for Modern Ukraine." \i Connections: The Quarterly Journal\i0  21, no. 1 (2022): 105-120.\par \par Georgiev, Venelin. \i Productive and Counter-Productive Balance in Security\i0  In \i CSDM Views\i0 ., 2022.\par \par Popova, Albena. \i Airport Security Management System? Model\i0  In \i IT4Sec Reports\i0 ., 2021.\par \par Georgiev, Venelin. \i A Conceptual Model for Resilience in the field of Secuirty\i0  In \i IT4Sec Reports\i0 ., 2021.\par \par Parsons, Timothy, James J. Nolan, and Frank Crispino. "Multinational Cooperation and Intervention: Small Steps to Better Results." \i Information & Security: An International Journal\i0  48, no. 2 (2021): 160-170.\par \par Sharkov, George, Christina Todorova, and Pavel Varbanov. "Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification." \i Information & Security: An International Journal\i0  50, no. 1 (2021): 11-22.\par \par Popova, Albena. \i Tools for Managing an Airport Security System\i0  In \i IT4Sec Reports\i0 ., 2021.\par \par Brazhenenko, Maksym, Victor Shevchenko, Oleksiy Bychkov, Boyan Jekov, Pepa Petrova, and Eugenia Kovatcheva. "Adopting Machine Learning for Images Transferred with LoRaWAN." \i Information & Security: An International Journal\i0  47, no. 2 (2020): 172-186.\par \par Georgiev, Venelin. \i On Conflicts, Interests, Goals, Power, and Security\i0  In \i CSDM Views\i0 ., 2020.\par \par Kharchenko, Vyacheslav, Sergiy Dotsenko, Yuriy Ponochovnyi, and Oleg Illiashenko. "Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application." \i Information & Security: An International Journal\i0  47, no. 1 (2020): 77-90.\par \par Georgiev, Venelin. \i Demography, Capabilies and Security\i0  In \i IT4Sec Reports\i0 ., 2020.\par \par Antonov, Petar, and Nikoleta Georgieva. "Security Analysis of Diceware Passphrases." \i Information & Security: An International Journal\i0  47, no. 2 (2020): 276-282.\par \par Staneva, Elisaveta, and Mariyan Rachev. "Tactical Approach to Cyber Defence in IoT Computer Networks." \i Information & Security: An International Journal\i0  47, no. 1 (2020): 135-140.\par \par Zoteva, Dafina, Peter Vassilev, Lyudmila Todorova, Krassimir Atanassov, Lyubka Doukovska, and Valery Tzanov. "\i Generalized Net Model of Cyber-control of the Firm?s Dumpers and Crushers\i0 ." In \i DIGILIENCE 2019\i0 . Sofia, Bulgaria, 2019.\par \par Iliev, Rosen, and Kristina Ignatova. "Implementation of Cloud Technologies for Building Data Centers in Defence and Security." \i Information & Security: An International Journal\i0  43, no. 1 (2019): 89-97.\par \par Dotsenko, Sergiy, Oleg Illiashenko, Sergii Kamenskyi, and Vyacheslav Kharchenko. "Integrated Security Management System for Enterprises in Industry 4.0." \i Information & Security: An International Journal\i0  43, no. 3 (2019): 294-304.\par \par Iskandarov, Khayal, Gregory Simons, and Piotr Gawliczek. "The South Caucasus: Stage for a ?New Great Game? between NATO and Russia?" \i Connections: The Quarterly Journal\i0  18, no. 3 (2019): 7-34.\par \par Naydenov, Mihail. "Building the Capacity of NATO?s Eastern European  Members to Fight Hybrid War." \i Information & Security: An International Journal\i0  41 (2018): 45-58.\par \par Nikolic, Nebojsa. "Connecting Conflict Concepts: Hybrid Warfare and Warden?s Rings." \i Information & Security: An International Journal\i0  41 (2018): 21-34.\par \par Daskalov, Krassen. "Hybrid Warfare and the Challenge It Poses to the Psychological Resilience Training in the Bulgarian Military." \i Information & Security: An International Journal\i0  39, no. 3 (2018): 197-205.\par \par Bin, Alberto. "NATO?s Defense Institution Building and Projecting Stability: Current Priorities and Activities." \i Connections: The Quarterly Journal\i0  17, no. 3 (2018): 8-22.\par \par Kozie?, Marcin. "NATO?s Defense Institution Building in the Age of Hybrid Warfare." \i Connections: The Quarterly Journal\i0  17, no. 3 (2018): 39-51.\par \par Nikolic, Nebojsa. "Obstacles in Inter-Organizational Cooperation and Hybrid Threats." \i Information & Security: An International Journal\i0  39, no. 1 (2018): 29-41.\par \par Medvedchuk, Oksana. "Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures." \i Information & Security: An International Journal\i0  40, no. 2 (2018): 129-133.\par \par Bugriy, Maksym. "Ukraine?s Security Sector Reform: Is Ukraine Taking Western Advice?" \i Connections: The Quarterly Journal\i0  17, no. 3 (2018): 72-91.\par \par Causevic, Amar. "Facing an Unpredictable Threat: Is NATO Ideally Placed to Manage Climate Change as a Non-Traditional Threat Multiplier?" \i Connections: The Quarterly Journal\i0  16, no. 2 (2017): 59-80.\par \par Nasirov, Elman, and Khayal Iskandarov. "The Prospects of Azerbaijan to Enhance Military Interoperability with NATO." \i Connections: The Quarterly Journal\i0  16, no. 4 (2017): 89-99.\par \par Nasirov, Elman, Khayal Iskandarov, and Sadi Sadiyev. "The South Caucasus: A playground between NATO and Russia?" \i Connections: The Quarterly Journal\i0  16, no. 3 (2017): 47-56.\par \par Pomorova, Oksana, and Sergii Lysenko. "Formal and Intelligent Methods  for Security and Resilience:  Education and Training Issues." \i Information & Security: An International Journal\i0  35, no. 2 (2016): 133-150.\par \par ?aji?, Jasmin. "The Relevance of Clausewitz?s Theory of War to Contemporary Conflict Resolution." \i Connections: The Quarterly Journal\i0  15, no. 1 (2016): 72-78.\par \par Boyarchuk, Artem, Oleg Illiashenko, Vyacheslav Kharchenko, and J\'fcri Vain. "Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains." \i Information & Security: An International Journal\i0  35, no. 1 (2016): 29-48.\par \par Tasevski, Predrag. "Macedonian Path Towards Cybersecurity." \i Information & Security: An International Journal\i0  32, no. 2 (2015): 109-119.\par \par Nikolic, Nebojsa. "Serbian Security Perceptions: Motivations to Serve." \i Information & Security: An International Journal\i0  33, no. 2 (2015): 122-137.\par \par Barakovi?, Sabina, and Jasmina Barakovi? Husi?. "?We Have Problems for Solutions?: The State of Cybersecurity in Bosnia and Herzegovina." \i Information & Security: An International Journal\i0  32, no. 2 (2015): 131-154.\par \par Proch\'e1zkov\'e1, Dana. "The EU Civil Protection Upgrading Needs." \i Information & Security: An International Journal\i0  29, no. 1 (2013): 88-108.\par \par Munn\'e9, Ricard. "Future Security Trends and Their Impact from an Industry Point of View." \i Information & Security: An International Journal\i0  29, no. 2 (2013): 147-160.\par \par Proch\'e1zkov\'e1, Dana. "Natural Disasters? Management and Detection of Priority Problems for Future Research." \i Information & Security: An International Journal\i0  29, no. 2 (2013): 127-144 .\par \par Gorbenko, Anatoliy, Vyacheslav Kharchenko, Olga Tarasyuk, and Alexander Romanovsky. "Intrusion-Avoidance via System Diversity." \i Information & Security: An International Journal\i0  28, no. 1 (2012): 154-158.\par \par Netkachova, Kateryna. "Model and Implementation of Safety Case Cores." \i Information & Security: An International Journal\i0  28, no. 2 (2012): 286-295.\par \par Mashhour, Ahmad, and Zakaria Saleh. "Evaluating Wireless Networks Security in Jordan: A Field Study." \i Information & Security: An International Journal\i0  26, no. 1 (2011): 34-43.\par \par Allen, Thomas. "US Department of Defense Modeling and Simulation: New Approaches and Initiatives." \i Information & Security: An International Journal\i0  23, no. 1 (2009): 32-48.\par \par Gruszczak, Artur. "Networked Security Governance: Reflections on the E.U.?s Counterterrorism Approach." \i Journal of Global Change and Governance\i0  I, no. 3 (2008).\par \par Wallmark, Magnus. "Interoperability between Agencies and Nations." \i Information & Security: An International Journal\i0  16 (2005): 5-9.\par \par Hwang, Min-Shiang, Chun-Ta Li, Jau-Ji Shen, and Yen-Ping Chu. "Challenges in E-Government and Security of Information." \i Information & Security: An International Journal\i0  15, no. 1 (2004): 9-20.\par \par Zhan, Justin, Li-Wu Chang, and Stan Matwin. "Privacy-Preserving Electronic Voting." \i Information & Security: An International Journal\i0  15 (2004): 165-180.\par \par Editorial. "Advances in Modelling and Simulation." \i Information & Security: An International Journal\i0  12, no. 1 (2003): 5-15.\par \par Carbo, Javier, Jos\'e9 M. Molina, and Jorge Davila. "Argumentative Negotiations with Anonymous Informer Agents." \i Information & Security: An International Journal\i0  8, no. 2 (2002): 194-206.\par \par Lin, Iuon-Chang, Hsia-Hung Ou, and Min-Shiang Hwang. "Two Secure Transportation Schemes for Mobile Agents." \i Information & Security: An International Journal\i0  8 (2002): 87-97.\par \par Tselkov, Veselin, and Dragomir Pargov. "Information Assurance in C4I Systems." \i Information & Security: An International Journal\i0  4 (2000): 43-59.\par \par Popov, Metodi. "Security Aspects of the Cellular Communications." \i Information & Security: An International Journal\i0  4 (2000): 73-94.\par \par }