<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lyubomir Monov</style></author><author><style face="normal" font="default" size="100%">Maksim Karev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">How to Counter Hybrid Threats?</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision-making process</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threat</style></keyword><keyword><style  face="normal" font="default" size="100%">national interest</style></keyword><keyword><style  face="normal" font="default" size="100%">net context</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">113-126</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue.
In order to discover possible hybrid actions, we need a methodology that considers national interests with major trends and threats with weaknesses and impacts. The implementation of such methodology will provide enough data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">113</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CASoS</style></keyword><keyword><style  face="normal" font="default" size="100%">CIP</style></keyword><keyword><style  face="normal" font="default" size="100%">complex adaptive systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">ECI</style></keyword><keyword><style  face="normal" font="default" size="100%">EU Directive 114/2008</style></keyword><keyword><style  face="normal" font="default" size="100%">interdependency</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge management</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge portal</style></keyword><keyword><style  face="normal" font="default" size="100%">method</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword><keyword><style  face="normal" font="default" size="100%">tool</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">13-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Critical infrastructures are complex, interlinked socio-technical systems, with impact often crossing state borders. Their protection involves governments and business organisations, interacting in the application of a broad variety of measures to provide safety and security while investing a considerable amount of public and private resources. This paper examines the challenge of making respective policy and investment decisions transparent, and a sample of methods and tools used to facilitate decision making. It also calls for contributions to a knowledge portal on security and safety of critical infrastructures. </style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yvan Gauthier</style></author><author><style face="normal" font="default" size="100%">Jay Adamsson</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Decision Support Tools for Domestic Security Operations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CBRNE</style></keyword><keyword><style  face="normal" font="default" size="100%">civil assistance</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">domestic operations</style></keyword><keyword><style  face="normal" font="default" size="100%">major security events</style></keyword><keyword><style  face="normal" font="default" size="100%">Modelling</style></keyword><keyword><style  face="normal" font="default" size="100%">Natural Disasters</style></keyword><keyword><style  face="normal" font="default" size="100%">pandemics</style></keyword><keyword><style  face="normal" font="default" size="100%">simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">wiki.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">123-137</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper documents the production of a compendium of modelling and simulation (M&amp;S) tools useful for decision support to organizations engaged in domestic defence and security operations. The compendium was created on GCPEDIA, a wiki application accessible to all federal government departments and agencies in Canada. It includes tools for predicting the consequences of natural and man-made disasters, planning major event security, assessing infrastructure criticality, planning surveillance missions, and analyzing other issues relevant to domestic operations. Given the wide accessibility of the compendium within the Government of Canada, a large community of practice can use, update, and expand on the information collected</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Robert K. Murphy</style></author><author><style face="normal" font="default" size="100%">Scott D. Beach</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Using Strategic Planning in Support of Defense Acquisitions</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">airpower</style></keyword><keyword><style  face="normal" font="default" size="100%">analytical hierarchy process.</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">defense planning</style></keyword><keyword><style  face="normal" font="default" size="100%">force structuring</style></keyword><keyword><style  face="normal" font="default" size="100%">multi-attribute value theory</style></keyword><keyword><style  face="normal" font="default" size="100%">procure­ment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">25</style></volume><pages><style face="normal" font="default" size="100%">57-77</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Our environment is continuously changing. Government must address challenges in global security that includes traditional conflicts as well as catastro­phic events, irregular warfare, and disruptive technologies. The economy is just as important, where jobless rates remain high and markets are unstable. The outcome of this will be multiple priorities, all requiring a portion of the budget, which in turn will result in fewer dollars for defense. Fortunately, there are ways to ensure that defense priorities receive the required funding. By following a simple process for developing an analytically-based strategic plan, the defense sector will dramati­cally improve the chances of acquiring funding. The outcome of this will be to pro­cure best value solutions that support a nation’s national security strategy. This will dramatically improve a country’s military defense posture. This paper will review the strategic planning process as applied to military force structure and procurement decisions. In addition, the paper will discuss the Force Matrix Model, a key analy­sis tool to identify and assess best value solutions within this strategic planning paradigm.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Leonid Polyakov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">budgeting.</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">defence planning</style></keyword><keyword><style  face="normal" font="default" size="100%">scientific organizations</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">27-31</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The First Deputy Minister of Defence of Ukraine examines the chal­lenges of transformation at three levels—conceptual, planning/programming, and implementation of force development programmes—and the main challenges that require scientific support from research organisations in the Ukrainian defence es­tablishment.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Gueorgui Stankov</style></author><author><style face="normal" font="default" size="100%">Lozan Bizov</style></author><author><style face="normal" font="default" size="100%">Atanas Natchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Framework Methodology to Support the Selection of a Multipurpose Fighter</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">AHP</style></keyword><keyword><style  face="normal" font="default" size="100%">contract management</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">defense acquisition management</style></keyword><keyword><style  face="normal" font="default" size="100%">Defense procurement</style></keyword><keyword><style  face="normal" font="default" size="100%">DSS</style></keyword><keyword><style  face="normal" font="default" size="100%">risk management</style></keyword><keyword><style  face="normal" font="default" size="100%">Transparency</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">82-91</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The procurement of multipurpose fighter planes is one of the major procurement, or modernization projects, announced by Bulgaria’s Ministry of Defense in 2002, but a procurement case has not been initiated so far. This article calls for a transparent decision-making process within a rational framework, based on both qualitative and quantitative analysis, that would allow to select “the best” multipurpose fighter for the Bulgarian Air Force. After outlining the main assumptions, the authors examine the issue of identifying and structuring the criteria for selection of a multipurpose fighter, describe the main steps of a rational, quantitatively-based, transparent decision-making process and analyze the major decision support requirements, as well as methods and tools that may be used in providing analytical support to both the selection process and the follow-on contract and project management.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computational Intelligence in Multi-Source Data and Information Fusion</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Computational Intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">Forecasting</style></keyword><keyword><style  face="normal" font="default" size="100%">Fuzzy Logic</style></keyword><keyword><style  face="normal" font="default" size="100%">Genetic Algorithms</style></keyword><keyword><style  face="normal" font="default" size="100%">MSDF</style></keyword><keyword><style  face="normal" font="default" size="100%">Neural Networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Pattern Recognition</style></keyword><keyword><style  face="normal" font="default" size="100%">Soft Computing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1999</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1999</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">33-49</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A model of MultiSource Information Fusion (MSIF) is proposed. It expands the application of proven MSDF techniques to diverse problem areas. This model allows for a unified framework clearly distinguishing processing functions from methods dealing with partial, uncertain, and imprecise information. The concept of computational intelligence provides for a holistic approach to design and integration of methods and algorithms for information fusion. We describe the application of computational intelligence to the fusion of data and information in two studies of early warning. The emphasis is on the power of soft-computing methods in designing early warning architectures pertinent to forecasting events in complex dynamical systems. </style></abstract></record></records></xml>