Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
C4ISR FOR Advanced Defence Capabilities and Security
6
Human Intuition and Decision-making Systems (II)
6
Biometric Template Security Using Code Base Cryptosystem
6
Intelligent Methods for Big Data Analytics and Cyber Security
6
Modern Information Technologies and General Public Protection in the Republic of Bulgaria
6
An Accelerated IMM-JPDA Algorithm for Tracking Multiple Maneuvering Targets in Clutter
6
A New Technique for Enhancing the Properties of Transmitted Data
6
Operations Analysis in the Netherlands: A Brief Overview
6
Organization and Immediate Challenges of Civil Protection in Bulgaria
6
Air Force Transformation resources
6
Center for Security Studies and Conflict Research
6
LAN Times Guide to Security and Data Integrity
6
An Effective Doppler Filtering Using Higher-Order Statistics
6
Monitor Reference
6
Information in providing security and prosperity
6
Protecting the National Interests in the Domain of Information Security as a Functional Task of the SBU
6
AFCEA Bulgarian Chapter Varna
5
Standards Integration in E-Learning, Simulations, and Technical Manuals
5
Experimental Validation Of Metamodels For Intelligent Agents In Conflict
5
Optimization of the Multi-Source Data Fusion System for Integration on the Canadian Patrol Frigate
5
Bulgarian Air Force - Challenges and Prospects
5
Network Security Fundamentals
5
Main Challenges for the Bulgarian Armed Forces Transformation
5
Fusing Uncertain, Imprecise, and Paradoxist Information (DSmT)
5
Multi-agent Systems research: General research - on-line resources
5
Cryptographic Software Solution for Information Protection in a Corporate Intranet
5
Library Update
5
AFCEA Varna Hosts Second International Conference on the Bulgarian Navy
5
Budget Transparency Initiative Website
5
Fuzzy Logic Approach to Estimating Tendencies in Target Behavior
5
Multi-agent systems: Selected reading
5
Argumentative Negotiations with Anonymous Informer Agents
5
Bulgarian MSDF R&D National Program and Activities
5
Library Update 2
5
Cyber-Energy Infrastructure Vulnerabilities in the Hybrid Warfare Environment: Some DoD Mitigation Efforts
5
Decision Model Analysis for Spam
5
A Call for Holistic Approach to Defence Transparency in South East Europe
5
Integrating Web, Desktop, Enterprise and Military Simulation Technologies to Enable World-Wide Scalable Televirtual Environments
5
Commercial-Off-The-Shelf Software Becomes Mission-Critical to Success and Cost-Effective Space Missions
5
Interface Solutions for Improving Information Interoperability in the Conditions of Hybrid Threats
5
Advanced Distance Learning for Training National Peacekeeping Forces
5
Challenges of Naval Transformation
5
E-Tender - An Approach for Ensuring Transparency in Defence Budget Management
5
Police Action against the Threat of Special Weapons of Mass Destruction Chemical and Biological Weapons Terrorism: Forging a Response
5
Electromagnetic Radiation and the Computer Systems Data Security Problem
5
Is it Apprpopriate to Use the Objective, Rational Decision- Making Framework as a Foundation for Modelling Social Systems?
5
Emergency Management Planning in San Antonio, Texas
5
Chemical and Biological Weapons Terrorism: Forging a Response
5
Center of excellence for Education, Science & Technology in 21 Century (BIS-21)
5
In memoriam
5
Pagination
Previous page
‹‹
Page 14
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top