Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Heuristic-based Intrusion Detection Functionality in a Snort Environment
73
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
73
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies
72
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization
71
The Hackathons as a First Step to Build Digital Competences
71
The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations
71
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
70
Concepts in Networks and Communication Security and Graph Theory
70
Using Cyber Ranges in Cybersecurity Management Educational Programmes
69
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones
67
An Enhanced Solution for Automated Fire Control Systems
67
A Cost-Effective Approach to Securing Systems through Partial Decentralization
66
Preserving Privacy of Security Services in the SecaaS Model
66
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
66
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
65
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
63
Cyberwar in Russian and USA Military-Political Thought: A Comparative View
63
Profiling Human Roles in Cybercrime
62
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
61
Piloting the ECHO e-Skills and Training Toolkit
61
Total Information Awareness (DARPA’s Research Program)
61
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
60
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
60
K Band Radar Drone Signatures
58
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities
58
Navigating Uncharted Waters: Tackling Maritime Cybersecurity Challenges in the Black Sea Region
58
Ecosystem Platform for the Defence and Security Sector of Ukraine
57
Organising National Cybersecurity Centres
57
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations
57
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings
55
A Security Approach to a Military Autonomous Platform Path Planning
54
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
54
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy
53
3D Facial Reconstruction from 2D Portrait Imagery
53
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine
53
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
53
Cyber Security Teaching and Learning Laboratories: A Survey
52
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm
52
Adopting Machine Learning for Images Transferred with LoRaWAN
52
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
51
Labour Relations and the Information Security of the State during the Covid-19 Pandemics
51
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor
51
Simulation-Based Training with Gamified Components for Augmented Border Protection
50
A Proposal for a Cross-Layer, P+S Approach in Underwater Communication: The Underwater Data Exchange Protocol
49
Implementation of the ECHO Cyber Skills Framework in the CyberSecPro Project: Enhancing Cybersecurity Capabilities
49
A BTC-Based Watermarking Scheme for Digital Images
48
The Bulgarian Armed Forces in the Information Society
48
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
48
The Role of Information Campaigns and Advertising in the Military Recruitment System
48
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
47
Pagination
Previous page
‹‹
Page 3
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top