Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations
47
The Use of the Internet by Terrorist Organizations
46
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
45
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
45
Managing Cybersecurity Resources: A Cost-Benefit Analysis
45
Cryptographic Key Generation by Genetic Algorithms
45
IMoViS: A System for Mobile Visualization of Intrusion Detection Data
44
Context Scenarios in Long-Term Defense Planning
43
Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects
43
Multinational Cooperation and Intervention: Small Steps to Better Results
43
Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools
43
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
43
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
43
Problems of Digitized Information Flow Analysis: Cognitive Aspects
42
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection
42
An innovative Airport Physical-cyber Security System (APSS)
42
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned
41
Transformation: Military and Science
41
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry
41
A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations
40
Cybersecurity in Ukraine: Problems and Perspectives
40
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
40
Quantum-Based Solutions for the Next-Generation Internet
40
Seabed Critical Infrastructures
40
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis
40
A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease
39
21st Century Cyber Warfare
38
Money Laundering Techniques with Electronic Payment Systems
38
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance
38
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination
38
Critical Information Infrastructure Protection (CIIP)
37
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution
37
Creating and Strengthening Cybersecurity in the Republic of Moldova
37
ICT Governance, Human Factors and Cyber Situational Awareness
37
Stakeholder Engagement Framework
36
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact
36
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments
36
Prerequisites and Approaches to Force Modernization in a Transition Period
35
Foundations for a new theory of plausible and paradoxical reasoning
35
Institution Building for It Governance and Management
35
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
34
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
34
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions
34
Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems
34
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria
33
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider
33
Tactical Approach to Cyber Defence in IoT Computer Networks
33
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis
33
Building Societal Resilience against Hybrid Threats
32
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
32
Pagination
Previous page
‹‹
Page 4
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top