Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Principles of Mitigating and Managing Human System Risks
33
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria
33
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider
33
Tactical Approach to Cyber Defence in IoT Computer Networks
33
Network User Behaviour Analysis by Machine Learning Methods
33
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
32
Bulgaria and NATO: 7 Lost Years
32
IT and Cyber Security Awareness – Raising Campaigns
32
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War
32
e-Platform Architecture for Organisational Collaboration and IT Education
32
A System for Analysis of Big Data from Social Media
32
Diffusion of Information in an Online Social Network with Limited Attention
32
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report
31
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures
31
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan
31
Hybrid Warfare: Emerging Research Topics
31
Amelioration of ElGamal Digital Signature Schemes
31
Graphic Model of The Target Audience of Psychological Influence in Social Networks
31
Natural Disasters’ Management and Detection of Priority Problems for Future Research
31
Information Sharing for Cyber Threats
31
National Security Strategy of the Netherlands: An Innovative Approach
30
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy
30
Planning Measures and Capabilities for Protection of Critical Infrastructures
30
Simulation Modeling in Military Affairs: Status and Perspectives
30
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System
29
Vulnerability Analysis for Urban Natural Gas Pipeline Network System
29
Strategy Development and Implementation in a Complex Multi-National IT Organisation
29
Hybrid Warfare Challenges and Responses: Lessons from Ukraine
28
Macedonian Path Towards Cybersecurity
28
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence
27
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration
27
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria
27
Command and Control: Operational Requirements and System Implementation
27
Hybrid Threats in Bulgarian Media
27
A Method for the Development of Cyber Security Strategies
27
Promoting Interagency and International Cooperation in Countering Hybrid Threats
26
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)
26
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety
26
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services
26
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
26
Education in Geomatics for First Line Emergency Management in Ukraine
26
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
25
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age
25
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation
25
A Brief on Embedded Societal Security
25
Towards a More Resilient Cyberspace: The Case of Albania
25
Multiple Hypothesis Tracking Using Hough Transform Track Detector
25
Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management
25
Civil Security: Architectural Approach in Emergency Management Transformation
25
Structured Description of Naval Tasks
25
Pagination
Previous page
‹‹
Page 5
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top