Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
IT and Cyber Security Awareness – Raising Campaigns
32
e-Platform Architecture for Organisational Collaboration and IT Education
32
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
32
A System for Analysis of Big Data from Social Media
32
Network User Behaviour Analysis by Machine Learning Methods
32
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
31
Bulgaria and NATO: 7 Lost Years
31
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures
31
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan
31
Amelioration of ElGamal Digital Signature Schemes
31
Graphic Model of The Target Audience of Psychological Influence in Social Networks
31
Natural Disasters’ Management and Detection of Priority Problems for Future Research
31
Information Sharing for Cyber Threats
31
Diffusion of Information in an Online Social Network with Limited Attention
31
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
30
National Security Strategy of the Netherlands: An Innovative Approach
30
Hybrid Warfare: Emerging Research Topics
30
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy
30
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
30
Planning Measures and Capabilities for Protection of Critical Infrastructures
30
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System
29
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War
28
Simulation Modeling in Military Affairs: Status and Perspectives
28
Hybrid Warfare Challenges and Responses: Lessons from Ukraine
27
Principles of Mitigating and Managing Human System Risks
27
Vulnerability Analysis for Urban Natural Gas Pipeline Network System
27
Strategy Development and Implementation in a Complex Multi-National IT Organisation
27
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report
27
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration
27
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria
27
A Method for the Development of Cyber Security Strategies
27
Promoting Interagency and International Cooperation in Countering Hybrid Threats
26
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence
26
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety
26
Command and Control: Operational Requirements and System Implementation
26
Macedonian Path Towards Cybersecurity
26
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
26
Education in Geomatics for First Line Emergency Management in Ukraine
26
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age
25
A Brief on Embedded Societal Security
25
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services
25
Multiple Hypothesis Tracking Using Hough Transform Track Detector
25
Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management
25
Civil Security: Architectural Approach in Emergency Management Transformation
25
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
24
Assessing Cyber Security 2015
24
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)
24
Towards a More Resilient Cyberspace: The Case of Albania
24
Fuzzy Controller for Antitank Wire Guided Missile Simulator with Direct X SDK
24
Structured Description of Naval Tasks
24
Pagination
Previous page
‹‹
Page 5
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top