Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
19
Small Countries and Major Global Economic Players – the Nicaraguan Channel
19
TAS: Trust Assessment System
18
A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms
18
Garbled Circuits: Optimizations and Implementations
18
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer
18
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective
18
Mine Hunting with Drones
18
A Robust Remote User Authentication Scheme using Smart Card
18
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience
18
Challenges of Multinational Acquisition of Capabilities in Black Sea Format
18
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities
17
Fuzzy Control Based on Cluster Analysis and Dynamic Programming
17
Does NATO Have a Role in the Fight Against International Terrorism Analysis of NATO's Response to September 11
17
A Means of Comparing Military Budgeting Processes in South East Europe
17
Inductive Discovery of Criminal Group Structure Using Spectral Embedding
17
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
17
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa
17
C4ISR in Modernizing Security Sector in Bulgaria and South-Eastern Europe
17
Cyberwarriors: The Backbone of the Future Military or a Misnomer?
17
Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains
17
Assessing Comprehensive Security Approaches in Action: An Introduction
17
US Department of Defense Modeling and Simulation: New Approaches and Initiatives
17
MSA System Concept for Mediterranean Sea Surveillance
17
Risks for the Population along the Bulgarian Black Sea Coast from Flooding Caused by Extreme Rise of Sea Level
16
Introduction to the Fusion of Quantitative and Qualitative Beliefs
16
Information warfare principles and operations
16
Telemedical Services for Disaster Emergencies
16
Formal Verification of Nuclear Systems: Past, Present, and Future
16
Intelligence Services of the Czech Republic: Current Legal Status and Its Development
16
Information Technologies in the Command and Control System of the Gendarmerie
16
Tracking Filters for Radar Systems with Correlated Measurement Noise
16
Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover
16
Towards Multi-National Capability Development in Cyber Defence
16
Human Expert Fusion for Image Classification
16
Maritime Defence Investment Policy of the Republic of Bulgaria
16
Comprehensive Security and Some Implemental Limits
16
Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects
16
C4I System Reengineering: Essential Component of Bulgarian Armed Forces
16
Smart Grid Safety and Security: Educational and Research Activities
16
Field Integrated Communications and Information System for Bulgarian Land Forces
15
Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains
15
Towards Europe 2035: In Search of the Archimedean Screw. FOCUS in Perspective
15
Security Protocols for Outsourcing Database Services
15
The Persistent Need to Reform Cyber Security Services: A Case Study on France
15
DIGILIENCE 2019 Agenda and Abstracts
15
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking
15
Modeling and Simulation in Defense
15
Intelligence, Crime and Cybersecurity
15
Reconciling Operational and Financial Planning Views in a Customer-Funded Organization: Making Customer-Funding Work for NC3A
15
Pagination
Previous page
‹‹
Page 7
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top