Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Distributed Simulation and Modeling Environment
11
The Computer Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces
11
Software for Computer Systems Trojans Detection as a Safety-Case Tool
11
Romanian Air Force Operational Capabilities Generation Process
11
Using Architectural Models to Identify Opportunities for Improvement of Acquisition Management
11
Integrating COTS Technologies into a Scalable Mobile Emergency Command Post
11
Soft Computing Agents for Dynamic Routing
11
Dynamical Behavior of Fuzzy Logic Based Velocity Control Autopilot with Respect to Changes in Linguistic Variables Membership Functions Shape
11
Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models
11
Phishing Attacks: A Challenge Ahead
11
NATO System Analysis and Studies Panel
11
Naval Craft, Weapon and Sensor Systems
11
Should the Intelligence Agencies ‘Show More Leg’ or Have They Just Been Stripped Naked?
11
Modernization of the Bulgarian Air Force and Interoperability with Allied Forces
10
Bulgaria in NATO: Challenges to Civil Emergency Planning
10
Homeland Security and the Russian Approach
10
The Information Society Should Serve the People
10
Countering Hybrid Warfare: Dedicated Organizations and Initiatives
10
Model and Implementation of Safety Case Cores
10
Implementation of the “KINEROS” Model for Estimation of the Flood Prone Territories in the Malki Iskar River Basin
10
Special Operations Forces in the Fight Against Terrorism on National Territory
10
A Small Step toward Interoperability
10
NC3A as a platform to support C4ISR capabilities development for the Comprehensive Approach
10
Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions
10
Developing South East European Cooperative Crisis Management Capacity
10
New AFCEA Chapter in South-East Europe
10
Overview of Fine Exact Methods of Safety Engineering
10
The Genetic Program - A Technocratic Hypothesis
10
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force
10
MAPWEB: Cooperation between Planning Agents and Web Agents
10
Intrusion-Avoidance via System Diversity
10
Offsets Facilitate Cooperation with Companies in the European Defence, Technological and Industrial Base
10
Interoperability between Agencies and Nations
10
English Skills for Staff Officers: Collaborative Development of the Distance Course
10
Command and Control in Crisis Management
10
The Cyberspace Dimension in Armed Conflict: Approaching a Complex Issue with Assistance of the Morphological Method
10
Cloud Testing: A State-of-the-Art Review
10
Information Technology and Terrorism: The Impact of Emerging Commercial Capabilities
10
The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas
10
Guidelines on a Mobile Security Lab Course
10
Hybrid Warfare and the Challenge It Poses to the Psychological Resilience Training in the Bulgarian Military
10
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects
10
Multinational Cooperation in Civil-Military Interoperability
10
Integration and Interoperability of Information Systems within the Coalition Aerospace Operations Center
10
Cybersecurity Challenges and Responses
10
TUX-TMS: A Reputation-based Trust System
10
Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle
9
NATO and Sweden Joint Live Experiment on NEC
9
Improved Anonymous Secure e-Voting over a Network
9
Strategic and Technology Policy Implications for E-Government
9
Pagination
Previous page
‹‹
Page 10
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top