Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Ruggedized Commercial IT Modules for Field C2 Posts in Coalition Operations and Emergencies
11
Information Technology Management for the Bulgarian Armed Forces XXI
11
Homeland Security: General Templates and Options for the Future
11
Learning Choices: Generating and Integrating Informal Knowledge
11
An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures
11
Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects
11
A License Plate Recognition System in e-Government
11
Building a Potential to Counteract Hybrid Threats through Cooperation and Regional Security
11
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force
10
EKS: Open-source Web-based Distributed Learning Tool
10
MAPWEB: Cooperation between Planning Agents and Web Agents
10
National Military Command Center - From Idea to Implementation
10
Intrusion-Avoidance via System Diversity
10
Offsets Facilitate Cooperation with Companies in the European Defence, Technological and Industrial Base
10
Interoperability between Agencies and Nations
10
Command and Control in Crisis Management
10
The Cyberspace Dimension in Armed Conflict: Approaching a Complex Issue with Assistance of the Morphological Method
10
Cloud Testing: A State-of-the-Art Review
10
Romanian Air Force Operational Capabilities Generation Process
10
Information Technology and Terrorism: The Impact of Emerging Commercial Capabilities
10
The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas
10
Hybrid Warfare and the Challenge It Poses to the Psychological Resilience Training in the Bulgarian Military
10
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects
10
Multinational Cooperation in Civil-Military Interoperability
10
Integration and Interoperability of Information Systems within the Coalition Aerospace Operations Center
10
Cybersecurity Challenges and Responses
10
TUX-TMS: A Reputation-based Trust System
10
Modernization of the Bulgarian Air Force and Interoperability with Allied Forces
10
Bulgaria in NATO: Challenges to Civil Emergency Planning
10
Homeland Security and the Russian Approach
10
Countering Hybrid Warfare: Dedicated Organizations and Initiatives
10
Model and Implementation of Safety Case Cores
10
Implementation of the “KINEROS” Model for Estimation of the Flood Prone Territories in the Malki Iskar River Basin
10
Special Operations Forces in the Fight Against Terrorism on National Territory
10
A Small Step toward Interoperability
10
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers
10
NC3A as a platform to support C4ISR capabilities development for the Comprehensive Approach
10
Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions
10
Developing South East European Cooperative Crisis Management Capacity
10
New AFCEA Chapter in South-East Europe
10
Overview of Fine Exact Methods of Safety Engineering
10
C4ISR Support to the Comprehensive Approach
10
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service
9
Identifying the Reasons for Failures in Large-Scale Systems
9
PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure
9
New Financial Transaction Security Concerns in Mobile Commerce
9
Internet of Things – A New Attack Vector for Hybrid Threats
9
Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems
9
The Ministry of Defense Armed Forces Transformation Management Policy
9
English Skills for Staff Officers: Collaborative Development of the Distance Course
9
Pagination
Previous page
‹‹
Page 10
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top