Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Sort descending
Total views
"Cuius Regio, Eius Religio, Omnium Spatium?” State Sovereignty in the Age of the Internet
10
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider
32
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective
12
21st Century Cyber Warfare
23
3D Facial Reconstruction from 2D Portrait Imagery
38
A Brief on Embedded Societal Security
14
A BTC-Based Watermarking Scheme for Digital Images
30
A Call for Holistic Approach to Defence Transparency in South East Europe
2
A Clustering Method for Information Summarization and Modelling a Subject Domain
96
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
34
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images
8
A Cost-Effective Approach to Securing Systems through Partial Decentralization
53
A Cyber Range for Armed Forces Education
70
A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT
79
A Framework Methodology to Support the Selection of a Multipurpose Fighter
12
A Generalization of the Classic Combination Rules to DSm Hyper-power Sets
10
A Generic Reference Curriculum on Cybersecurity
11
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON
70
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research
76
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers
7
A License Plate Recognition System in e-Government
7
A Logical Model for Multi-Sector Cyber Risk Management
123
A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms
9
A Means of Comparing Military Budgeting Processes in South East Europe
16
A Method for the Development of Cyber Security Strategies
17
A Method of Evaluating Assurance Requirements
8
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
47
A Model of ICT Competence Development for Digital Transformation
74
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force
5
A New Class of Fusion Rules Based on T-Conorm and T-Norm Fuzzy Operators
8
A New Steganographic Algorithm for Hiding Messages in Music
118
A New Technique for Enhancing the Properties of Transmitted Data
4
A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets
3
A Robust Remote User Authentication Scheme using Smart Card
15
A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment
6
A Security Approach to a Military Autonomous Platform Path Planning
41
A Small Step toward Interoperability
8
A Software Agent-based Collaborative Approach for Humanitarian-Assistance Scenarios
9
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
17
A South-East European Defence Transparency Audit
7
A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009
14
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
43
A System-of-Systems Approach to Cyber Security and Resilience
58
A Terrain Reasoning Algorithm for Defending a Fire Zone
7
A Visual Tool to Simplify the Building of Distributed Simulations Using HLA
5
Achieving Interoperability of Command and Control Systems Using Translation Gateways
3
Acquisition in a Large IT Organization
14
ADL websites - Useful sites, portals, and forums
3
Adopting Machine Learning for Images Transferred with LoRaWAN
38
Advanced Distance Learning for Training National Peacekeeping Forces
3
Pagination
Page 1
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top