Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Sort ascending
Total views
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
29
Концепцията за национална сигурност и информационното противоборство
2
Work Package: Real-time Data Processing in Adaptive Sensor Interfaces
7
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence
21
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
89
Welcoming Address
3
Vulnerability Analysis for Urban Natural Gas Pipeline Network System
21
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan
21
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age
12
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
155
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
51
Using Strategic Planning in Support of Defense Acquisitions
10
Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover
13
Using Cyber Ranges in Cybersecurity Management Educational Programmes
50
Using Architectural Models to Identify Opportunities for Improvement of Acquisition Management
8
Use of Mobile Applications in Security and Safety Systems
2
US Department of Defense Modeling and Simulation: New Approaches and Initiatives
12
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry
32
Ukrainian Educational System in the Field of Cybersecurity
10
Ubiquitous Insecurity? How to “Hack” IT Systems
7
Two Secure Transportation Schemes for Mobile Agents
8
TUX-TMS: A Reputation-based Trust System
8
Turkish Security Discourses and Policies: The Kurdish Question
18
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
8
Transparency-building in the Security Sector
3
Transparency of Defence Policy in Progress
11
Transparency Matters
6
Transparency in Reforming the National Security Sector in Transition Countries
3
Transparency in Force Modernization Decisions
5
Transparency in Defence Resource Management - Problems and Solutions
17
Transformation: Military and Science
37
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
59
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm
39
Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience
31
Tracking Filters for Radar Systems with Correlated Measurement Noise
14
Towards Unified European Cyber Incident and Crisis Management Ontology
89
Towards Multi-National Capability Development in Cyber Defence
12
Towards Europe 2035: In Search of the Archimedean Screw. FOCUS in Perspective
12
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience
13
Towards Creation of a Unified Information System of the Navies of the Black Sea Countries
14
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
74
Towards a More Resilient Cyberspace: The Case of Albania
18
Total Information Awareness (DARPA’s Research Program)
26
Timothy Thomas on the Key Elements of the Russian Approach to IW
14
Tiems Contribution to Emergency and Crisis Management
9
The White Paper of Civil Protection of the Republic of Bulgaria
4
The war for control of information
7
The Use of the Internet by Terrorist Organizations
36
The Urge for Comprehensive Cyber Security Strategies in the Western Balkan
8
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
31
Pagination
Page 1
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top