Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Sort descending
Common Data Administration, Data Management, and Data Alignment as a Necessary Requirement for Coupling C4ISR Systems and M&S Systems
1
Challenges of Naval Transformation
2
Is it Apprpopriate to Use the Objective, Rational Decision- Making Framework as a Foundation for Modelling Social Systems?
2
AFCEA Bulgarian Chapter Varna
2
Fully Integrated Communications System for Frigates
2
The Rise of Russian PMCs – ‘Stealth’ Instrument for a ‘Sharp Power’
2
Command and Control in Civil Emergencies
2
Testbed for implementation of advanced IT Participation
2
Challenges of Air Force Transformation
2
Bulgarian Air Force - Challenges and Prospects
2
Applicable Modeling and Simulation Standards; Simulation Systems and Software; Selected Publications; Related Journals, Conferences, Workshops and Courses
2
Use of Mobile Applications in Security and Safety Systems
2
Main Challenges for the Bulgarian Armed Forces Transformation
2
Fusing Uncertain, Imprecise, and Paradoxist Information (DSmT)
2
Future Security Trends and Their Impact from an Industry Point of View
2
Government against the Terrorist Threat of Twenty First Century
2
Decision Model Analysis for Spam
2
A Call for Holistic Approach to Defence Transparency in South East Europe
2
Концепцията за национална сигурност и информационното противоборство
2
Organization and Immediate Challenges of Civil Protection in Bulgaria
3
Air Force Transformation resources
3
Police Action against the Threat of Special Weapons of Mass Destruction Chemical and Biological Weapons Terrorism: Forging a Response
3
Transparency-building in the Security Sector
3
Homeland / Societal Vulnerability and Security
3
On Composing Web Services for Coalition Operations
3
Achieving Interoperability of Command and Control Systems Using Translation Gateways
3
Emergency Management Planning in San Antonio, Texas
3
Chemical and Biological Weapons Terrorism: Forging a Response
3
In memoriam
3
Advanced Technologies for Defense Information System Support
3
Comprehensive Approach: The Bulgarian Defence Experience in Crisis Management and Disaster Relief
3
The Bulgarian Air Force in a New Security Environment
3
Welcoming Address
3
Cybersecurity-Related Internet Sources
3
Monitor Research Centers
3
Advanced NATO-compatible Solutions for Surface Vessels
3
Current Trends in Tactical Naval Communications
3
Formulation of Crisis Plans and Strategies
3
Multi-agent systems in defense and security: Research projects, systems, and software tools
3
Network Security Fundamentals
3
A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets
3
ADL websites - Useful sites, portals, and forums
3
Transparency in Reforming the National Security Sector in Transition Countries
3
Library Update
3
Biometric Template Security Using Code Base Cryptosystem
3
AFCEA Varna Hosts Second International Conference on the Bulgarian Navy
3
Multi-agent systems: Selected reading
3
Library Update 2
3
Interoperability between Agencies and Nations
3
Advanced Distance Learning for Training National Peacekeeping Forces
3
Pagination
Page 1
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top