Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Sort ascending
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy
46
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations
46
K Band Radar Drone Signatures
46
Cyberwar in Russian and USA Military-Political Thought: A Comparative View
46
The Bulgarian Armed Forces in the Information Society
45
RSA Weaknesses Caused by the Specifics of Random Number Generation
45
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
44
Labour Relations and the Information Security of the State during the Covid-19 Pandemics
44
Signature-based Intrusion Detection Hardware-Software Complex
43
Heuristic-based Intrusion Detection Functionality in a Snort Environment
43
A Security Approach to a Military Autonomous Platform Path Planning
43
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
42
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings
42
Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges
41
Context Scenarios in Long-Term Defense Planning
40
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
40
Adopting Machine Learning for Images Transferred with LoRaWAN
40
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm
39
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities
38
3D Facial Reconstruction from 2D Portrait Imagery
38
Simulation-Based Training with Gamified Components for Augmented Border Protection
38
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations
38
The Use of the Internet by Terrorist Organizations
38
Profiling Human Roles in Cybercrime
37
The Role of Information Campaigns and Advertising in the Military Recruitment System
37
Transformation: Military and Science
37
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine
36
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection
35
Ecosystem Platform for the Defence and Security Sector of Ukraine
35
A BTC-Based Watermarking Scheme for Digital Images
35
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
35
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
35
Problems of Digitized Information Flow Analysis: Cognitive Aspects
35
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution
34
Multinational Cooperation and Intervention: Small Steps to Better Results
34
Leadership in Uncertainty
34
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact
34
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
34
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis
34
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry
34
Organising National Cybersecurity Centres
33
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider
32
Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience
32
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
32
Cyber Security Teaching and Learning Laboratories: A Survey
31
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
31
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
31
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor
31
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance
30
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
30
Pagination
Previous page
‹‹
Page 3
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top