Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
ISIJ 26: Cybersecurity Challenges and Responses
33 views
Editorial
Editorial
Cybersecurity Challenges and Responses
26,
no. 1
(2011):
5-6.
Reviewed articles
Sethu Murugan
,
Dr .K.Kuppusamy
Intelligent Intrusion Detection Prevention Systems
26,
no. 2
(2013):
109-119.
Sandeep Sood
Phishing Attacks: A Challenge Ahead
26,
no. 1
(2011):
12-26.
Shashi Bhanwar
,
Seema Bawa
TUX-TMS: A Reputation-based Trust System
26,
no. 2
(2013):
120-131.
Ajay Goel
,
O .P.Sahu
,
Aman Soni
,
Punit Soni
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images
26,
no. 1
(2011):
27-33.
Ahmad Mashhour
,
Zakaria Saleh
Evaluating Wireless Networks Security in Jordan: A Field Study
26,
no. 1
(2011):
34-43.
Ajay Sharma
,
Deo Ojha
Biometric Template Security Using Code Base Cryptosystem
26,
no. 2
(2013):
47-57.
Hesham Ali
A New Technique for Enhancing the Properties of Transmitted Data
26,
no. 2
(2013):
58-78.
Judit Láng
Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept
26,
no. 1
(2011):
7-11.
Manoj Kumar
,
Mridul Gupta
,
Saru Kumari
A Robust Remote User Authentication Scheme using Smart Card
26,
no. 2
(2013):
79-97.
Massoud Dehkordi
,
Reza Alimoradi
Challenge-Response Schemes Using Gap Diffie-Hellman Groups
26,
no. 2
(2013):
98-108.
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top