Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Preview articles
The C-factor in the Cybersecurity Equation: The Importance of Student Cybersecurity Competitions
Author(s):
Lora Pitman, Brian Payne
26 May 2023
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
Author(s):
Jean Dezert, Albena Tchamova
02 Feb 2022
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Author(s):
Jean Dezert, Albena Tchamova
01 Feb 2022
Blockchain in Agriculture
Author(s):
Matthew Sadiku, Kelechi Eze, Sarhan Musa
02 Nov 2021
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
Author(s):
Vyacheslav Kharchenko, Ihor Kliushnikov, Herman Fesenko, Oleg Illiashenko
27 Sep 2021
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
Author(s):
Mubarak Umar, Zhanfang Chen, Yan Liu
16 Jun 2021
European Conflict Analysis Project (ECAP)
Author(s):
Klaus Niemeyer
07 May 2021
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
Author(s):
Rosen Iliev
05 May 2021
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top