Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
LinkedIn
Twitter
Facebook
Top downloads
Title
Downloads
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
(82)
A System-of-Systems Approach to Cyber Security and Resilience
(64)
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
(57)
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
(50)
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
(32)
Simulation-Based Training with Gamified Components for Augmented Border Protection
(31)
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor
(24)
Cyber Hygiene Issues in the Naval Security Environment
(48)
The Hackathons as a First Step to Build Digital Competences
(23)
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach
(44)
Piloting the ECHO e-Skills and Training Toolkit
(30)
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain
(40)
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain
(39)
Governance Mesh Approach for Cybersecurity Ecosystem
(29)
An Enhanced Solution for Automated Fire Control Systems
(26)
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
(28)
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
(43)
Preserving Privacy of Security Services in the SecaaS Model
(36)
Towards Unified European Cyber Incident and Crisis Management Ontology
(33)
OSINT on the Dark Web: Child Abuse Material Investigations
(32)
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector
(28)
Enhanced Collaboration for Cyber Security and Resilience
(39)
Providing Physical Protection of the Vessel in the Event of an Attack at Sea and Ports
(24)
Hypersonic Weapons in Achieving Maritime Superiority
(22)
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies
(59)
Small Countries and Major Global Economic Players – the Nicaraguan Channel
(17)
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment
(30)
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022
(45)
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
(57)
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
(35)
Blockchain in Agriculture
(43)
Concepts in Networks and Communication Security and Graph Theory
(33)
A Security Approach to a Military Autonomous Platform Path Planning
(18)
Augmented Reality in an Enhanced Command and Control Application
(31)
RSA Weaknesses Caused by the Specifics of Random Number Generation
(32)
Using Cyber Ranges in Cybersecurity Management Educational Programmes
(17)
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities
(17)
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
(55)
The Role of Information Campaigns and Advertising in the Military Recruitment System
(27)
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES
(38)
Planning and Implementing Change in Cyber Security Network Organisations
(32)
A Clustering Method for Information Summarization and Modelling a Subject Domain
(45)
Network User Behaviour Analysis by Machine Learning Methods
(32)
MAIT: Malware Analysis and Intelligence Tool
(47)
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods
(55)
Heuristic-based Intrusion Detection Functionality in a Snort Environment
(38)
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification
(70)
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes
(38)
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned
(62)
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
(34)
Pagination
Current page
1
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Page
8
Page
9
…
Next page
Next ›
Last page
Last »
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top