Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Top downloads
Title
Downloads
Smart Solutions for Sustainable Emergency and Crisis Management
(393)
A Critical Analysis of the U.S. “Pivot” toward the Asia-Pacific: How Realistic is Neo-realism?
(167)
Multi-Fragmental Availability Models of Critical Infrastructures with Variable Parameters of System Dependability
(300)
Agent-Based Intelligent Support to Coalition Operations
(293)
Natural Disasters’ Management and Detection of Priority Problems for Future Research
(263)
The C-factor in the Cybersecurity Equation: The Importance of Student Cybersecurity Competitions
(289)
The Importance of Open-Source Intelligence in Assessing Risks of Cyberattacks
(382)
A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations
(116)
Model for Risk Management of Critical Infrastructures of the Republic of Bulgaria
(127)
Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects
(102)
The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations
(194)
Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools
(137)
Seabed Critical Infrastructures
(192)
(64)
Navigating Uncharted Waters: Tackling Maritime Cybersecurity Challenges in the Black Sea Region
(168)
A Proposal for a Cross-Layer, P+S Approach in Underwater Communication: The Underwater Data Exchange Protocol
(108)
Synthetic Data Generation for Fraud Detection Using Diffusion Models
(291)
(19)
Data, Privacy and Human-Centered AI in Defense and Security Systems: Legal and Ethical Considerations
(368)
(7)
Implementation of the ECHO Cyber Skills Framework in the CyberSecPro Project: Enhancing Cybersecurity Capabilities
(132)
Human Factors Make or Break Cybersecurity!
(214)
Applying a New Approach to Consider the Human Factor in the Design of Information Security Systems
(143)
The Need for Emotional Cues Analysis in OSINT in Countering Reflexive Control Information Warfare Campaigns: A Critical Review and Reconceptualization
(193)
Russian Reflexive Control Campaigns Targeting Political Realignment of Ukraine’s Democratic Allies: Critical Review and Conceptualization
(470)
Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
(191)
A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease
(100)
(82)
Insights on Human Factors Enhancing Cybersecurity
(100)
EURMARS: Use of Satellite Imagery as an Asset for Maritime Environment Rapid Mapping and Object Detection in Large Areas
(110)
Digital Stabilization of Thermal Videos for Border and Infrastructure Surveillance
(21)
Pagination
First page
« First
Previous page
‹ Previous
…
Page
26
Page
27
Page
28
Page
29
Page
30
Page
31
Page
32
Page
33
Current page
34
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top