Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Russian Reflexive Control Campaigns Targeting Political Realignment of Ukraine’s Democratic Allies: Critical Review and Conceptualization
792
The Need for Emotional Cues Analysis in OSINT in Countering Reflexive Control Information Warfare Campaigns: A Critical Review and Reconceptualization
766
Information Assurance Benefits and Challenges: An Introduction
639
Analysis of Cybersecurity Issues in the Maritime Industry
463
Cognitive Attacks in Russian Hybrid Warfare
421
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
382
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
360
How to Support Teams to be Remote and Productive: Group Decision-Making for Distance Collaboration Software Tools
349
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive
290
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel
268
OSINT on the Dark Web: Child Abuse Material Investigations
246
Security Analysis of Diceware Passphrases
233
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages
220
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour
209
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES
205
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022
204
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
204
Capabilities-based Planning for Security Sector Transformation
201
Synthetic Data Generation for Fraud Detection Using Diffusion Models
196
Enhancing the Organisational Culture related to Cyber Security during the University Digital Transformation
185
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes
178
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods
177
A New Steganographic Algorithm for Hiding Messages in Music
174
Cyber Threat Prediction with Machine Learning
165
A Logical Model for Multi-Sector Cyber Risk Management
157
Credit Card Fraud Detection Using Self-Organizing Maps
155
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach
154
Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief
153
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider?
151
Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe
151
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain
140
Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine
138
Organizational Learning in the Academic Literature – Systematic Literature Review
136
A System-of-Systems Approach to Cyber Security and Resilience
134
Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions
129
Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience
128
Towards Unified European Cyber Incident and Crisis Management Ontology
127
A Clustering Method for Information Summarization and Modelling a Subject Domain
126
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
125
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector
124
Data, Privacy and Human-Centered AI in Defense and Security Systems: Legal and Ethical Considerations
122
Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief
120
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
120
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
118
Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations
118
Public Key Generation Principles Impact Cybersecurity
118
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain
118
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies
116
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me?
115
The Importance of Open-Source Intelligence in Assessing Risks of Cyberattacks
115
Pagination
Page 1
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top