Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
LinkedIn
Twitter
Facebook
Most read in past 36 months
Title
Total views
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
344
Capabilities-based Planning for Security Sector Transformation
188
Information Assurance Benefits and Challenges: An Introduction
170
Analysis of Cybersecurity Issues in the Maritime Industry
148
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider?
146
Cognitive Attacks in Russian Hybrid Warfare
138
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive
103
How to Support Teams to be Remote and Productive: Group Decision-Making for Distance Collaboration Software Tools
97
NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages
92
Credit Card Fraud Detection Using Self-Organizing Maps
91
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
84
Interorganizational Cooperation and the Fight against Terrorism in West Africa and the Sahel
81
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach
81
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes
77
A Logical Model for Multi-Sector Cyber Risk Management
75
Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training
71
Cyber Threat Prediction with Machine Learning
71
A New Steganographic Algorithm for Hiding Messages in Music
68
A Clustering Method for Information Summarization and Modelling a Subject Domain
65
Enhanced Collaboration for Cyber Security and Resilience
65
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain
65
What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security
64
Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief
63
Organizational Learning in the Academic Literature – Systematic Literature Review
63
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022
61
Challenges in E-Government and Security of Information
60
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain
59
OSINT on the Dark Web: Child Abuse Material Investigations
58
Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions
57
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain
54
Terrorist ‘Use’ of the Internet and Fighting Back
53
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES
53
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour
53
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative
53
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector
52
Legislation, Vulnerability and Disaster Risk Management of Waterborne Diseases in Zimbabwe
51
Public Key Generation Principles Impact Cybersecurity
51
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me?
50
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems
49
Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence
49
A Model of ICT Competence Development for Digital Transformation
48
Societal Impact Assessment of a Cyber Security Network Project
48
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
48
Enhancing the Organisational Culture related to Cyber Security during the University Digital Transformation
47
Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application
47
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base
45
A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT
45
Supply Chain Cyber Security – Potential Threats
44
Optimization of the Chief Information Officer Function in Large Organizations
44
Towards Unified European Cyber Incident and Crisis Management Ontology
43
Pagination
Page 1
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top