Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Sort descending
Total views
Automating Footwear Impressions Retrieval through Texture
15
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service
5
Benefits and Consequences of Automated Learning in Computer Generated Forces Systems
7
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
14
Biometric Template Security Using Code Base Cryptosystem
3
Black Sea Initiative Project for Civil Military Emergency Planning
4
Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities
212
Books Related to Homeland Security
4
Budget Transparency Initiative Website
5
Building a Potential to Counteract Hybrid Threats through Cooperation and Regional Security
6
Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management
4
Building Societal Resilience against Hybrid Threats
16
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War
16
Bulgaria and NATO: 7 Lost Years
23
Bulgaria in NATO: Challenges to Civil Emergency Planning
7
Bulgaria in NATO:New Roles and Capabilities of the Navy
7
Bulgarian Air Force - Challenges and Prospects
2
Bulgarian Information Network: Command Information Infrastructure for the Future
5
Bulgarian MSDF R&D National Program and Activities
4
Bulgaria’s Defence Policy and Force Size from a Comparative Macro Perspective
8
C4 Common Technical Architecture Development Coordination Group
5
C4I System Reengineering: Essential Component of Bulgarian Armed Forces
13
C4ISR Architectural Frameworks in Coalition Environments
5
C4ISR FOR Advanced Defence Capabilities and Security
4
C4ISR in Modernizing Security Sector in Bulgaria and South-Eastern Europe
16
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations
38
C4ISR Support to the Comprehensive Approach
8
C4ISR: A Comprehensive Approach
8
Capabilities-based Planning for Security Sector Transformation
191
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
359
CAX, Joint Training and Transformation Objectives
6
Center for National Security and Defense Research
4
Center for Security Studies and Conflict Research
4
Center of excellence for Education, Science & Technology in 21 Century (BIS-21)
4
Challenge-Response Schemes Using Gap Diffie-Hellman Groups
8
Challenges and Advantages of Distance Learning Systems
11
Challenges for the Bulgarian Air Force - A Royal Air Force Perspective
5
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider?
148
Challenges in E-Government and Security of Information
23
Challenges of Air Force Transformation
2
Challenges of Multinational Acquisition of Capabilities in Black Sea Format
13
Challenges of Naval Transformation
2
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
20
Chemical and Biological Weapons Terrorism: Forging a Response
3
Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems
6
Choosing t-out-of-n Secrets by Oblivious Transfer
4
Cilvil-military Interoperability in Support of NATO Emerging Security Challenges
4
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain
101
Civil Security: Architectural Approach in Emergency Management Transformation
16
Cloud Testing: A State-of-the-Art Review
7
Pagination
Previous page
‹‹
Page 3
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top