Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Sort ascending
Total views
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects
7
The Role of Information Campaigns and Advertising in the Military Recruitment System
37
The Rise of Russian PMCs – ‘Stealth’ Instrument for a ‘Sharp Power’
2
The Persistent Need to Reform Cyber Security Services: A Case Study on France
8
The Obama Administration and Incident Response: A Report
10
The Multi-Role NATO-Interoperable Light Weight Torpedo for the 21st Century
4
The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation
19
The Ministry of Defense Armed Forces Transformation Management Policy
6
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)
11
The Internet in China: Civilian and Military Uses
7
The Internet and the Changing Face of International Relations and Security
7
The Information Society Should Serve the People
8
The Information Revolution and Post-Modern Warfare
5
The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour
110
The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022
140
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution
34
The Human Factor in the Integrated Approach to Cyberdefence
10
The Hackathons as a First Step to Build Digital Competences
58
The Growing Threat: Homeland Security Issues of Bulgaria
6
The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization
6
The Genetic Program - A Technocratic Hypothesis
7
The Experience of Rakovski National Defense College in Organizing the Communication in the Educational Process During Covid-19 Pandemic
12
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
6
The Dialectics of Information – A Framework
5
The Design And Evaluation of Situation Assessment Strategies
7
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection
35
The Cyberspace Dimension in Armed Conflict: Approaching a Complex Issue with Assistance of the Morphological Method
8
The Concepts and Design of ROC Defense Reorganization
12
The Computer Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces
10
The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas
7
The Coalition Information Systems and Operations Learning Network: An Emerging Concept for Multinational C4 Interoperability
5
The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development
5
The Case for Advanced Distributed Learning
9
The C4I System Concept and the Control of National Sea Spaces
8
The Bulgarian Armed Forces in the Information Society
45
The Bulgarian Air Force in a New Security Environment
3
Testbed for implementation of advanced IT Participation
2
Terrorist ‘Use’ of the Internet and Fighting Back
78
Terrorism on the Sea, Piracy, and Maritime Security
9
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking
12
Telemedical Services for Disaster Emergencies
15
TAS: Trust Assessment System
11
Tactical Approach to Cyber Defence in IoT Computer Networks
29
Synopsis of Operational Research in the UK Ministry of Defence
8
Supporting Transformation
10
Supporting Transformation
10
Supply Chain Cyber Security – Potential Threats
59
Structured Description of Naval Tasks
17
Strategy Development and Implementation in a Complex Multi-National IT Organisation
14
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification
61
Pagination
Previous page
‹‹
Page 2
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top