Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Sort descending
Bulgarian MSDF R&D National Program and Activities
4
A New Technique for Enhancing the Properties of Transmitted Data
4
The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development
5
Ordered DSmT and its Application to the Definition of Continuous DSm Models
5
The Dialectics of Information – A Framework
5
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service
5
Transparency in Force Modernization Decisions
5
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force
5
Secure e-Mail Application Software for Government in Indonesia
5
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES
5
Offsets Facilitate Cooperation with Companies in the European Defence, Technological and Industrial Base
5
Architectures in the Analysis of Requirements and Design of Simulation Systems
5
Is Neutrality an Appropriate Instrument for Domestic Security?
5
Advanced Distributed Learning and Community
5
The Coalition Information Systems and Operations Learning Network: An Emerging Concept for Multinational C4 Interoperability
5
An Effective Doppler Filtering Using Higher-Order Statistics
5
Monitor Reference
5
Information in providing security and prosperity
5
Protecting the National Interests in the Domain of Information Security as a Functional Task of the SBU
5
Guidelines on a Mobile Security Lab Course
5
Government PKI Deployment and Usage in Taiwan
5
Advanced Distributed Learning for a Growing Security Community
5
An Experimental Application of a Trait-Based Personality Model to the Simulation of Military Decision-Making
5
Mathematical Model of Fuzzy Control System for Autonomous Guided Vehicle in 3D Space
5
Contact Transitions Tracking During Force-Controlled Compliant Motion Using an Interacting Multiple Model Estimator
5
Bulgarian Information Network: Command Information Infrastructure for the Future
5
C4ISR Architectural Frameworks in Coalition Environments
5
Coordinating Council on the Problems of Information Society
5
Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform
5
Enhanced Education for Cybersecurity and Resilience
5
Geomorphologic Methods for Estimating Flood Hazards in Mountain Catchments
5
Advanced Information Technology and Terrorism
5
Securing Cyberspace
5
Advances in Modelling and Simulation
5
Selected Internet Sources on Civil Emergency and Law Enforcmenet Issues
5
C4 Common Technical Architecture Development Coordination Group
5
Optimization of the Multi-Source Data Fusion System for Integration on the Canadian Patrol Frigate
5
Editorial: Critical Infrastructures Safety and Security. Trends in the Context of Information Technology Development
5
Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle
5
NATO and Sweden Joint Live Experiment on NEC
5
Contribution of the New Main Combat Aircraft to Bulgaria’s Defence Capabilities
5
Analysis of the Reasons for Incidents with Radioactive Sources in Bulgaria and Preventive Measures
5
Defense Resource Management Simulation in the Bulgarian Ministry of Defense
5
The Information Revolution and Post-Modern Warfare
5
HLA and Beyond: Interoperability Challenges
5
Establishing an Air Pollution Monitoring Network for Industrial Regions: A Probabilistic Approach
5
Decision Support Tools for Domestic Security Operations
5
An Efficient and Secure Remote Authentication Scheme Using Smart Cards
5
A Visual Tool to Simplify the Building of Distributed Simulations Using HLA
5
Human Intuition and Decision-making Systems (II)
5
Pagination
Previous page
‹‹
Page 3
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top