Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Sort ascending
Integration of Information Resources to Ensure Collaboration in Crisis Management
75
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON
75
A Model of ICT Competence Development for Digital Transformation
74
Societal Impact Assessment of a Cyber Security Network Project
74
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
74
Model Fooling Attacks Against Medical Imaging: A Short Survey
73
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
73
MAIT: Malware Analysis and Intelligence Tool
72
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
72
A Cyber Range for Armed Forces Education
71
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
70
Optimization of the Chief Information Officer Function in Large Organizations
70
Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief
69
Data Science as a Service: The Data Range
69
Instrumental Equipment for Cyberattack Prevention
69
Planning and Implementing Change in Cyber Security Network Organisations
69
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems
69
Human Factor, Resilience, and Cyber/Hybrid Influence
69
Cyber Hygiene Issues in the Naval Security Environment
68
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
68
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems
67
Governance Mesh Approach for Cybersecurity Ecosystem
65
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
63
From Classroom to Online Teaching – A Case during COVID19
61
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
61
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification
61
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
59
Preserving Privacy of Security Services in the SecaaS Model
59
Concepts in Networks and Communication Security and Graph Theory
58
A System-of-Systems Approach to Cyber Security and Resilience
58
Supply Chain Cyber Security – Potential Threats
58
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
58
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones
58
The Hackathons as a First Step to Build Digital Competences
58
French Cyber Security and Defence: An Overview
57
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
57
An Enhanced Solution for Automated Fire Control Systems
55
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative
55
Piloting the ECHO e-Skills and Training Toolkit
54
A Cost-Effective Approach to Securing Systems through Partial Decentralization
53
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
52
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
52
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies
51
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
50
Using Cyber Ranges in Cybersecurity Management Educational Programmes
50
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies
48
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization
48
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
47
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
47
Comparative Research of Cybersecurity Information Sharing Models
47
Pagination
Previous page
‹‹
Page 2
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top