Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Human Factor, Resilience, and Cyber/Hybrid Influence
93
Planning and Implementing Change in Cyber Security Network Organisations
93
Enhanced Collaboration for Cyber Security and Resilience
93
Terrorist ‘Use’ of the Internet and Fighting Back
92
Information Technology for Big Data Sensor Networks Stability Estimation
90
Challenges in E-Government and Security of Information
90
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
89
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me?
88
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON
87
A Model of ICT Competence Development for Digital Transformation
87
MAIT: Malware Analysis and Intelligence Tool
86
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research
86
A Cyber Range for Armed Forces Education
86
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
85
Model Fooling Attacks Against Medical Imaging: A Short Survey
84
Integration of Information Resources to Ensure Collaboration in Crisis Management
83
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
81
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
80
Data Science as a Service: The Data Range
80
Governance Mesh Approach for Cybersecurity Ecosystem
80
Cyber Hygiene Issues in the Naval Security Environment
79
Societal Impact Assessment of a Cyber Security Network Project
78
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
77
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems
76
Instrumental Equipment for Cyberattack Prevention
76
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems
76
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification
74
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
74
Comparative Research of Cybersecurity Information Sharing Models
73
Russian Reflexive Control Campaigns Targeting Political Realignment of Ukraine’s Democratic Allies: Critical Review and Conceptualization
72
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies
72
Supply Chain Cyber Security – Potential Threats
71
Synthetic Data Generation for Fraud Detection Using Diffusion Models
71
French Cyber Security and Defence: An Overview
71
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
70
The Hackathons as a First Step to Build Digital Competences
69
From Classroom to Online Teaching – A Case during COVID19
69
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative
69
Augmented Reality in an Enhanced Command and Control Application
69
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
67
Concepts in Networks and Communication Security and Graph Theory
64
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
63
Using Cyber Ranges in Cybersecurity Management Educational Programmes
63
RSA Weaknesses Caused by the Specifics of Random Number Generation
63
Preserving Privacy of Security Services in the SecaaS Model
63
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones
62
An Enhanced Solution for Automated Fire Control Systems
62
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
61
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
61
A Cost-Effective Approach to Securing Systems through Partial Decentralization
61
Pagination
Previous page
‹‹
Page 2
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top