Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base
104
Optimization of the Chief Information Officer Function in Large Organizations
104
Planning and Implementing Change in Cyber Security Network Organisations
103
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
103
Enhanced Collaboration for Cyber Security and Resilience
102
Integrated Security Management System for Enterprises in Industry 4.0
102
Terrorist ‘Use’ of the Internet and Fighting Back
100
Human Factor, Resilience, and Cyber/Hybrid Influence
100
Applying a New Approach to Consider the Human Factor in the Design of Information Security Systems
100
Information Technology for Big Data Sensor Networks Stability Estimation
100
Signature-based Intrusion Detection Hardware-Software Complex
99
A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT
99
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies
98
Public-Private Partnerships for Information Sharing in the Security Sector: What’s in It for Me?
97
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
96
MAIT: Malware Analysis and Intelligence Tool
95
Model Fooling Attacks Against Medical Imaging: A Short Survey
94
Data Science as a Service: The Data Range
93
A Model of ICT Competence Development for Digital Transformation
92
A Cyber Range for Armed Forces Education
92
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
91
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON
91
French Cyber Security and Defence: An Overview
89
A Governance Model of a Collaborative Networked Organization for Cybersecurity Research
89
Data, Privacy and Human-Centered AI in Defense and Security Systems: Legal and Ethical Considerations
88
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification
87
The Importance of Open-Source Intelligence in Assessing Risks of Cyberattacks
86
Societal Impact Assessment of a Cyber Security Network Project
84
Integration of Information Resources to Ensure Collaboration in Crisis Management
84
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems
84
Governance Mesh Approach for Cybersecurity Ecosystem
84
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
82
Cyber Hygiene Issues in the Naval Security Environment
82
Instrumental Equipment for Cyberattack Prevention
81
Insights on Human Factors Enhancing Cybersecurity
80
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
80
Supply Chain Cyber Security – Potential Threats
80
Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
79
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems
78
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
78
Augmented Reality in an Enhanced Command and Control Application
77
RSA Weaknesses Caused by the Specifics of Random Number Generation
77
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
77
EURMARS: Use of Satellite Imagery as an Asset for Maritime Environment Rapid Mapping and Object Detection in Large Areas
77
Comparative Research of Cybersecurity Information Sharing Models
74
From Classroom to Online Teaching – A Case during COVID19
74
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative
72
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
71
The Hackathons as a First Step to Build Digital Competences
71
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies
70
Pagination
Previous page
‹‹
Page 2
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top