Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Integration of Information Resources to Ensure Collaboration in Crisis Management
74
A Model of ICT Competence Development for Digital Transformation
74
Model Fooling Attacks Against Medical Imaging: A Short Survey
73
Societal Impact Assessment of a Cyber Security Network Project
73
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
72
Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices
72
MAIT: Malware Analysis and Intelligence Tool
71
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
71
A Cyber Range for Armed Forces Education
70
A Governance Model for an EU Cyber Security Collaborative Network – ECSCON
70
Optimization of the Chief Information Officer Function in Large Organizations
70
Design Science Research towards Privacy by Design in Maritime Surveillance ICT Systems
69
Human Factor, Resilience, and Cyber/Hybrid Influence
69
DIGILIENCE - A Platform for Digital Transformation, Cyber Security and Resilience
69
Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief
68
Instrumental Equipment for Cyberattack Prevention
68
Planning and Implementing Change in Cyber Security Network Organisations
68
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
66
Data Science as a Service: The Data Range
66
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems
65
Cyber Hygiene Issues in the Naval Security Environment
64
Governance Mesh Approach for Cybersecurity Ecosystem
63
Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045
62
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification
60
From Classroom to Online Teaching – A Case during COVID19
59
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
58
A System-of-Systems Approach to Cyber Security and Resilience
58
Supply Chain Cyber Security – Potential Threats
58
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
58
The Hackathons as a First Step to Build Digital Competences
58
French Cyber Security and Defence: An Overview
57
Preserving Privacy of Security Services in the SecaaS Model
57
Resilience Management Framework for Critical Information Infrastructure: Designing the Level of Trust that Encourages the Exchange of Health Data
57
Concepts in Networks and Communication Security and Graph Theory
57
Framing Trade and Peace in the Time of Covid-19: The World Trade Organization and the Narratives of Inclusion of Peripheral Trade Zones
56
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
56
An Enhanced Solution for Automated Fire Control Systems
55
Rethinking China’s Leadership through an Analysis of the Belt and Road Initiative
55
Piloting the ECHO e-Skills and Training Toolkit
53
A Cost-Effective Approach to Securing Systems through Partial Decentralization
53
Military Implications of the Nagorno-Karabakh Conflict: Tactics and Technologies
51
Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems
51
MonSys: A Scalable Platform for Monitoring Digital Services Availability, Threat Intelligence and Cyber Resilience Situational Awareness
50
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
50
Using Cyber Ranges in Cybersecurity Management Educational Programmes
50
Comparative Analysis of Counter-Terrorism Efforts of NATO and the Shanghai Cooperation Organization
48
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
47
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
47
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies
47
Augmented Reality in an Enhanced Command and Control Application
46
Pagination
Previous page
‹‹
Page 2
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top