Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Sort descending
Total views
Advanced Distributed Learning and Community
5
Advanced Distributed Learning for a Growing Security Community
5
Advanced Information Technology and Terrorism
5
Advanced NATO-compatible Solutions for Surface Vessels
3
Advanced Technologies for Defense Information System Support
3
Advances in Modelling and Simulation
5
Advancing Air and Air Defence Capabilities: What and How?
12
AFCEA Bulgarian Chapter Varna
2
AFCEA Varna Hosts Second International Conference on the Bulgarian Navy
3
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa
13
Agent-Based Technologies in Defense and Security
6
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes
124
Air Force Transformation resources
3
Air Power in the Contemporary Environment
4
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments
17
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services
20
Amelioration of ElGamal Digital Signature Schemes
26
An Accelerated IMM-JPDA Algorithm for Tracking Multiple Maneuvering Targets in Clutter
5
An Agent-Based Approach to the Development of Information Systems for Military Logistics
3
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System
26
An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures
6
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
73
An Effective Doppler Filtering Using Higher-Order Statistics
5
An Efficient and Practical Remote User Authentication Scheme
11
An Efficient and Secure Remote Authentication Scheme Using Smart Cards
5
An Enhanced Solution for Automated Fire Control Systems
55
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
10
An Experimental Application of a Trait-Based Personality Model to the Simulation of Military Decision-Making
5
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer
17
An Improved Version of a Multiple Target Tracking Algorithm
6
An innovative Airport Physical-cyber Security System (APSS)
23
An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues
10
An Interacting Multiple Model Algorithm for Stochastic Systems Control
6
Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects
9
Analysis of Cybersecurity Issues in the Maritime Industry
316
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
39
Analysis of the Reasons for Incidents with Radioactive Sources in Bulgaria and Preventive Measures
5
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
14
Analytical support to foresighting EU roles as a Global Security Actor
9
Applicable Modeling and Simulation Standards; Simulation Systems and Software; Selected Publications; Related Journals, Conferences, Workshops and Courses
2
Applying Modeling and Simulation to Enhance National and Multi-National Cooperation
6
Applying the System Approach to the Study of Critical Infrastructure
19
Architectures in the Analysis of Requirements and Design of Simulation Systems
5
Argumentative Negotiations with Anonymous Informer Agents
4
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
47
Assessing Comprehensive Security Approaches in Action: An Introduction
10
Assessing Cyber Security 2015
21
Assessing the Variety of Expected Losses upon the Materialisation of Threats to Banking Information Systems
66
Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage
8
Augmented Reality in an Enhanced Command and Control Application
46
Pagination
Previous page
‹‹
Page 2
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top