Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Sort descending
An Agent-Based Approach to the Development of Information Systems for Military Logistics
3
Integrating Web, Desktop, Enterprise and Military Simulation Technologies to Enable World-Wide Scalable Televirtual Environments
3
Commercial-Off-The-Shelf Software Becomes Mission-Critical to Success and Cost-Effective Space Missions
3
The Multi-Role NATO-Interoperable Light Weight Torpedo for the 21st Century
4
E-Tender - An Approach for Ensuring Transparency in Defence Budget Management
4
Electromagnetic Radiation and the Computer Systems Data Security Problem
4
Center for Security Studies and Conflict Research
4
Modeling and Simulation in Defense and Security: NATO Context
4
Management of Critical Infrastructures Based on Technical Megastate
4
Cilvil-military Interoperability in Support of NATO Emerging Security Challenges
4
Air Power in the Contemporary Environment
4
Preparation of the Population and the Healthcare System for Action in Cases of Radiation Accidents and Nuclear Terrorism
4
Computer Aided Dispatch – A Tool for Effect-Based Multinational and Interagency Operations
4
Secure User-Friendly Remote Authentication Schemes
4
Black Sea Initiative Project for Civil Military Emergency Planning
4
Modeling and Simulation Internet Sources
4
Center of excellence for Education, Science & Technology in 21 Century (BIS-21)
4
SEEDEFCOL - Virtual Defence College for Distance Learning in South East Europe
4
LAN Times Guide to Security and Data Integrity
4
EvoCS-related Projects and Initiatives
4
Homeland Security and the Russian Approach
4
Standards Integration in E-Learning, Simulations, and Technical Manuals
4
Contact Transitions Tracking During Force-Controlled Compliant Motion Using an Interacting Multiple Model Estimator
4
Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management
4
Homeland Security Internet Sources
4
Naval Internet Sources
4
Experimental Validation Of Metamodels For Intelligent Agents In Conflict
4
Center for National Security and Defense Research
4
Reengineering Defence: the Role of C4
4
Evaluating Wireless Networks Security in Jordan: A Field Study
4
Operational Analysis Support to Defence in Norway
4
Needs and Opportunities for Enhancing the Emergency Management System
4
Ontologies and Semantic Web Technologies to Support Knowledge-Based Transformation and Decision Support
4
The White Paper of Civil Protection of the Republic of Bulgaria
4
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES
4
Multi-agent Systems research: General research - on-line resources
4
C4ISR FOR Advanced Defence Capabilities and Security
4
Cryptographic Software Solution for Information Protection in a Corporate Intranet
4
Cyber Awareness, Strategies, and Practice
4
The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development
4
Managing Risk in Force Development Programs
4
Risk as a Factor in Decision-Making
4
Dependable Computing Systems in Support of Transformation of the Force Information Infrastructure
4
Choosing t-out-of-n Secrets by Oblivious Transfer
4
Books Related to Homeland Security
4
Fuzzy Logic Approach to Estimating Tendencies in Target Behavior
4
Argumentative Negotiations with Anonymous Informer Agents
4
Defence Budget Transparency on the Internet
4
Bulgarian MSDF R&D National Program and Activities
4
A New Technique for Enhancing the Properties of Transmitted Data
4
Pagination
Previous page
‹‹
Page 2
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top