Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Strategic and Technology Policy Implications for E-Government
9
Network Intrusion Detection: An Analyst’s Handbook
9
The Information Society Should Serve the People
9
Governance on Intelligence: Issues that Play a Role
9
New Challenges to Information Security Caused by the Introduction of Wi-Fi Technologies
9
Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle
9
NATO and Sweden Joint Live Experiment on NEC
9
Bulgaria in NATO:New Roles and Capabilities of the Navy
9
Design of a Secure Fine-Grained Official Document Exchange Model for E-Government
9
E-Comerce Laboratory, Plovdiv University, Bulgaria
9
The Internet in China: Civilian and Military Uses
9
Contemporary Trends in the Development of Information Security and Computer Virology
9
The Information Revolution and Post-Modern Warfare
9
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers
9
Advanced NATO-compatible Solutions for Surface Vessels
9
Developing and Employing Expeditionary Capabilities: Key to Transforming Air Forces of Small NATO Nations
9
An Efficient and Secure Remote Authentication Scheme Using Smart Cards
9
Two Secure Transportation Schemes for Mobile Agents
9
A Terrain Reasoning Algorithm for Defending a Fire Zone
9
Library Update
9
On Integrity of Intelligence in Countries of Eastern Europe
9
Combat & Security Related Modeling and Simulation in Croatia
9
On the Necessity to Create a National Processing Centre
9
Plagiarism, Cheating and Academic Dishonesty – Have You Been There?
9
Defence Budget Transparency on the Internet
9
The Genetic Program - A Technocratic Hypothesis
9
Intelligence for a safe city model
9
Reforming Intelligence Services In Mexico
9
Risk as a Factor in Decision-Making
9
New Financial Transaction Security Concerns in Mobile Commerce
9
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service
9
Identifying the Reasons for Failures in Large-Scale Systems
9
PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure
9
English Skills for Staff Officers: Collaborative Development of the Distance Course
9
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES
9
An Improved Version of a Multiple Target Tracking Algorithm
9
Kaleidoscopic Approach to Security Shadows in the Age of Information
9
Ubiquitous Insecurity? How to “Hack” IT Systems
9
Architectures in the Analysis of Requirements and Design of Simulation Systems
8
Is Neutrality an Appropriate Instrument for Domestic Security?
8
The Coalition Information Systems and Operations Learning Network: An Emerging Concept for Multinational C4 Interoperability
8
Multinational Collaboration in Advanced Distributed Learning
8
Modeling and Simulation Internet Sources
8
Engagement of the Ministry of Defense and Bulgarian Armed Forces in Establishing Information Society
8
Dialectics of Information Security
8
Secure User-Friendly Remote Authentication Schemes
8
Government PKI Deployment and Usage in Taiwan
8
A South-East European Defence Transparency Audit
8
Phase changes in Meta-modelling using the Fractal Dimension
8
Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform
8
Pagination
Previous page
‹‹
Page 11
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top