Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Ontologies and Semantic Web Technologies to Support Knowledge-Based Transformation and Decision Support
7
The White Paper of Civil Protection of the Republic of Bulgaria
7
Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies
7
Problems on the Way to the Information Society: French Laws“on Dossiers”
7
Multi-Agent Systems to Support Coalition Forces
7
Managing Risk in Force Development Programs
7
Dependable Computing Systems in Support of Transformation of the Force Information Infrastructure
7
Choosing t-out-of-n Secrets by Oblivious Transfer
7
Books Related to Homeland Security
7
The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization
7
The Dialectics of Information – A Framework
7
Military Simulation: Techniques & Technology
7
Editorial
7
Methodological Issues in Planning for Crises and Natural Disasters
7
Counterterrorism Related Internet Sources
7
Fourth International Workshop on Commercial Information Technology for Military Operation
7
The Multi-Role NATO-Interoperable Light Weight Torpedo for the 21st Century
7
Agent-Based Technologies in Defense and Security
7
Object-Oriented Environment for Assessing Tracking Algorithms
7
An Interacting Multiple Model Algorithm for Stochastic Systems Control
7
Modeling and Simulation in Defense and Security: NATO Context
7
Achieving Interoperability of Command and Control Systems Using Translation Gateways
7
Guidelines on a Mobile Security Lab Course
7
Homeland / Societal Vulnerability and Security
6
Advanced Distributed Learning for a Growing Security Community
6
An Experimental Application of a Trait-Based Personality Model to the Simulation of Military Decision-Making
6
Mathematical Model of Fuzzy Control System for Autonomous Guided Vehicle in 3D Space
6
Contact Transitions Tracking During Force-Controlled Compliant Motion Using an Interacting Multiple Model Estimator
6
Bulgarian Information Network: Command Information Infrastructure for the Future
6
Comprehensive Approach: The Bulgarian Defence Experience in Crisis Management and Disaster Relief
6
The Bulgarian Air Force in a New Security Environment
6
Welcoming Address
6
Current Trends in Tactical Naval Communications
6
Naval Internet Sources
6
Selected Internet Sources on Civil Emergency and Law Enforcmenet Issues
6
C4 Common Technical Architecture Development Coordination Group
6
Defense Resource Management Simulation in the Bulgarian Ministry of Defense
6
Multi-agent systems in defense and security: Research projects, systems, and software tools
6
Reengineering Defence: the Role of C4
6
Evaluating Wireless Networks Security in Jordan: A Field Study
6
ADL websites - Useful sites, portals, and forums
6
C4ISR FOR Advanced Defence Capabilities and Security
6
Human Intuition and Decision-making Systems (II)
6
Biometric Template Security Using Code Base Cryptosystem
6
Cyber Awareness, Strategies, and Practice
6
Use of Mobile Applications in Security and Safety Systems
6
Modern Information Technologies and General Public Protection in the Republic of Bulgaria
6
An Accelerated IMM-JPDA Algorithm for Tracking Multiple Maneuvering Targets in Clutter
6
A New Technique for Enhancing the Properties of Transmitted Data
6
Operations Analysis in the Netherlands: A Brief Overview
6
Pagination
Previous page
‹‹
Page 13
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top