Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations
46
K Band Radar Drone Signatures
46
Cyberwar in Russian and USA Military-Political Thought: A Comparative View
46
Augmented Reality in an Enhanced Command and Control Application
46
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy
45
The Bulgarian Armed Forces in the Information Society
45
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
44
Labour Relations and the Information Security of the State during the Covid-19 Pandemics
44
Signature-based Intrusion Detection Hardware-Software Complex
43
Heuristic-based Intrusion Detection Functionality in a Snort Environment
43
RSA Weaknesses Caused by the Specifics of Random Number Generation
43
A Security Approach to a Military Autonomous Platform Path Planning
41
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings
41
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
40
Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges
40
Context Scenarios in Long-Term Defense Planning
40
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
39
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm
39
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities
38
3D Facial Reconstruction from 2D Portrait Imagery
38
Simulation-Based Training with Gamified Components for Augmented Border Protection
38
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations
38
Adopting Machine Learning for Images Transferred with LoRaWAN
38
The Role of Information Campaigns and Advertising in the Military Recruitment System
37
Transformation: Military and Science
37
Profiling Human Roles in Cybercrime
36
The Use of the Internet by Terrorist Organizations
36
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection
35
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine
35
Problems of Digitized Information Flow Analysis: Cognitive Aspects
35
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution
34
Ecosystem Platform for the Defence and Security Sector of Ukraine
34
A BTC-Based Watermarking Scheme for Digital Images
34
Multinational Cooperation and Intervention: Small Steps to Better Results
34
Leadership in Uncertainty
34
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact
34
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
34
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis
34
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
33
Organising National Cybersecurity Centres
32
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider
32
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry
32
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
32
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
31
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
31
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor
31
Training as a Tool of Fostering CIP Concept Implementation: Results of a Table Top Exercise on Critical Energy Infrastructure Resilience
31
Cyber Security Teaching and Learning Laboratories: A Survey
30
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance
30
Tactical Approach to Cyber Defence in IoT Computer Networks
29
Pagination
Previous page
‹‹
Page 3
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top