Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
A Cost-Effective Approach to Securing Systems through Partial Decentralization
61
Initial Exploitation of Natural Language Processing Techniques on NATO Strategy and Policies
61
Implementation of the Concept of Critical Infrastructure Protection in Ukraine: Achievements and Challenges
59
Piloting the ECHO e-Skills and Training Toolkit
58
Model for Risk Management of Critical Infrastructures of the Republic of Bulgaria
58
Insights on Human Factors Enhancing Cybersecurity
56
A Model of a Cyber Defence Awareness System of Campaigns with Malicious Information
56
Analysis of the Global Attack Landscape Using Data from a Telnet Honeypot
55
Aspect Level Sentiment Analysis Methods Applied to Text in Formal Military Reports
55
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities
55
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
54
Heuristic-based Intrusion Detection Functionality in a Snort Environment
54
K Band Radar Drone Signatures
53
Cyberwar in Russian and USA Military-Political Thought: A Comparative View
53
Ecosystem Platform for the Defence and Security Sector of Ukraine
52
E-Platform to Maintain Digital Competencies for Collaborative Network Organisations
51
Applying a New Approach to Consider the Human Factor in the Design of Information Security Systems
51
The Need for Emotional Cues Analysis in OSINT in Countering Reflexive Control Information Warfare Campaigns: A Critical Review and Reconceptualization
51
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy
50
Signature-based Intrusion Detection Hardware-Software Complex
50
A Security Approach to a Military Autonomous Platform Path Planning
50
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
50
Profiling Human Roles in Cybercrime
49
The Importance of Open-Source Intelligence in Assessing Risks of Cyberattacks
49
Labour Relations and the Information Security of the State during the Covid-19 Pandemics
49
Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings
48
3D Facial Reconstruction from 2D Portrait Imagery
47
Simulation-Based Training with Gamified Components for Augmented Border Protection
47
Data, Privacy and Human-Centered AI in Defense and Security Systems: Legal and Ethical Considerations
47
The Bulgarian Armed Forces in the Information Society
46
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor
46
Cyber Security Teaching and Learning Laboratories: A Survey
45
Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine
45
C4ISR in Navy Transformation Role, Joint Research and Advanced Technology Demonstrations
45
Adopting Machine Learning for Images Transferred with LoRaWAN
44
Organising National Cybersecurity Centres
43
A BTC-Based Watermarking Scheme for Digital Images
43
The Use of the Internet by Terrorist Organizations
43
Trajectory Data Compression Using Speed-Course Threshold Followed by Adaptive Douglas-Peucker Algorithm
42
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
42
The Role of Information Campaigns and Advertising in the Military Recruitment System
42
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
42
Leadership in Uncertainty
42
Problems of Digitized Information Flow Analysis: Cognitive Aspects
41
Context Scenarios in Long-Term Defense Planning
41
The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection
41
EURMARS: Use of Satellite Imagery as an Asset for Maritime Environment Rapid Mapping and Object Detection in Large Areas
41
Cryptographic Key Generation by Genetic Algorithms
41
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
39
Transformation: Military and Science
39
Pagination
Previous page
‹‹
Page 3
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top