Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
53
ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Tactical Approach to Cyber Defence in IoT Computer Networks
29
Foundations for a new theory of plausible and paradoxical reasoning
29
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions
29
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis
29
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
29
Stakeholder Engagement Framework
28
Hybrid Warfare: Emerging Research Topics
28
Prerequisites and Approaches to Force Modernization in a Transition Period
28
Total Information Awareness (DARPA’s Research Program)
27
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
27
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria
27
Amelioration of ElGamal Digital Signature Schemes
26
Money Laundering Techniques with Electronic Payment Systems
26
Institution Building for It Governance and Management
26
Information Sharing for Cyber Threats
26
e-Platform Architecture for Organisational Collaboration and IT Education
26
Simulation Modeling in Military Affairs: Status and Perspectives
26
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
26
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
26
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System
26
21st Century Cyber Warfare
26
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures
25
IT and Cyber Security Awareness – Raising Campaigns
25
Cryptographic Key Generation by Genetic Algorithms
25
ICT Governance, Human Factors and Cyber Situational Awareness
25
Quantum-Based Solutions for the Next-Generation Internet
25
Natural Disasters’ Management and Detection of Priority Problems for Future Research
25
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination
24
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
24
An innovative Airport Physical-cyber Security System (APSS)
23
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
23
Simulation of Critical Infrastructures
23
Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems
23
Critical Information Infrastructure Protection (CIIP)
23
Bulgaria and NATO: 7 Lost Years
23
Cybersecurity in Ukraine: Problems and Perspectives
23
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
23
Challenges in E-Government and Security of Information
23
National Security Strategy of the Netherlands: An Innovative Approach
22
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria
22
Diffusion of Information in an Online Social Network with Limited Attention
22
Education in Geomatics for First Line Emergency Management in Ukraine
22
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence
21
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety
21
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan
21
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
21
Network User Behaviour Analysis by Machine Learning Methods
21
Assessing Cyber Security 2015
21
Principles of Mitigating and Managing Human System Risks
21
Vulnerability Analysis for Urban Natural Gas Pipeline Network System
21
Pagination
Previous page
‹‹
Page 4
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top