Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Urban Area Geodynamic Risk Mapping Using Long-Term Time Series of Sentinel-1 Satellite Radar Interferometry
39
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
39
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
38
The System of Operative Determination of the Level of Tension in Society Based on Data from Social Networks
38
Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations
38
Multinational Cooperation and Intervention: Small Steps to Better Results
38
Cybersecurity Strategy’s Role in Raising Kenyan Awareness of Mobile Internet Threats
38
“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina
37
Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis
37
Cyberterrorism and Turkey’s Counter-Cyberterrorism Efforts
37
An innovative Airport Physical-cyber Security System (APSS)
37
Total Information Awareness (DARPA’s Research Program)
37
Stakeholder Engagement Framework
36
The Impact of the MSDF Technologies on the Information Space Structure Reordering and Evolution
35
Managing Cybersecurity Resources: A Cost-Benefit Analysis
35
Foundations for a new theory of plausible and paradoxical reasoning
34
Organising for IT Effectiveness, Efficiency and Cyber Resilience in the Academic Sector: National and Regional Dimensions
34
IT-related Challenges Facing the Bulgarian Armed Forces and Their Performance Related Impact
34
Quantum-Based Solutions for the Next-Generation Internet
34
Cybersecurity in Ukraine: Problems and Perspectives
33
21st Century Cyber Warfare
33
Money Laundering Techniques with Electronic Payment Systems
32
Institution Building for It Governance and Management
32
Hybrid Warfare and Societal Resilience: Implications for Democratic Governance
32
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis
32
Critical Information Infrastructure Protection (CIIP)
32
Prerequisites and Approaches to Force Modernization in a Transition Period
32
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider
32
ICT Governance, Human Factors and Cyber Situational Awareness
31
Cognitive Approach to Modeling Reflexive Control in Socio-Economic Systems
31
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria
31
Navigating Uncharted Waters: Tackling Maritime Cybersecurity Challenges in the Black Sea Region
31
Human Factors Make or Break Cybersecurity!
31
IT and Cyber Security Awareness – Raising Campaigns
31
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
31
Tactical Approach to Cyber Defence in IoT Computer Networks
31
Interorganizational and International Cooperation and Coordination in Providing Security: Current Practice and Lessons Learned
31
Creating and Strengthening Cybersecurity in the Republic of Moldova
30
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
30
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
30
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
30
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures
30
A Proposal for a Cross-Layer, P+S Approach in Underwater Communication: The Underwater Data Exchange Protocol
30
Information Sharing for Cyber Threats
29
e-Platform Architecture for Organisational Collaboration and IT Education
29
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
29
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments
29
Diffusion of Information in an Online Social Network with Limited Attention
29
National Security Strategy of the Netherlands: An Innovative Approach
29
Hybrid Warfare: Emerging Research Topics
29
Pagination
Previous page
‹‹
Page 4
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top