Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Network User Behaviour Analysis by Machine Learning Methods
32
Building Societal Resilience against Hybrid Threats
32
IT and Cyber Security Awareness – Raising Campaigns
32
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
32
e-Platform Architecture for Organisational Collaboration and IT Education
32
Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues
32
Diffusion of Information in an Online Social Network with Limited Attention
31
Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security
31
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures
31
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan
31
Amelioration of ElGamal Digital Signature Schemes
31
Graphic Model of The Target Audience of Psychological Influence in Social Networks
31
Information Sharing for Cyber Threats
31
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
30
Planning Measures and Capabilities for Protection of Critical Infrastructures
30
Natural Disasters’ Management and Detection of Priority Problems for Future Research
30
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy
30
National Security Strategy of the Netherlands: An Innovative Approach
30
Hybrid Warfare: Emerging Research Topics
30
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
30
Bulgaria and NATO: 7 Lost Years
29
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System
29
Simulation Modeling in Military Affairs: Status and Perspectives
28
Vulnerability Analysis for Urban Natural Gas Pipeline Network System
27
A Method for the Development of Cyber Security Strategies
27
Differences of Leadership Notions within NATO Member Countries: The Hungarian Experience
27
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria
27
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
26
Promoting Interagency and International Cooperation in Countering Hybrid Threats
26
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report
26
Strategy Development and Implementation in a Complex Multi-National IT Organisation
26
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration
26
Principles of Mitigating and Managing Human System Risks
26
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence
26
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety
26
Macedonian Path Towards Cybersecurity
26
Command and Control: Operational Requirements and System Implementation
26
Education in Geomatics for First Line Emergency Management in Ukraine
25
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services
25
Multiple Hypothesis Tracking Using Hough Transform Track Detector
25
Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management
25
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War
25
Civil Security: Architectural Approach in Emergency Management Transformation
25
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
24
Hybrid Warfare Challenges and Responses: Lessons from Ukraine
24
Assessing Cyber Security 2015
24
Towards a More Resilient Cyberspace: The Case of Albania
24
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)
24
Debates around Britain’s National Security Are Characterized by a Paucity of Effective Leadership and a Surfeit of Political Cowardice
24
A Brief on Embedded Societal Security
24
Pagination
Previous page
‹‹
Page 5
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top