Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Diffusion of Information in an Online Social Network with Limited Attention
29
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
28
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System
28
Prospects for Improvement in Peacebuilding: The Choice for Cooperation and Coordination
27
Bulgaria and NATO: 7 Lost Years
27
Natural Disasters’ Management and Detection of Priority Problems for Future Research
27
Differences of Leadership Notions within NATO Member Countries: The Hungarian Experience
26
Simulation Modeling in Military Affairs: Status and Perspectives
26
The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations
26
Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
26
Planning Measures and Capabilities for Protection of Critical Infrastructures
26
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence
25
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety
25
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan
25
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria
25
A Method for the Development of Cyber Security Strategies
25
Graphic Model of The Target Audience of Psychological Influence in Social Networks
25
Use of a GIS System to Visualize the Levels of Risk in the Areas of Critical Infrastructure Objects
25
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
25
Network User Behaviour Analysis by Machine Learning Methods
25
Principles of Mitigating and Managing Human System Risks
25
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration
25
A Scalable and Adaptable Asset-Based Cyber Risk Assessment Tool for All Types of Organisations
24
Civil Security: Architectural Approach in Emergency Management Transformation
24
Simulation of Critical Infrastructures
24
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
24
A Hybrid Bat-Grey Wolf Algorithm for Predicting Chronic Kidney Disease
24
Education in Geomatics for First Line Emergency Management in Ukraine
24
Building Societal Resilience against Hybrid Threats
24
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services
23
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy
23
Multiple Hypothesis Tracking Using Hough Transform Track Detector
23
Macedonian Path Towards Cybersecurity
23
Process-oriented Model of Information Warfare
23
Digital Stabilization of Thermal Videos for Border and Infrastructure Surveillance
23
Assessing Cyber Security 2015
23
Vulnerability Analysis for Urban Natural Gas Pipeline Network System
23
Information Security and Multisensor Data Processing
22
Towards a More Resilient Cyberspace: The Case of Albania
22
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation
22
Applying the System Approach to the Study of Critical Infrastructure
22
Command and Control: Operational Requirements and System Implementation
22
Structured Description of Naval Tasks
22
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War
22
Promoting Interagency and International Cooperation in Countering Hybrid Threats
22
Testbed of an Integrated Network Operations Center and a Security Operations Center Based on Open-Source Tools
22
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age
22
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
22
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report
22
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
21
Pagination
Previous page
‹‹
Page 5
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top