Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Possibilities for Using Unmanned Aerial Vehicles to Obtain Sensory Information for Environmental Analysis
36
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
35
Cyber Security and Resilience of Modern Societies: A Research Management Architecture
35
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)
35
Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks
35
Principles of Mitigating and Managing Human System Risks
34
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
33
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria
33
'FOCUS': Foresight Security Scenarios to Plan for Research to Support the 'EU 2035' as a Comprehensive Security Provider
33
IT and Cyber Security Awareness – Raising Campaigns
33
Tactical Approach to Cyber Defence in IoT Computer Networks
33
Building the Capacity of NATO’s Eastern European Members to Fight Hybrid War
33
Bulgaria and NATO: 7 Lost Years
32
Volunteers in Disaster Relief in Zones of Armed Conflict: The Case of Syrian Refugee Camps in Jordan
32
Graphic Model of The Target Audience of Psychological Influence in Social Networks
32
e-Platform Architecture for Organisational Collaboration and IT Education
32
Planning Measures and Capabilities for Protection of Critical Infrastructures
31
Integrated Approach to Cyber Defence: Human in the Loop. Technical Evaluation Report
31
Natural Disasters’ Management and Detection of Priority Problems for Future Research
31
National Security Strategy of the Netherlands: An Innovative Approach
31
Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures
31
Comparison of the Regulations on Communication Privacy between EU and Japan: Toward Reinforcement of Japan’s Communication Privacy
31
Hybrid Warfare: Emerging Research Topics
31
Amelioration of ElGamal Digital Signature Schemes
31
Information Sharing for Cyber Threats
31
Vulnerability Analysis for Urban Natural Gas Pipeline Network System
30
Strategy Development and Implementation in a Complex Multi-National IT Organisation
30
Simulation Modeling in Military Affairs: Status and Perspectives
30
An Alternative of the System Approach to Functional Aspects Analysis of the Maritime Crisis Management System
29
On the Earthquake Hazard and the Management of Seismic Risk in Bulgaria
29
Hybrid Warfare Challenges and Responses: Lessons from Ukraine
28
Development of the EU Policy of Police Cooperation with Third Countries: The Case of the Republic of North Macedonia
28
Macedonian Path Towards Cybersecurity
28
Hybrid Threats in Bulgarian Media
28
Differences of Leadership Notions within NATO Member Countries: The Hungarian Experience
28
Education in Geomatics for First Line Emergency Management in Ukraine
27
Implementation Hierarchy and CIO Organization in Bulgaria’s Public Administration
27
Why Digital Ecosystems of Civil-Military Partnerships Are a Game Changer for International Security and Defence
27
Alternative On-board Communication Systems Enhancing the Operation Efficiency of Vessel Traffic Services
27
Command and Control: Operational Requirements and System Implementation
27
A Method for the Development of Cyber Security Strategies
27
Promoting Interagency and International Cooperation in Countering Hybrid Threats
26
Self-Advertising Attack Surfaces for Web Application Honeypots: New Technology to Managing Cyber Disasters
26
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation
26
On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety
26
Providing Physical Protection of the Vessel in the Event of an Attack at Sea and Ports
26
A Brief on Embedded Societal Security
26
Multiple Hypothesis Tracking Using Hough Transform Track Detector
26
Structured Description of Naval Tasks
26
Information and Security at Dawn of the Twenty-First Century (in Bulgarian)
26
Pagination
Previous page
‹‹
Page 5
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top