Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Integrated Framework and Methodology for Capability Priority Decisions
21
Development of Tools for Practical Research on Cybersecurity in Msc Theses
21
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
21
Fuzzy Controller for Antitank Wire Guided Missile Simulator with Direct X SDK
21
Debates around Britain’s National Security Are Characterized by a Paucity of Effective Leadership and a Surfeit of Political Cowardice
21
A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009
20
Transparency in Defence Resource Management - Problems and Solutions
20
Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management
20
Turkish Security Discourses and Policies: The Kurdish Question
20
Operational Research Tools Supporting the Force Development Process for the Canadian Forces
20
Hybrid Warfare Challenges and Responses: Lessons from Ukraine
20
Robot Map Building From Sonar Sensors and DSmT
20
Strategy Development and Implementation in a Complex Multi-National IT Organisation
20
Implementation of the ECHO Cyber Skills Framework in the CyberSecPro Project: Enhancing Cybersecurity Capabilities
20
Lessons of Transition in Bulgarian Security and Defense
20
The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation
20
A Brief on Embedded Societal Security
20
Information and Security at Dawn of the Twenty-First Century (in Bulgarian)
20
Scenarios in a Rational Approach towards Planning under Uncertainty
19
Research, Education, and Practice of StratCom in the Security Service of Ukraine in Interagency Settings
19
Development of the EU Policy of Police Cooperation with Third Countries: The Case of the Republic of North Macedonia
19
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
19
Cybersecurity as a Relative Concept
19
Automating Footwear Impressions Retrieval through Texture
19
Digital Transformation, Cyber Security and Resilience, Information & Security: An International Journal
19
From Cryptology to Cyber Resilience – Bridging Theory and Practice
19
Implementation of Results-Oriented Defense Resource Management in the Bulgarian MoD – Problems and Way Ahead
18
Information Security of Distance Learning
18
Legal Considerations of Intelligence Operations in Countering Transnational Organised Crime
18
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project
18
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer
18
Multi-stakeholder Approach to Cybersecurity and Resilience
18
Timothy Thomas on the Key Elements of the Russian Approach to IW
18
How to Counter Hybrid Threats?
18
Advancing Air and Air Defence Capabilities: What and How?
18
Earthquake Scenarios for the Cities of Sofia, Rousse and Vratsa
18
A Generic Reference Curriculum on Cybersecurity
18
Specific Features of IMM Tracking Filter Design
17
Information and Security at Dawn of the Twenty-First Century (in Bulgarian)
17
A Robust Remote User Authentication Scheme using Smart Card
17
Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare
17
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
17
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective
17
Challenges of Multinational Acquisition of Capabilities in Black Sea Format
17
Fuzzy Control Based on Cluster Analysis and Dynamic Programming
17
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
17
The Logical Model of Unified, Innovative Platform for Automation and Management of Standards (PAMS)
17
TAS: Trust Assessment System
17
A Means of Comparing Military Budgeting Processes in South East Europe
17
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa
16
Pagination
Previous page
‹‹
Page 6
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top