Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
The Experience of Rakovski National Defense College in Organizing the Communication in the Educational Process During Covid-19 Pandemic
26
Civil Security: Architectural Approach in Emergency Management Transformation
26
Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making
26
Virtual Diplomacy: Rethinking Foreign Policy Practice in the Information Age
25
Assessing Cyber Security 2015
25
Hypersonic Weapons in Achieving Maritime Superiority
25
Towards a More Resilient Cyberspace: The Case of Albania
25
Fuzzy Controller for Antitank Wire Guided Missile Simulator with Direct X SDK
25
Debates around Britain’s National Security Are Characterized by a Paucity of Effective Leadership and a Surfeit of Political Cowardice
25
Transparency in Defence Resource Management - Problems and Solutions
25
Improving Local Safety Management in Korea: A Case Study on Local Safety Index and Leisure Sports Safety Management
25
Process-oriented Model of Information Warfare
25
Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment
25
Automating Footwear Impressions Retrieval through Texture
24
Simulation of Critical Infrastructures
24
Research, Education, and Practice of StratCom in the Security Service of Ukraine in Interagency Settings
24
Integrated Framework and Methodology for Capability Priority Decisions
23
How to Counter Hybrid Threats?
23
Robot Map Building From Sonar Sensors and DSmT
23
Information Security and Multisensor Data Processing
23
A Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’
23
Applying the System Approach to the Study of Critical Infrastructure
23
Information and Security at Dawn of the Twenty-First Century (in Bulgarian)
23
From Cryptology to Cyber Resilience – Bridging Theory and Practice
23
A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009
23
Garbled Circuits: Optimizations and Implementations
23
Operational Research Tools Supporting the Force Development Process for the Canadian Forces
22
Timothy Thomas on the Key Elements of the Russian Approach to IW
22
Conceptualizing the Role of Societal Resilience in Countering Hybrid Warfare
22
Earthquake Scenarios for the Cities of Sofia, Rousse and Vratsa
22
Digital Transformation, Cyber Security and Resilience, Information & Security: An International Journal
22
A Generic Reference Curriculum on Cybersecurity
22
Specific Features of IMM Tracking Filter Design
22
Turkish Security Discourses and Policies: The Kurdish Question
22
Advancing Air and Air Defence Capabilities: What and How?
21
Development of Tools for Practical Research on Cybersecurity in Msc Theses
21
Cybersecurity as a Relative Concept
21
Lessons of Transition in Bulgarian Security and Defense
21
Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks
21
Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector
20
The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation
20
Scenarios in a Rational Approach towards Planning under Uncertainty
20
Information Security of Distance Learning
20
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project
20
Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria
20
Radon Emanation as a Source of Radiation Hazard to the Environment: The Case of the Ukrainian Shield
20
Multi-stakeholder Approach to Cybersecurity and Resilience
20
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
19
Small Countries and Major Global Economic Players – the Nicaraguan Channel
19
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective
19
Pagination
Previous page
‹‹
Page 6
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top