Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project
19
Fighting the First Battle of Cyberspace Preparedness: Finding Your Reserve Cyber-Warriors
19
Security Sector Reform Wisdom for Cyber Security Institution Building: The Case of Serbia
19
Small Countries and Major Global Economic Players – the Nicaraguan Channel
19
Challenges of Multinational Acquisition of Capabilities in Black Sea Format
18
US Department of Defense Modeling and Simulation: New Approaches and Initiatives
18
Smart Grid Safety and Security: Educational and Research Activities
18
MSA System Concept for Mediterranean Sea Surveillance
18
TAS: Trust Assessment System
18
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities
18
A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms
18
Intelligence Services of the Czech Republic: Current Legal Status and Its Development
18
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer
18
Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains
18
Mine Hunting with Drones
18
A Robust Remote User Authentication Scheme using Smart Card
18
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience
18
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective
18
Fuzzy Control Based on Cluster Analysis and Dynamic Programming
17
A Means of Comparing Military Budgeting Processes in South East Europe
17
Inductive Discovery of Criminal Group Structure Using Spectral Embedding
17
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
17
The Persistent Need to Reform Cyber Security Services: A Case Study on France
17
Does NATO Have a Role in the Fight Against International Terrorism Analysis of NATO's Response to September 11
17
DIGILIENCE 2019 Agenda and Abstracts
17
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa
17
C4ISR in Modernizing Security Sector in Bulgaria and South-Eastern Europe
17
Cyberwarriors: The Backbone of the Future Military or a Misnomer?
17
Assessing Comprehensive Security Approaches in Action: An Introduction
17
Maritime Defence Investment Policy of the Republic of Bulgaria
16
C4I System Reengineering: Essential Component of Bulgarian Armed Forces
16
Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects
16
The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination
16
Risks for the Population along the Bulgarian Black Sea Coast from Flooding Caused by Extreme Rise of Sea Level
16
Introduction to the Fusion of Quantitative and Qualitative Beliefs
16
Information warfare principles and operations
16
Telemedical Services for Disaster Emergencies
16
Formal Verification of Nuclear Systems: Past, Present, and Future
16
Information Technologies in the Command and Control System of the Gendarmerie
16
Tracking Filters for Radar Systems with Correlated Measurement Noise
16
Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover
16
Towards Multi-National Capability Development in Cyber Defence
16
Human Expert Fusion for Image Classification
16
Comprehensive Security and Some Implemental Limits
16
A Framework Methodology to Support the Selection of a Multipurpose Fighter
15
Field Integrated Communications and Information System for Bulgarian Land Forces
15
Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains
15
Towards Europe 2035: In Search of the Archimedean Screw. FOCUS in Perspective
15
Security Protocols for Outsourcing Database Services
15
Modeling and Simulation in Defense
15
Pagination
Previous page
‹‹
Page 7
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top