Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Legal Considerations of Intelligence Operations in Countering Transnational Organised Crime
19
Practical Steps in Developing a National Network of Cybersecurity Research Centres in the Framework of ECHO Project
19
An IMMPDAF Solution to Benchmark Problem for Tracking in Clutter and Stand-off Jammer
18
Mine Hunting with Drones
18
A Robust Remote User Authentication Scheme using Smart Card
18
Towards Effective and Efficient IT Organizations with Enhanced Cyber Resilience
18
2020 Air Force Mission Capabilities Packages from Operational Analysis Perspective
18
Challenges of Multinational Acquisition of Capabilities in Black Sea Format
18
TAS: Trust Assessment System
18
A MATLAB Tool for Development and Testing of Track Initiation and Multiple Target Tracking Algorithms
18
Garbled Circuits: Optimizations and Implementations
18
Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria
17
C4ISR in Modernizing Security Sector in Bulgaria and South-Eastern Europe
17
Cyberwarriors: The Backbone of the Future Military or a Misnomer?
17
Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains
17
Assessing Comprehensive Security Approaches in Action: An Introduction
17
US Department of Defense Modeling and Simulation: New Approaches and Initiatives
17
MSA System Concept for Mediterranean Sea Surveillance
17
Fuzzy Control Based on Cluster Analysis and Dynamic Programming
17
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities
17
A Means of Comparing Military Budgeting Processes in South East Europe
17
Inductive Discovery of Criminal Group Structure Using Spectral Embedding
17
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
17
African Union-Led Peacekeeping Operations: Constraints and Opportunities of Interagency Cooperation in the Experience of Burundi and South Africa
17
Intelligence Services of the Czech Republic: Current Legal Status and Its Development
16
Formal Verification of Nuclear Systems: Past, Present, and Future
16
Information Technologies in the Command and Control System of the Gendarmerie
16
Tracking Filters for Radar Systems with Correlated Measurement Noise
16
Using Remote Sensing Methods to Refine the Landscape-Morphological Regionalization for the Territory Due to the Secondary Pollutant Redistribution Across Soil Cover
16
Towards Multi-National Capability Development in Cyber Defence
16
Human Expert Fusion for Image Classification
16
Comprehensive Security and Some Implemental Limits
16
Maritime Defence Investment Policy of the Republic of Bulgaria
16
Smart Grid Safety and Security: Educational and Research Activities
16
Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects
16
Risks for the Population along the Bulgarian Black Sea Coast from Flooding Caused by Extreme Rise of Sea Level
16
Introduction to the Fusion of Quantitative and Qualitative Beliefs
16
Information warfare principles and operations
16
Telemedical Services for Disaster Emergencies
16
Does NATO Have a Role in the Fight Against International Terrorism Analysis of NATO's Response to September 11
16
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking
15
The C4I System Concept and the Control of National Sea Spaces
15
Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide
15
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
15
Terrorism on the Sea, Piracy, and Maritime Security
15
Acquisition in a Large IT Organization
15
Serbian Security Perceptions: Motivations to Serve
15
The Concepts and Design of ROC Defense Reorganization
15
Secure e-Mail Application Software for Government in Indonesia
15
A Framework Methodology to Support the Selection of a Multipurpose Fighter
15
Pagination
Previous page
‹‹
Page 7
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top