Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Field Integrated Communications and Information System for Bulgarian Land Forces
15
Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains
15
Towards Europe 2035: In Search of the Archimedean Screw. FOCUS in Perspective
15
Security Protocols for Outsourcing Database Services
15
Modeling and Simulation in Defense
15
Intelligence, Crime and Cybersecurity
15
Reconciling Operational and Financial Planning Views in a Customer-Funded Organization: Making Customer-Funding Work for NC3A
15
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking
15
The C4I System Concept and the Control of National Sea Spaces
15
Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide
15
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
15
Attacking a Leakage-Resilient Authenticated Encryption Scheme without Leakage
15
Controlling Computer Network Operations
14
The Obama Administration and Incident Response: A Report
14
Communication between the Defence Sector and the Civil Society of Bulgaria as a Way to Build Capacity for Countering Hybrid Threats
14
The Case for Advanced Distributed Learning
14
Privacy-Preserving Electronic Voting
14
Challenges and Advantages of Distance Learning Systems
14
Information Warfare and Security
14
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
14
Research and Development of an Iris-based Recognition System for Identification and Secure Authentication
14
IC3 - the Informativeness of the Conflict-Crisis-Catastrophe Triad
14
Good Governance of Intelligence from a Management Perspective
14
Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms
14
Good Practices and Challenges in Organizing for Cybersecurity
14
NATO-EU Cooperation on C4ISR Capabilities for Crisis Management
14
Synopsis of Operational Research in the UK Ministry of Defence
13
An Efficient and Practical Remote User Authentication Scheme
13
Multivariate Statistics of Security Perceptions in Europe
13
National Security Concepts and Information Warfare
13
A Generalization of the Classic Combination Rules to DSm Hyper-power Sets
13
Developing an Architecture for Naval Sovereignty Operations Center
13
Integrated Information Infrastructure of the State Agency for Civil Protection
13
E-Models and Methods for Project Management in the Public Area
13
Cognitive Biases in the Information Security Realm: Determinants, Examples and Mitigation
13
Supporting Transformation
13
Cyber Defence after Lisbon and the Implications of NATO’s New Strategic Concept
13
Using Strategic Planning in Support of Defense Acquisitions
13
The Human Factor in the Integrated Approach to Cyberdefence
13
Computer Assisted Exercises Management Environment for Civil Security
13
Formalizing the Optimization Problem in Long-Term Capability Planning
13
"Cuius Regio, Eius Religio, Omnium Spatium?” State Sovereignty in the Age of the Internet
13
DIGILIENCE 2020 Abstracts
13
Bulgaria’s Defence Policy and Force Size from a Comparative Macro Perspective
13
Supporting Transformation
13
On Simulation-based Wargaming: Comparison of Two Different Methodological Approaches
13
Information Security Architecture: An Integrated Approach to Security in the Organization
13
Distributed Training, CAX and Experimentation in support of Crisis Management
12
Developing Regional Air Defence Capabilities: Role of NC3A
12
A New Class of Fusion Rules Based on T-Conorm and T-Norm Fuzzy Operators
12
Pagination
Previous page
‹‹
Page 8
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top