Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Security Risks Relating to the Migrant Crisis and Interagency Cooperation: The Case of Macedonia and Bulgaria
12
Referencing the Future: The EU’s Projected Security Roles and Their R&D Implications
12
Interactive Simulations in Support of Decision Making on Defence Resource Allocation
12
Applying Modeling and Simulation to Enhance National and Multi-National Cooperation
12
Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience” (DIGILIENCE 2020)
12
Developing Regional Air Defence Capabilities: Role of NC3A
12
A New Class of Fusion Rules Based on T-Conorm and T-Norm Fuzzy Operators
12
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
12
Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants
12
An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues
12
NC3A Support to IED Fight: a Comprehensive Approach
12
Human Intuition and Decision-making Systems
12
Language Assistance to Multinational Partners in Coalition Operations
12
Challenge-Response Schemes Using Gap Diffie-Hellman Groups
12
The Urge for Comprehensive Cyber Security Strategies in the Western Balkan
12
Tiems Contribution to Emergency and Crisis Management
12
Intelligent Intrusion Detection Prevention Systems
12
Scenario Space for Alternative Futures of Security Research
12
Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function
12
A Method of Evaluating Assurance Requirements
12
Information Support for Effective Resource Management
12
The Internet and the Changing Face of International Relations and Security
12
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images
12
Lessons from a Customer-Funding Regime in a Large IT Organization
12
Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management
11
Ruggedized Commercial IT Modules for Field C2 Posts in Coalition Operations and Emergencies
11
Information Technology Management for the Bulgarian Armed Forces XXI
11
Operational Analysis in Support of Armed Forces Transformation: The Role of Organizational Culture
11
Homeland Security: General Templates and Options for the Future
11
Learning Choices: Generating and Integrating Informal Knowledge
11
Distributed Training, CAX and Experimentation in support of Crisis Management
11
A License Plate Recognition System in e-Government
11
Building a Potential to Counteract Hybrid Threats through Cooperation and Regional Security
11
An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures
11
Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects
11
Networking South East Europe in Managing Non-traditional Challenges
11
Transparency of Defence Policy in Progress
11
Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains
11
A Software Agent-based Collaborative Approach for Humanitarian-Assistance Scenarios
11
C4ISR: A Comprehensive Approach
11
Examining Air Power as a Component of State Power
11
Distributed Simulation and Modeling Environment
11
The Computer Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces
11
Analytical support to foresighting EU roles as a Global Security Actor
11
I&S Resources
11
Integrating COTS Technologies into a Scalable Mobile Emergency Command Post
11
Soft Computing Agents for Dynamic Routing
11
Dynamical Behavior of Fuzzy Logic Based Velocity Control Autopilot with Respect to Changes in Linguistic Variables Membership Functions Shape
11
Interacting Multiple Model Algorithms for Manoeuvring Ship Tracking Based On New Ship Models
11
Phishing Attacks: A Challenge Ahead
11
Pagination
Previous page
‹‹
Page 9
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top