Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Using Architectural Models to Identify Opportunities for Improvement of Acquisition Management
11
Naval Craft, Weapon and Sensor Systems
11
Should the Intelligence Agencies ‘Show More Leg’ or Have They Just Been Stripped Naked?
11
NATO System Analysis and Studies Panel
11
Operations Research Support to Force and Operations Planning in the New Security Environment
11
CROCADILE - An Open, Extensible Agent-Based Distillation Engine
11
Information Assurance in C4I Systems
11
Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management
11
Ruggedized Commercial IT Modules for Field C2 Posts in Coalition Operations and Emergencies
11
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers
11
Operational Analysis in Support of Armed Forces Transformation: The Role of Organizational Culture
11
Homeland Security: General Templates and Options for the Future
11
Learning Choices: Generating and Integrating Informal Knowledge
11
NC3A as a platform to support C4ISR capabilities development for the Comprehensive Approach
10
Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions
10
The Genetic Program - A Technocratic Hypothesis
10
Overview of Fine Exact Methods of Safety Engineering
10
MAPWEB: Cooperation between Planning Agents and Web Agents
10
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force
10
Interoperability between Agencies and Nations
10
English Skills for Staff Officers: Collaborative Development of the Distance Course
10
Command and Control in Crisis Management
10
The Cyberspace Dimension in Armed Conflict: Approaching a Complex Issue with Assistance of the Morphological Method
10
Intrusion-Avoidance via System Diversity
10
Offsets Facilitate Cooperation with Companies in the European Defence, Technological and Industrial Base
10
The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas
10
Guidelines on a Mobile Security Lab Course
10
Cloud Testing: A State-of-the-Art Review
10
Information Technology and Terrorism: The Impact of Emerging Commercial Capabilities
10
Integration and Interoperability of Information Systems within the Coalition Aerospace Operations Center
10
Cybersecurity Challenges and Responses
10
TUX-TMS: A Reputation-based Trust System
10
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects
10
Multinational Cooperation in Civil-Military Interoperability
10
Homeland Security and the Russian Approach
10
The Information Society Should Serve the People
10
Modernization of the Bulgarian Air Force and Interoperability with Allied Forces
10
Bulgaria in NATO: Challenges to Civil Emergency Planning
10
A Small Step toward Interoperability
10
Countering Hybrid Warfare: Dedicated Organizations and Initiatives
10
Model and Implementation of Safety Case Cores
10
Implementation of the “KINEROS” Model for Estimation of the Flood Prone Territories in the Malki Iskar River Basin
10
Special Operations Forces in the Fight Against Terrorism on National Territory
10
Developing South East European Cooperative Crisis Management Capacity
10
New AFCEA Chapter in South-East Europe
10
On the Necessity to Create a National Processing Centre
9
Needs and Opportunities for Enhancing the Emergency Management System
9
Plagiarism, Cheating and Academic Dishonesty – Have You Been There?
9
Defence Budget Transparency on the Internet
9
Intelligence for a safe city model
9
Pagination
Previous page
‹‹
Page 10
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top