Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Building a Potential to Counteract Hybrid Threats through Cooperation and Regional Security
11
Distributed Training, CAX and Experimentation in support of Crisis Management
11
Networking South East Europe in Managing Non-traditional Challenges
11
Transparency of Defence Policy in Progress
11
Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains
11
A Software Agent-based Collaborative Approach for Humanitarian-Assistance Scenarios
11
An Approach for Assessing Risk of Common Cause Failures in Critical Infrastructures
11
Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects
11
A NATO Perspective on Challenges and Prospects for the Bulgarian Air Force
10
Interoperability between Agencies and Nations
10
Command and Control in Crisis Management
10
The Cyberspace Dimension in Armed Conflict: Approaching a Complex Issue with Assistance of the Morphological Method
10
The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas
10
Intrusion-Avoidance via System Diversity
10
Offsets Facilitate Cooperation with Companies in the European Defence, Technological and Industrial Base
10
Integration and Interoperability of Information Systems within the Coalition Aerospace Operations Center
10
Cybersecurity Challenges and Responses
10
TUX-TMS: A Reputation-based Trust System
10
Cloud Testing: A State-of-the-Art Review
10
Romanian Air Force Operational Capabilities Generation Process
10
Information Technology and Terrorism: The Impact of Emerging Commercial Capabilities
10
Homeland Security and the Russian Approach
10
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects
10
Multinational Cooperation in Civil-Military Interoperability
10
Bulgaria in NATO: Challenges to Civil Emergency Planning
10
A Small Step toward Interoperability
10
Countering Hybrid Warfare: Dedicated Organizations and Initiatives
10
Modernization of the Bulgarian Air Force and Interoperability with Allied Forces
10
Special Operations Forces in the Fight Against Terrorism on National Territory
10
Developing South East European Cooperative Crisis Management Capacity
10
New AFCEA Chapter in South-East Europe
10
Model and Implementation of Safety Case Cores
10
Implementation of the “KINEROS” Model for Estimation of the Flood Prone Territories in the Malki Iskar River Basin
10
Commercial Information Technology for Military Operations: Information Sharing and Communication Security in Ad-Hoc Coalitions
10
NC3A as a platform to support C4ISR capabilities development for the Comprehensive Approach
10
EKS: Open-source Web-based Distributed Learning Tool
10
MAPWEB: Cooperation between Planning Agents and Web Agents
10
National Military Command Center - From Idea to Implementation
10
Overview of Fine Exact Methods of Safety Engineering
10
C4ISR Support to the Comprehensive Approach
10
English Skills for Staff Officers: Collaborative Development of the Distance Course
9
E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES
9
An Improved Version of a Multiple Target Tracking Algorithm
9
Kaleidoscopic Approach to Security Shadows in the Age of Information
9
Ubiquitous Insecurity? How to “Hack” IT Systems
9
Band Width Maximin Fair Optimization in Mesh Networks Based on Perceived Quality of Service
9
Identifying the Reasons for Failures in Large-Scale Systems
9
PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure
9
The Growing Threat: Homeland Security Issues of Bulgaria
9
Advanced Distributed Learning and Community
9
Pagination
Previous page
‹‹
Page 10
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top