Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
Evolving Concept of Security: Project Overview
8
Architectures in the Analysis of Requirements and Design of Simulation Systems
8
The Multi-Role NATO-Interoperable Light Weight Torpedo for the 21st Century
8
Initiatives for Transparency-Building in Turkey: International, Regional and Domestic Factors
8
Work Package: Real-time Data Processing in Adaptive Sensor Interfaces
8
Secure User-Friendly Remote Authentication Schemes
8
Is Neutrality an Appropriate Instrument for Domestic Security?
8
The Coalition Information Systems and Operations Learning Network: An Emerging Concept for Multinational C4 Interoperability
8
Multinational Collaboration in Advanced Distributed Learning
8
Modeling and Simulation Internet Sources
8
Engagement of the Ministry of Defense and Bulgarian Armed Forces in Establishing Information Society
8
Dialectics of Information Security
8
Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform
8
Effects of Demographic Indicators on Perceptions of Followers of Leadership Styles
8
Geomorphologic Methods for Estimating Flood Hazards in Mountain Catchments
8
Advanced Information Technology and Terrorism
8
Cybersecurity-Related Internet Sources
8
Government PKI Deployment and Usage in Taiwan
8
A South-East European Defence Transparency Audit
8
Phase changes in Meta-modelling using the Fractal Dimension
8
Editorial: Critical Infrastructures Safety and Security. Trends in the Context of Information Technology Development
8
Contribution of the New Main Combat Aircraft to Bulgaria’s Defence Capabilities
8
Analysis of the Reasons for Incidents with Radioactive Sources in Bulgaria and Preventive Measures
8
Advances in Modelling and Simulation
8
Reasoning and Object-Oriented Data Processing for Multisensor Data Fusion
8
Integrating Topographical and Topological Data in the Estimation of the Actual Traffic Situation on Airports
8
Establishing an Air Pollution Monitoring Network for Industrial Regions: A Probabilistic Approach
8
Notes on the Experience of Transforming Distributed Learning Materials into SCORM Standard Specifications
8
Challenges for the Bulgarian Air Force - A Royal Air Force Perspective
8
Game Theoretical Modeling for Planning and Decision-Making
8
Modeling in Shaped Charge Design
8
A Visual Tool to Simplify the Building of Distributed Simulations Using HLA
8
Computer-aided exercises in training commanders and HQ staff: Note on Bulgarian Experience
8
The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development
8
Ordered DSmT and its Application to the Definition of Continuous DSm Models
8
E-Government and Security of Information
8
Transparency Matters
8
Information Support for Decision-Making during the Kosovo Crisis
8
Military Simulation: Techniques & Technology
8
Nigeria’s Information Security Challenges in the Light of Multi-Ethnicity
8
Transparency in Force Modernization Decisions
8
An Interacting Multiple Model Algorithm for Stochastic Systems Control
7
Fourth International Workshop on Commercial Information Technology for Military Operation
7
Agent-Based Technologies in Defense and Security
7
Object-Oriented Environment for Assessing Tracking Algorithms
7
Information in providing security and prosperity
7
Management of Critical Infrastructures Based on Technical Megastate
7
Cilvil-military Interoperability in Support of NATO Emerging Security Challenges
7
Air Power in the Contemporary Environment
7
Preparation of the Population and the Healthcare System for Action in Cases of Radiation Accidents and Nuclear Terrorism
7
Pagination
Previous page
‹‹
Page 12
Next page
››
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top