Skip to main content
Mobile menu invoker
Open menu
Infosec main menu
News
Aims and scope
Instructions for authors
Fees
Journal information
Ethics in Publishing
Editorial Board
Calls for Articles
Contributors
Peer-reviewed open-access journal
published since 1998 by
Procon Ltd
.
Volume
55
ISIJ 55: Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cybersecurity and Countering Disinformation
Information and security top menu
Browse list of volumes
Submit an article
Search
Social menu IS
Follow us on Twitter
Connect with us on LinkedIN
Like us on Facebook
Infosec subscribtion
Get content alerts
Most read in past 36 months
Title
Total views
A Call for Holistic Approach to Defence Transparency in South East Europe
5
Integrating Web, Desktop, Enterprise and Military Simulation Technologies to Enable World-Wide Scalable Televirtual Environments
5
Commercial-Off-The-Shelf Software Becomes Mission-Critical to Success and Cost-Effective Space Missions
5
Interface Solutions for Improving Information Interoperability in the Conditions of Hybrid Threats
5
Transparency-building in the Security Sector
4
The Rise of Russian PMCs – ‘Stealth’ Instrument for a ‘Sharp Power’
4
Fully Integrated Communications System for Frigates
4
Testbed for implementation of advanced IT Participation
4
Monitor Research Centers
4
Comprehensive Institutional Approach to Developing Capabilities to Counter Hybrid Threats: Legal and Doctrinal Limitations
4
Future Security Trends and Their Impact from an Industry Point of View
4
Applicable Modeling and Simulation Standards; Simulation Systems and Software; Selected Publications; Related Journals, Conferences, Workshops and Courses
4
Formulation of Crisis Plans and Strategies
4
A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets
4
Transparency in Reforming the National Security Sector in Transition Countries
4
Government against the Terrorist Threat of Twenty First Century
4
An Agent-Based Approach to the Development of Information Systems for Military Logistics
4
Common Data Administration, Data Management, and Data Alignment as a Necessary Requirement for Coupling C4ISR Systems and M&S Systems
3
Command and Control in Civil Emergencies
3
The Art of Achieving Political Goals without Use of Force: War by Non-Military Means
3
Application of Information and Communications Technologies and Means of Radio-electronic Warfare in Hybrid War
3
Концепцията за национална сигурност и информационното противоборство
3
Pagination
Previous page
‹‹
Page 15
Field of application
Cybersecurity
Defence
Internal security
Intelligence
Terrorism
Operations
Critical Infrastructures
Emergency Management
Supply chains
Education & Training
Concepts and Implementation
Policy, strategy and doctrine
C2 and coordination
Hybrid Threats
Resilience
IT Governance
Process Improvement
Foresight
Risk Management
Innovation
Technologies
C4ISR
Architectures
Modelling and Simulation
OR & Systems Analysis
Cryptography
Data mining
Deep Learning & AI
Emerging Technologies
Link to top
Back to top