Information & Security logo

Peer-reviewed open-access journal
published since 1998 by Procon Ltd.

Volume
50

ISIJ 50: DIGILIENCE 2021: AI-driven Cybersecurity Solutions, Cyber Ranges, and Military ICT Applications

  • Browse list of volumes
  • Submit an article

Search form

  • Follow us on Twitter
  • Connect with us on LinkedIN
  • Like us on Facebook
  • Get content alerts

Preview articles

On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty

On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments

Blockchain in Agriculture

View all
  • News
  • Aims and scope
  • Instructions for authors
  • Fees
  • Journal information
  • Ethics in Publishing
  • Editorial Board
  • Calls for Articles

Advertising banner

Connection the Quarterly journal

IT for Security Department

  • 52300 reads

Journal news

09 Feb 2022

Two new articles on processing uncertain information

13 May 2021

Four articles for ISIJ volume 48 now published online

31 Mar 2021

New member of the Editorial Board from Greece

View more
Volume
50

ISIJ 50: DIGILIENCE 2021: AI-driven Cybersecurity Solutions, Cyber Ranges, and Military ICT Applications

Browse list of volumes
Share/Save
  • Most read in past 3 months
  • Most cited articles

A Clustering Method for Information Summarization and Modelling a Subject Domain

Author(s): D. Lande; I. Subach; O. Puchkov; A. Soboliev
09 Sep 2021
views (1,371)

AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes

Author(s): T. Tagarev; N. Stoianov; G. Sharkov; Y. Yanakiev
07 Sep 2021
views (1,272)

RSA Weaknesses Caused by the Specifics of Random Number Generation

Author(s): I. Blagoev; T. Balabanov; I. Iliev
15 Sep 2021
views (1,261)

Concepts in Networks and Communication Security and Graph Theory

Author(s): Y.Shterev Ivanov
16 Sep 2021
views (1,155)
view all

Capabilities-based Planning for Security Sector Transformation

Author(s)Todor Tagarev
04 Jul 2010
Citations: (90)

Institution Building for It Governance and Management

Author(s)Velizar Shalamanov
05 Oct 2017
Citations: (37)

Prerequisites and Approaches to Force Modernization in a Transition Period

Author(s)Todor Tagarev
04 Jul 2001
Citations: (19)

Context Scenarios in Long-Term Defense Planning

Author(s)Valeri Ratchev
04 Jul 2009
Citations: (18)
view all

Field of application

  • Cybersecurity
  • Defence
  • Internal security
  • Intelligence
  • Terrorism
  • Operations
  • Critical Infrastructures
  • Emergency Management
  • Supply chains
  • Education & Training

Concepts and Implementation

  • Policy, strategy and doctrine
  • C2 and coordination
  • Hybrid Threats
  • Resilience
  • IT Governance
  • Process Improvement
  • Foresight
  • Risk Management
  • Innovation

Technologies

  • C4ISR
  • Architectures
  • Modelling and Simulation
  • OR & Systems Analysis
  • Cryptography
  • Data mining
  • Deep Learning & AI
  • Emerging Technologies

Connection the Quarterly journal

IT for Security Department

  • Back to top

Information for

  • Authors
  • Editors
  • Reviewers

Help & Info

  • Ethical Guidelines
  • Indexing & Archiving
  • Permissions
  • Privacy Policy and Cookies

Subscribe

Contact us

  • Like us on Facebook
  • Connect with us on LinkedIN
  • Follow us on Twitter
  • Submit an inquiry

Contact us

Information & Security:
An International Journal
ISSN 0861-5160
e-ISSN 1314-2119

© 1998-2021 Procon Ltd.

EIC: 831834672
3, Razluka Str., ap. 20
Sofia 1111,  Bulgaria