Information & Security logo

Peer-reviewed open-access journal
published since 1998 by Procon Ltd.

Volume
47

ISIJ 47: DIGILIENCE 2020: Cyber Protection of Critical Infrastructures, Big Data and Artificial Intelligence

  • Browse list of volumes
  • Submit an article

Search form

  • Follow us on Twitter
  • Connect with us on LinkedIN
  • Like us on Facebook
  • Get content alerts

Preview articles

NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages

On the Use of UAVs with a Slantrange Sensor System for Estimation of Crop Safety

Ecosystem Platform for the Defence and Security Sector of Ukraine

View all
  • News
  • Aims and scope
  • Instructions for authors
  • Journal information
  • Editorial Board
  • Calls for Articles

Advertising banner

Connection the Quarterly journal

IT for Security Department

  • 38778 reads

Journal news

12 Feb 2019

Two ISIJ authors with a best paper award

10 Feb 2019

ISIJ articles with new publication license

02 Feb 2019

New member of the ISIJ Editorial Board from the Bulgarian Defence Institute

View more
Volume
47

ISIJ 47: DIGILIENCE 2020: Cyber Protection of Critical Infrastructures, Big Data and Artificial Intelligence

Browse list of volumes
Share/Save
  • Most read in past 3 months
  • Most cited articles

A Logical Model for Multi-Sector Cyber Risk Management

Author(s): T. Tagarev; S.Marco Pappalardo; N. Stoianov
15 May 2020
views (4,283)

A System for Analysis of Big Data from Social Media

Author(s): D. Lande; I. Subach; A. Puchkov
15 May 2020
views (2,082)

3D Facial Reconstruction from 2D Portrait Imagery

Author(s): M. Caruana; J.G. Vella
14 Sep 2020
views (1,940)

A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT

Author(s): V. Kharchenko; O. Morozova; O. Illiashenko; S. Sokolov
15 May 2020
views (1,775)
view all

Capabilities-based Planning for Security Sector Transformation

Author(s)Todor Tagarev
04 Jul 2010
Citations: (90)

Prerequisites and Approaches to Force Modernization in a Transition Period

Author(s)Todor Tagarev
04 Jul 2001
Citations: (19)

Context Scenarios in Long-Term Defense Planning

Author(s)Valeri Ratchev
04 Jul 2009
Citations: (18)

Institution Building for It Governance and Management

Author(s)Velizar Shalamanov
05 Oct 2017
Citations: (37)
view all

Field of application

  • Cybersecurity
  • Defence
  • Internal security
  • Intelligence
  • Terrorism
  • Operations
  • Critical Infrastructures
  • Emergency Management
  • Supply chains
  • Education & Training

Concepts and Implementation

  • Policy, strategy and doctrine
  • C2 and coordination
  • Hybrid Threats
  • Resilience
  • IT Governance
  • Process Improvement
  • Foresight
  • Risk Management
  • Innovation

Technologies

  • C4ISR
  • Architectures
  • Modelling and Simulation
  • OR & Systems Analysis
  • Cryptography
  • Data mining
  • Deep Learning & AI
  • Emerging Technologies

Connection the Quarterly journal

IT for Security Department

  • Back to top

Information for

  • Authors
  • Editors
  • Reviewers

Help & Info

  • Ethical Guidelines
  • Indexing & Archiving
  • Permissions
  • Privacy Policy and Cookies

Subscribe

Contact us

  • Like us on Facebook
  • Connect with us on LinkedIN
  • Follow us on Twitter
  • Submit an inquiry

Contact us

Information & Security:
An International Journal
ISSN 0861-5160
e-ISSN 1314-2119

© 1998-2020 Procon Ltd.

EIC: 831834672 3, Razluka Str.,
ap. 20 I Sofia 1111 I Bulgaria