Stop the war!
Остановите войну!
for scientists:
default search action
Terrorist Use of Cyberspace and Cyber Terrorism 2015
- Mehmet Nesip Ogun:
Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. NATO Science for Peace and Security Series, D: Information and Communication Security 42, IOS Press 2015, ISBN 978-1-61499-527-2 - Alan Brill:
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. 1-14 - Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski:
Steganography in Support of the Global Terrorism. 15-28 - Ronald S. Bearse:
Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. 29-44 - Alan Brill:
Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. 45-56 - Ivica Simonovski:
The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. 57-72 - David Mair:
Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. 73-85 - Elliot Zweig:
From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. 86-101 - Nancy Houston:
How Human Issues Impact Confronting Cyber Terrorism. 102-115 - Zlatogor Minchev:
Human Factor Dual Role in Modern Cyberspace Social Engineering. 116-128 - Arthur L. Brocato Jr.:
Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. 129-148 - Metodi Hadji-Janev:
Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. 149-160 - Nancy Houston:
Cultural Aspects of Information Sharing and Collaboration. 161-172 - Raoul Chiesa:
Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). 173-182 - Stefano Mele:
The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. 183-199 - Stuart MacDonald:
Assessing and Responding to the Cyberterrorism Threat. 200-209
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.