![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Cyber Warfare and Terrorism, Volume 10
Volume 10, Number 1, 2020
- Maximiliano E. Korstanje
:
Terrorism in the Website: Society 4.0 and Fundamentalism in Scrutiny. 1-14 - Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon
, Abigail Blanco, Raymond Papp:
Terrorism Effects on Businesses Post 9/11. 15-33 - Miika Sartonen, Aki-Mauri Huhtinen, Petteri Simola, Kari T. Takamaa, Veli-Pekka Kivimäki
:
A Framework for the Weapons of Influence. 34-49
Volume 10, Number 2, 2020
- Naghmeh Moradpoor Sheykhkanloo, Adam J. Hall:
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. 1-26 - Yuriy V. Kostyuchenko
, Viktor Pushkar
, Olga Malysheva, Maxim Yuschenko:
On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization. 27-45 - Winfred Yaokumah
:
Predicting and Explaining Cyber Ethics with Ethical Theories. 46-63 - James Howden, Leandros A. Maglaras
, Mohamed Amine Ferrag
:
The Security Aspects of Automotive Over-the-Air Updates. 64-81 - Yadigar N. Imamverdiyev
, Fargana J. Abdullayeva
:
Deep Learning in Cybersecurity: Challenges and Approaches. 82-105
Volume 10, Number 3, 2020
- William Hutchinson:
Deceiving Autonomous Drones. 1-14 - Matthew J. Warren
:
Political Cyber Operations: A South Pacific Case Study. 15-27 - Helaine Leggat:
Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace. 28-46 - Mansoor Al-Gharibi, Matthew J. Warren
, William Yeoh
:
Risks of Critical Infrastructure Adoption of Cloud Computing by Government. 47-58 - Ruwan Nagahawatta
, Matthew J. Warren
, William Yeoh
:
A Study of Cyber Security Issues in Sri Lanka. 59-72
Volume 10, Number 4, 2020
- Keshnee Padayachee
:
Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour. 1-19 - Doris Ngozi Morah
, Omojola Oladokun
:
Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria. 20-35 - Trishana Ramluckan:
A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare. 36-47 - Jawad Hussain Awan
, Shahzad Memon
, Azhar Ali Shah, Kamran Taj Pathan:
Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities, and Solutions. 48-63
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.