Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcwt/ijcwt11.bht:"
@article{DBLP:journals/ijcwt/AghaRR21, author = {Sahareesh Agha and Osama Rehman and Ibrahim M. H. Rahman}, title = {Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {4}, pages = {21--42}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021100102}, doi = {10.4018/IJCWT.2021100102}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/AghaRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Al-SaggafW21, author = {Yeslam Al{-}Saggaf and Patrick F. Walsh}, title = {Islamists vs. Far Right Extremists: Insights Derived From Data Mining}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {4}, pages = {74--92}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021100105}, doi = {10.4018/IJCWT.2021100105}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Al-SaggafW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/AlshdaifatS21, author = {Shadi A. Alshdaifat and Sanford R. Silverburg}, title = {Can Terrorism Mold Itself to Outer Space?: An International Legal Perspective}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {2}, pages = {56--75}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021040105}, doi = {10.4018/IJCWT.2021040105}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/AlshdaifatS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/AtsaamW21, author = {Donald Douglas Atsa'am and Ruth Wario}, title = {Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks on Private Citizens and Property}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {1}, pages = {20--30}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021010102}, doi = {10.4018/IJCWT.2021010102}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/AtsaamW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/CananPA21, author = {Mustafa Canan and Omer Ilker Poyraz and Anthony Akil}, title = {A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {3}, pages = {58--81}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021070105}, doi = {10.4018/IJCWT.2021070105}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/CananPA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/EasttomB21, author = {Chuck Easttom and William Butler}, title = {The Iran-Saudi Cyber Conflict}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {2}, pages = {29--42}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021040103}, doi = {10.4018/IJCWT.2021040103}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/EasttomB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Fisogni21, author = {Primavera Fisogni}, title = {Global Terrorism as a Virus: Pathogenesis of Evildoing}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {4}, pages = {58--73}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021100104}, doi = {10.4018/IJCWT.2021100104}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Fisogni21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Gokce21, author = {Yasir Gokce}, title = {Commissioning Development to Externals: Addressing Infosec Risks Upfront}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {3}, pages = {30--40}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021070103}, doi = {10.4018/IJCWT.2021070103}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Gokce21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/JoshuaIO21, author = {Segun Joshua and Samuel Sunday Idowu and Faith Osasumwen Olanrewaju}, title = {Between the Devil and the Deep Blue Sea: Insurgency and Humanitarian Conditions in {IDP} Camps in Nigeria}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {1}, pages = {1--19}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021010101}, doi = {10.4018/IJCWT.2021010101}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/JoshuaIO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/KatinaK21, author = {Polinpapilinho F. Katina and Omer F. Keskin}, title = {Complex System Governance as a Foundation for Enhancing the Cybersecurity of Cyber-Physical Systems}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {3}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021070101}, doi = {10.4018/IJCWT.2021070101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/KatinaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Kleemann21, author = {Steven Kleemann}, title = {Cyber Warfare and the "Humanization" of International Humanitarian Law}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {2}, pages = {1--11}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021040101}, doi = {10.4018/IJCWT.2021040101}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Kleemann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Korstanje21, author = {Maximiliano Emanuel Korstanje}, title = {Tracing the Cultural Background of Lone-Wolf Terrorism: Dilemmas, Contradictions, and Opportunities for the Next Decade}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {1}, pages = {45--56}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021010104}, doi = {10.4018/IJCWT.2021010104}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Korstanje21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Neo21, author = {Loo Seng Neo}, title = {Detecting Markers of Radicalisation in Social Media Posts: Insights From Modified Delphi Technique and Literature Review}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {2}, pages = {12--28}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021040102}, doi = {10.4018/IJCWT.2021040102}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Neo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/OlomojobiO21, author = {Yinka Olomojobi and Odusanya Temitope Omotola}, title = {Social Media: {A} Protagonist for Terrorism}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {1}, pages = {31--44}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021010103}, doi = {10.4018/IJCWT.2021010103}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/OlomojobiO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/PalmerPK21, author = {Xavier{-}Lewis Palmer and Lucas Potter and Saltuk Karahan}, title = {{COVID-19} and Biocybersecurity's Increasing Role on Defending Forward}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {3}, pages = {15--29}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021070102}, doi = {10.4018/IJCWT.2021070102}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/PalmerPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/PintoZEAJKD21, author = {C. Ariel Pinto and Matthew Zurasky and Fatine Elakramine and Safae El Amrani and Raed M. Jaradat and Chad S. Kerr and Vidanelage L. Dayarathna}, title = {Enhancing Cyberweapon Effectiveness Methodology With {SE} Modeling Techniques: Both for Offense and Defense}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {3}, pages = {41--57}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021070104}, doi = {10.4018/IJCWT.2021070104}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/PintoZEAJKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/SederholmJH21, author = {Teija Sederholm and Petri J{\"{a}}{\"{a}}skel{\"{a}}inen and Aki{-}Mauri Huhtinen}, title = {Coronavirus as a Rhizome: The Pandemic of Disinformation}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {2}, pages = {43--55}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021040104}, doi = {10.4018/IJCWT.2021040104}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/SederholmJH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Singh21, author = {Jitendra Singh}, title = {Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported Multi-Point Conceptual Framework}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {4}, pages = {43--57}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021100103}, doi = {10.4018/IJCWT.2021100103}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Singh21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Smuclerova21, author = {Martina Smuclerova}, title = {International Law and Cyberoperations: French View}, journal = {Int. J. Cyber Warf. Terror.}, volume = {11}, number = {4}, pages = {1--20}, year = {2021}, url = {https://doi.org/10.4018/IJCWT.2021100101}, doi = {10.4018/IJCWT.2021100101}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Smuclerova21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.