Search dblp for Publications

export results for "toc:db/journals/ijcwt/ijcwt11.bht:"

 download as .bib file

@article{DBLP:journals/ijcwt/AghaRR21,
  author       = {Sahareesh Agha and
                  Osama Rehman and
                  Ibrahim M. H. Rahman},
  title        = {Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {4},
  pages        = {21--42},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021100102},
  doi          = {10.4018/IJCWT.2021100102},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/AghaRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Al-SaggafW21,
  author       = {Yeslam Al{-}Saggaf and
                  Patrick F. Walsh},
  title        = {Islamists vs. Far Right Extremists: Insights Derived From Data Mining},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {4},
  pages        = {74--92},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021100105},
  doi          = {10.4018/IJCWT.2021100105},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Al-SaggafW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/AlshdaifatS21,
  author       = {Shadi A. Alshdaifat and
                  Sanford R. Silverburg},
  title        = {Can Terrorism Mold Itself to Outer Space?: An International Legal
                  Perspective},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {2},
  pages        = {56--75},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021040105},
  doi          = {10.4018/IJCWT.2021040105},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/AlshdaifatS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/AtsaamW21,
  author       = {Donald Douglas Atsa'am and
                  Ruth Wario},
  title        = {Knowledge Extraction on the Nexus Between Terrorism Criteria and Attacks
                  on Private Citizens and Property},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {1},
  pages        = {20--30},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021010102},
  doi          = {10.4018/IJCWT.2021010102},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/AtsaamW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/CananPA21,
  author       = {Mustafa Canan and
                  Omer Ilker Poyraz and
                  Anthony Akil},
  title        = {A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {3},
  pages        = {58--81},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021070105},
  doi          = {10.4018/IJCWT.2021070105},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/CananPA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/EasttomB21,
  author       = {Chuck Easttom and
                  William Butler},
  title        = {The Iran-Saudi Cyber Conflict},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {2},
  pages        = {29--42},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021040103},
  doi          = {10.4018/IJCWT.2021040103},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/EasttomB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Fisogni21,
  author       = {Primavera Fisogni},
  title        = {Global Terrorism as a Virus: Pathogenesis of Evildoing},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {4},
  pages        = {58--73},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021100104},
  doi          = {10.4018/IJCWT.2021100104},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Fisogni21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Gokce21,
  author       = {Yasir Gokce},
  title        = {Commissioning Development to Externals: Addressing Infosec Risks Upfront},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {3},
  pages        = {30--40},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021070103},
  doi          = {10.4018/IJCWT.2021070103},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Gokce21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/JoshuaIO21,
  author       = {Segun Joshua and
                  Samuel Sunday Idowu and
                  Faith Osasumwen Olanrewaju},
  title        = {Between the Devil and the Deep Blue Sea: Insurgency and Humanitarian
                  Conditions in {IDP} Camps in Nigeria},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {1},
  pages        = {1--19},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021010101},
  doi          = {10.4018/IJCWT.2021010101},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/JoshuaIO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/KatinaK21,
  author       = {Polinpapilinho F. Katina and
                  Omer F. Keskin},
  title        = {Complex System Governance as a Foundation for Enhancing the Cybersecurity
                  of Cyber-Physical Systems},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {3},
  pages        = {1--14},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021070101},
  doi          = {10.4018/IJCWT.2021070101},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/KatinaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Kleemann21,
  author       = {Steven Kleemann},
  title        = {Cyber Warfare and the "Humanization" of International Humanitarian
                  Law},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {2},
  pages        = {1--11},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021040101},
  doi          = {10.4018/IJCWT.2021040101},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Kleemann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Korstanje21,
  author       = {Maximiliano Emanuel Korstanje},
  title        = {Tracing the Cultural Background of Lone-Wolf Terrorism: Dilemmas,
                  Contradictions, and Opportunities for the Next Decade},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {1},
  pages        = {45--56},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021010104},
  doi          = {10.4018/IJCWT.2021010104},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Korstanje21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Neo21,
  author       = {Loo Seng Neo},
  title        = {Detecting Markers of Radicalisation in Social Media Posts: Insights
                  From Modified Delphi Technique and Literature Review},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {2},
  pages        = {12--28},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021040102},
  doi          = {10.4018/IJCWT.2021040102},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Neo21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/OlomojobiO21,
  author       = {Yinka Olomojobi and
                  Odusanya Temitope Omotola},
  title        = {Social Media: {A} Protagonist for Terrorism},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {1},
  pages        = {31--44},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021010103},
  doi          = {10.4018/IJCWT.2021010103},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/OlomojobiO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/PalmerPK21,
  author       = {Xavier{-}Lewis Palmer and
                  Lucas Potter and
                  Saltuk Karahan},
  title        = {{COVID-19} and Biocybersecurity's Increasing Role on Defending Forward},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {3},
  pages        = {15--29},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021070102},
  doi          = {10.4018/IJCWT.2021070102},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/PalmerPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/PintoZEAJKD21,
  author       = {C. Ariel Pinto and
                  Matthew Zurasky and
                  Fatine Elakramine and
                  Safae El Amrani and
                  Raed M. Jaradat and
                  Chad S. Kerr and
                  Vidanelage L. Dayarathna},
  title        = {Enhancing Cyberweapon Effectiveness Methodology With {SE} Modeling
                  Techniques: Both for Offense and Defense},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {3},
  pages        = {41--57},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021070104},
  doi          = {10.4018/IJCWT.2021070104},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/PintoZEAJKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/SederholmJH21,
  author       = {Teija Sederholm and
                  Petri J{\"{a}}{\"{a}}skel{\"{a}}inen and
                  Aki{-}Mauri Huhtinen},
  title        = {Coronavirus as a Rhizome: The Pandemic of Disinformation},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {2},
  pages        = {43--55},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021040104},
  doi          = {10.4018/IJCWT.2021040104},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/SederholmJH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Singh21,
  author       = {Jitendra Singh},
  title        = {Mitigating Cyber-Attacks in Cloud Environments: Hardware-Supported
                  Multi-Point Conceptual Framework},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {4},
  pages        = {43--57},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021100103},
  doi          = {10.4018/IJCWT.2021100103},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Singh21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Smuclerova21,
  author       = {Martina Smuclerova},
  title        = {International Law and Cyberoperations: French View},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {11},
  number       = {4},
  pages        = {1--20},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJCWT.2021100101},
  doi          = {10.4018/IJCWT.2021100101},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Smuclerova21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics