Search dblp for Publications

export results for "toc:db/journals/ijcwt/ijcwt3.bht:"

 download as .bib file

@article{DBLP:journals/ijcwt/AxelrodH13,
  author       = {C. Warren Axelrod and
                  Sukumar Haldar},
  title        = {Security Risks to {IT} Supply Chains under Economic Stress},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {4},
  pages        = {58--73},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013100107},
  doi          = {10.4018/IJCWT.2013100107},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/AxelrodH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/DasguptaF13,
  author       = {Dipankar Dasgupta and
                  Denise Ferebee},
  title        = {Consequences of Diminishing Trust in Cyberspace},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {3},
  pages        = {19--31},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013070102},
  doi          = {10.4018/IJCWT.2013070102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/DasguptaF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Edgar-Nevill13,
  author       = {Denis Edgar{-}Nevill},
  title        = {The {EU} {ECENTRE} Project: Education as a Defensive Weapon in the
                  War Against Cybercrime},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {4},
  pages        = {10--21},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013100102},
  doi          = {10.4018/IJCWT.2013100102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Edgar-Nevill13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Grant13,
  author       = {Tim J. Grant},
  title        = {Tools and Technologies for Professional Offensive Cyber Operations},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {3},
  pages        = {49--71},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013070104},
  doi          = {10.4018/IJCWT.2013070104},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Grant13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/HewittMT13,
  author       = {Anne M. Hewitt and
                  Danielle Mirliss and
                  Riad Twal},
  title        = {Incident and Disaster Management Training: An Update on Using Virtual
                  World Scenarios for Emergency Management Training},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {2},
  pages        = {1--21},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013040101},
  doi          = {10.4018/IJCWT.2013040101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/HewittMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/IlvonenV13,
  author       = {Ilona Ilvonen and
                  Pasi Virtanen},
  title        = {Preparing for Cyber Threats with Information Security Policies},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {4},
  pages        = {22--31},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013100103},
  doi          = {10.4018/IJCWT.2013100103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/IlvonenV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Inna13,
  author       = {Vasilyeva Inna},
  title        = {The Value of Interaction for Russia, the {USA} and China Facing the
                  Information Warfare},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {4},
  pages        = {1--9},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013100101},
  doi          = {10.4018/IJCWT.2013100101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Inna13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/KomaromiUE13,
  author       = {Kurt Komaromi and
                  Fahri Unsal and
                  G. Scott Erickson},
  title        = {Online Interaction with Millenials: Institution vs. Community},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {1},
  pages        = {46--62},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013010104},
  doi          = {10.4018/IJCWT.2013010104},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/KomaromiUE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/KulmalaK13,
  author       = {Riikka Kulmala and
                  Juha Kettunen},
  title        = {Intellectual Property Protection in Small Knowledge Intensive Enterprises},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {1},
  pages        = {29--45},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013010103},
  doi          = {10.4018/IJCWT.2013010103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/KulmalaK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/KuusistoK13,
  author       = {Tuija Kuusisto and
                  Rauno Kuusisto},
  title        = {Strategic Communication for Supporting Cyber-Security},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {3},
  pages        = {72--79},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013070105},
  doi          = {10.4018/IJCWT.2013070105},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/KuusistoK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Lehto13,
  author       = {Martti Lehto},
  title        = {The Cyberspace Threats and Cyber Security Objectives in the Cyber
                  Security Strategies},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {3},
  pages        = {1--18},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013070101},
  doi          = {10.4018/IJCWT.2013070101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Lehto13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/MartinsSRV13,
  author       = {Jos{\'{e}} Martins and
                  Henrique dos Santos and
                  Ant{\'{o}}nio Rosinha and
                  Agostinho Valente},
  title        = {Information Security Management: {A} Case Study in a Portuguese Military
                  Organization},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {3},
  pages        = {32--48},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013070103},
  doi          = {10.4018/IJCWT.2013070103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/MartinsSRV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/McCarthyM13,
  author       = {John McCarthy and
                  William Mahoney},
  title        = {{SCADA} Threats in the Modern Airport},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {4},
  pages        = {32--39},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013100104},
  doi          = {10.4018/IJCWT.2013100104},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/McCarthyM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Medlin13,
  author       = {B. Dawn Medlin},
  title        = {Social Engineering Techniques and Password Security: Two Issues Relevant
                  in the Case of Health Care Workers},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {2},
  pages        = {58--70},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013040104},
  doi          = {10.4018/IJCWT.2013040104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Medlin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/MulkeyKK13,
  author       = {Clifton J. Mulkey and
                  Dulal C. Kar and
                  Ajay K. Katangur},
  title        = {An Efficient Protocol for Privacy and Authentication for Resource-Constrained
                  Devices in Wireless Networks},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {2},
  pages        = {38--57},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013040103},
  doi          = {10.4018/IJCWT.2013040103},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/MulkeyKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/OhashiH13,
  author       = {Masakazu Ohashi and
                  Mayumi Hori},
  title        = {On the Study of Certified Originality for Digital Alteration Problem:
                  Technology Developments of the Time Authentication},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {1},
  pages        = {15--28},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013010102},
  doi          = {10.4018/IJCWT.2013010102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/OhashiH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Radziwill13,
  author       = {Yaroslav Radziwill},
  title        = {What Lawyers Want: Legally Significant Questions that Only {IT} Specialists
                  can Answer},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {4},
  pages        = {52--57},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013100106},
  doi          = {10.4018/IJCWT.2013100106},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Radziwill13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Rejas-MusleraDAB13,
  author       = {Ricardo J. Rejas{-}Muslera and
                  Elena Davara and
                  Alain Abran and
                  Luigi Buglione},
  title        = {Intellectual Property Systems in Software},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {1},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013010101},
  doi          = {10.4018/IJCWT.2013010101},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Rejas-MusleraDAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/RenaudG13,
  author       = {Karen Renaud and
                  Wendy Goucher},
  title        = {Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {4},
  pages        = {40--51},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013100105},
  doi          = {10.4018/IJCWT.2013100105},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/RenaudG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Tabansky13,
  author       = {Lior Tabansky},
  title        = {Critical Infrastructure Protection: Evolution of Israeli Policy},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {3},
  pages        = {80--87},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013070106},
  doi          = {10.4018/IJCWT.2013070106},
  timestamp    = {Sun, 19 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Tabansky13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/VeerasamyL13,
  author       = {Namosha Veerasamy and
                  Aubrey Labuschagne},
  title        = {Ascertaining Trust Indicators in Social Networking Sites},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {3},
  number       = {2},
  pages        = {22--37},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcwt.2013040102},
  doi          = {10.4018/IJCWT.2013040102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/VeerasamyL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics