default search action
International Journal of Cyber Warfare and Terrorism, Volume 10
Volume 10, Number 1, 2020
- Maximiliano E. Korstanje:
Terrorism in the Website: Society 4.0 and Fundamentalism in Scrutiny. 1-14 - Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon, Abigail Blanco, Raymond Papp:
Terrorism Effects on Businesses Post 9/11. 15-33 - Miika Sartonen, Aki-Mauri Huhtinen, Petteri Simola, Kari T. Takamaa, Veli-Pekka Kivimäki:
A Framework for the Weapons of Influence. 34-49
Volume 10, Number 2, 2020
- Naghmeh Moradpoor Sheykhkanloo, Adam J. Hall:
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. 1-26 - Yuriy V. Kostyuchenko, Viktor Pushkar, Olga Malysheva, Maxim Yuschenko:
On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization. 27-45 - Winfred Yaokumah:
Predicting and Explaining Cyber Ethics with Ethical Theories. 46-63 - James Howden, Leandros Maglaras, Mohamed Amine Ferrag:
The Security Aspects of Automotive Over-the-Air Updates. 64-81 - Yadigar N. Imamverdiyev, Fargana J. Abdullayeva:
Deep Learning in Cybersecurity: Challenges and Approaches. 82-105
Volume 10, Number 3, 2020
- William Hutchinson:
Deceiving Autonomous Drones. 1-14 - Matthew J. Warren:
Political Cyber Operations: A South Pacific Case Study. 15-27 - Helaine Leggat:
Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace. 28-46 - Mansoor Al-Gharibi, Matthew J. Warren, William Yeoh:
Risks of Critical Infrastructure Adoption of Cloud Computing by Government. 47-58 - Ruwan Nagahawatta, Matthew J. Warren, William Yeoh:
A Study of Cyber Security Issues in Sri Lanka. 59-72
Volume 10, Number 4, 2020
- Keshnee Padayachee:
Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour. 1-19 - Doris Ngozi Morah, Omojola Oladokun:
Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria. 20-35 - Trishana Ramluckan:
A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare. 36-47 - Jawad Hussain Awan, Shahzad Memon, Azhar Ali Shah, Kamran Taj Pathan:
Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities, and Solutions. 48-63
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.