default search action
International Journal of Cyber Warfare and Terrorism, Volume 7
Volume 7, Number 1, 2017
- Yuriy V. Kostyuchenko, Maxim Yuschenko:
Toward Approaches to Big Data Analysis for Terroristic Behavior Identification: Child Soldiers in Illegal Armed Groups During the Conflict in the Donbas Region (East Ukraine). 1-12 - Fakhri Issaoui, Toumi Hassen, Touili Wassim:
The Effects of Money Laundering (ML) on Growth Application to the Gulf Countries. 13-24 - Michael Bennett Hotchkiss:
Russian Active Measures and September 11, 2001: Nostradamus Themed Disinformation? 25-41 - Chris Mensah-Ankrah:
Eriksonian Analysis of Terrorism in West Africa. 42-59
Volume 7, Number 2, 2017
- Allan Cook, Richard Smith, Leandros A. Maglaras, Helge Janicke:
SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System. 1-15 - Naghmeh Moradpoor Sheykhkanloo:
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. 16-41 - Mandeep Singh, Navjyot Kaur, Amandeep Kaur, Gaurav Pushkarna:
A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks. 42-53 - Kenneth J. Boyte:
A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine: Exemplifying the Evolution of Internet-Supported Warfare. 54-69
Volume 7, Number 3, 2017
- John S. Hurley:
Cyberspace: The New Battlefield - An Approach via the Analytics Hierarchy Process. 1-15 - Joey Jansen van Vuuren, Louise Leenen, Graeme Plint, Jannie Zaaiman, Jackie Phahlamohlaka:
Formulating the Building Blocks for National Cyberpower. 16-28 - Eric Filiol, Cécilia Gallais:
Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach. 29-43 - Konstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj:
Advanced Network Data Analytics for Large-Scale DDoS Attack Detection. 44-54
Volume 7, Number 4, 2017
- David G. A. Ormrod, Benjamin P. Turnbull:
Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success. 1-13 - Jim Q. Chen:
A New Dynamic Cyber Defense Framework. 14-22 - John S. Hurley:
Quantifying Decision Making in the Critical Infrastructure via the Analytic Hierarchy Process (AHP). 23-34 - Ivan D. Burke, Renier P. van Heerden:
The World is Polluted With Leaked Cyber Data. 35-51
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.