default search action
Search dblp for Publications
export results for "toc:db/journals/ijcwt/ijcwt10.bht:"
@article{DBLP:journals/ijcwt/Al-GharibiWY20, author = {Mansoor Al{-}Gharibi and Matthew J. Warren and William Yeoh}, title = {Risks of Critical Infrastructure Adoption of Cloud Computing by Government}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {3}, pages = {47--58}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020070104}, doi = {10.4018/IJCWT.2020070104}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Al-GharibiWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/AwanMSP20, author = {Jawad Hussain Awan and Shahzad Memon and Azhar Ali Shah and Kamran Taj Pathan}, title = {Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities, and Solutions}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {4}, pages = {48--63}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020100104}, doi = {10.4018/IJCWT.2020100104}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/AwanMSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/HowdenMF20, author = {James Howden and Leandros Maglaras and Mohamed Amine Ferrag}, title = {The Security Aspects of Automotive Over-the-Air Updates}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {2}, pages = {64--81}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020040104}, doi = {10.4018/IJCWT.2020040104}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/HowdenMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Hutchinson20, author = {William Hutchinson}, title = {Deceiving Autonomous Drones}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {3}, pages = {1--14}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020070101}, doi = {10.4018/IJCWT.2020070101}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Hutchinson20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/ImamverdiyevA20, author = {Yadigar N. Imamverdiyev and Fargana J. Abdullayeva}, title = {Deep Learning in Cybersecurity: Challenges and Approaches}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {2}, pages = {82--105}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020040105}, doi = {10.4018/IJCWT.2020040105}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/ImamverdiyevA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Korstanje20, author = {Maximiliano E. Korstanje}, title = {Terrorism in the Website: Society 4.0 and Fundamentalism in Scrutiny}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {1}, pages = {1--14}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020010101}, doi = {10.4018/IJCWT.2020010101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Korstanje20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/KostyuchenkoPMY20, author = {Yuriy V. Kostyuchenko and Viktor Pushkar and Olga Malysheva and Maxim Yuschenko}, title = {On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {2}, pages = {27--45}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020040102}, doi = {10.4018/IJCWT.2020040102}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/KostyuchenkoPMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Leggat20, author = {Helaine Leggat}, title = {Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {3}, pages = {28--46}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020070103}, doi = {10.4018/IJCWT.2020070103}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Leggat20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/MorahO20, author = {Doris Ngozi Morah and Omojola Oladokun}, title = {Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {4}, pages = {20--35}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020100102}, doi = {10.4018/IJCWT.2020100102}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/MorahO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/NagahawattaWY20, author = {Ruwan Nagahawatta and Matthew J. Warren and William Yeoh}, title = {A Study of Cyber Security Issues in Sri Lanka}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {3}, pages = {59--72}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020070105}, doi = {10.4018/IJCWT.2020070105}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/NagahawattaWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Padayachee20, author = {Keshnee Padayachee}, title = {Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {4}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020100101}, doi = {10.4018/IJCWT.2020100101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Padayachee20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Ramluckan20, author = {Trishana Ramluckan}, title = {A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {4}, pages = {36--47}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020100103}, doi = {10.4018/IJCWT.2020100103}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Ramluckan20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/SartonenHSTK20, author = {Miika Sartonen and Aki{-}Mauri Huhtinen and Petteri Simola and Kari T. Takamaa and Veli{-}Pekka Kivim{\"{a}}ki}, title = {A Framework for the Weapons of Influence}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {1}, pages = {34--49}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020010103}, doi = {10.4018/IJCWT.2020010103}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/SartonenHSTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/SheykhkanlooH20, author = {Naghmeh Moradpoor Sheykhkanloo and Adam J. Hall}, title = {Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {2}, pages = {1--26}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020040101}, doi = {10.4018/IJCWT.2020040101}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/SheykhkanlooH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/SolisPDBP20, author = {Mariah Talia Solis and Jessica Pearson and Deirdre P. Dixon and Abigail Blanco and Raymond Papp}, title = {Terrorism Effects on Businesses Post 9/11}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {1}, pages = {15--33}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020010102}, doi = {10.4018/IJCWT.2020010102}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/SolisPDBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Warren20, author = {Matthew J. Warren}, title = {Political Cyber Operations: {A} South Pacific Case Study}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {3}, pages = {15--27}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020070102}, doi = {10.4018/IJCWT.2020070102}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Warren20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Yaokumah20, author = {Winfred Yaokumah}, title = {Predicting and Explaining Cyber Ethics with Ethical Theories}, journal = {Int. J. Cyber Warf. Terror.}, volume = {10}, number = {2}, pages = {46--63}, year = {2020}, url = {https://doi.org/10.4018/IJCWT.2020040103}, doi = {10.4018/IJCWT.2020040103}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Yaokumah20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.