Search dblp for Publications

export results for "toc:db/journals/ijcwt/ijcwt8.bht:"

 download as .bib file

@article{DBLP:journals/ijcwt/Abu-TaiehAAA18,
  author       = {Evon M. O. Abu{-}Taieh and
                  Auhood Abdullah Alfaries and
                  Shaha T. Al{-}Otaibi and
                  Ghadah Aldehim},
  title        = {Cyber Security Crime and Punishment: Comparative Study of the Laws
                  of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {3},
  pages        = {46--59},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018070104},
  doi          = {10.4018/IJCWT.2018070104},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Abu-TaiehAAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Al-RawiG18,
  author       = {Ahmed Al{-}Rawi and
                  Jacob Groshek},
  title        = {Jihadist Propaganda on Social Media: An Examination of {ISIS} Related
                  Content on Twitter},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {4},
  pages        = {1--15},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018100101},
  doi          = {10.4018/IJCWT.2018100101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Al-RawiG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/AlguliyevAN18,
  author       = {Rasim M. Alguliyev and
                  Ramiz M. Aliguliyev and
                  Gunay Y. Niftaliyeva},
  title        = {Filtration of Terrorism-Related Texts in the E-Government Environment},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {4},
  pages        = {35--48},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018100103},
  doi          = {10.4018/IJCWT.2018100103},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/AlguliyevAN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/DasM18,
  author       = {Ramesh Chandra Das and
                  Sovik Mukherjee},
  title        = {Determinants of Terrorism in South Asia: Insights From a Dynamic Panel
                  Data Analysis},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {4},
  pages        = {16--34},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018100102},
  doi          = {10.4018/IJCWT.2018100102},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/DasM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Gyamfi18,
  author       = {Gerald Dapaah Gyamfi},
  title        = {Managing Terrorism in Africa: Assessing Policing Issues},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {3},
  pages        = {15--25},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018070102},
  doi          = {10.4018/IJCWT.2018070102},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Gyamfi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Islam18,
  author       = {Mohammad Saidul Islam},
  title        = {Jus in Bello and the Acts of Terrorism: {A} Study},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {3},
  pages        = {1--14},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018070101},
  doi          = {10.4018/IJCWT.2018070101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Islam18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/KostyuchenkoYA18,
  author       = {Yuriy V. Kostyuchenko and
                  Maxim Yuschenko and
                  Igor Artemenko},
  title        = {On Experience of Social Networks Exploration for Comparative Analysis
                  of Narratives of Foreign Members of Armed Groups: {IS} and {L/DPR}
                  in Syria and Ukraine in 2015-2016},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {2},
  pages        = {17--31},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018040102},
  doi          = {10.4018/IJCWT.2018040102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/KostyuchenkoYA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Mali18,
  author       = {Prashant Mali},
  title        = {Defining Cyber Weapon in Context of Technology and Law},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {1},
  pages        = {43--55},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018010104},
  doi          = {10.4018/IJCWT.2018010104},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Mali18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Martins18,
  author       = {Ralph Peter Martins},
  title        = {Punching Above Their Digital Weight: Why Iran is Developing Cyberwarfare
                  Capabilities Far Beyond Expectations},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {2},
  pages        = {32--46},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018040103},
  doi          = {10.4018/IJCWT.2018040103},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Martins18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/McElreathDMLLSW18,
  author       = {David H. McElreath and
                  Daniel Adrian Doss and
                  Leisa S. McElreath and
                  Ashley Lindsley and
                  Glenna Lusk and
                  Joseph Skinner and
                  Ashley Wellman},
  title        = {The Communicating and Marketing of Radicalism: {A} Case Study of {ISIS}
                  and Cyber Recruitment},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {3},
  pages        = {26--45},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018070103},
  doi          = {10.4018/IJCWT.2018070103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/McElreathDMLLSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Norri-Sederholm18,
  author       = {Teija Norri{-}Sederholm and
                  Aki{-}Mauri Huhtinen and
                  Heikki Paakkonen},
  title        = {Ensuring Public Safety Organisations' Information Flow and Situation
                  Picture in Hybrid Environments},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {1},
  pages        = {12--24},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018010102},
  doi          = {10.4018/IJCWT.2018010102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Norri-Sederholm18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/RamosFG18,
  author       = {Pedro Ramos and
                  Pierre Funderburk and
                  Jennifer Gebelein},
  title        = {Social Media and Online Gaming: {A} Masquerading Funding Source},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {1},
  pages        = {25--42},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018010103},
  doi          = {10.4018/IJCWT.2018010103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/RamosFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Tierney18,
  author       = {Michael Tierney},
  title        = {{\#}TerroristFinancing: An Examination of Terrorism Financing via
                  the Internet},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {1},
  pages        = {1--11},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018010101},
  doi          = {10.4018/IJCWT.2018010101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Tierney18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/VeerasamyL18,
  author       = {Namosha Veerasamy and
                  Aubrey Labuschagne},
  title        = {Framework for Military Applications of Social Media},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {2},
  pages        = {47--56},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018040104},
  doi          = {10.4018/IJCWT.2018040104},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/VeerasamyL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/WesthoffZ18,
  author       = {Dirk Westhoff and
                  Maximilian Zeiser},
  title        = {Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence
                  Credibility},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {8},
  number       = {2},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCWT.2018040101},
  doi          = {10.4018/IJCWT.2018040101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/WesthoffZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}