


default search action
International Journal of Cyber Warfare and Terrorism, Volume 1
Volume 1, Number 1, 2011
- Ted G. Lewis, Thomas J. Mackin, Rudy Darken:

Critical Infrastructure as Complex Emergent Systems. 1-12 - David Barnard-Wills:

"This is not a cyber war, it's a...?": Wikileaks, Anonymous and the Politics of Hegemony. 13-23 - Christian Czosseck, Rain Ottis, Anna-Maria Talihärm:

Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security. 24-34 - Matthew J. Warren, Shona Leitch:

Protection of Australia in the Cyber Age. 35-40 - Fudong Li, Nathan L. Clarke

, Maria Papadaki, Paul Dowland
:
Misuse Detection for Mobile Devices Using Behaviour Profiling. 41-53
Volume 1, Number 2, 2011
- Martti Lehto, Aki-Mauri Huhtinen, Saara Jantunen:

The Open Definition of Cyber: Technology or a Social Construction? 1-9 - Rossouw von Solms, Matthew J. Warren:

Towards the Human Information Security Firewall. 10-17 - Tridib Bandyopadhyay:

Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach. 18-34 - Neil C. Rowe, Simson L. Garfinkel, Robert Beverly, Panayotis A. Yannakogeorgos:

Challenges in Monitoring Cyberarms Compliance. 35-48
Volume 1, Number 3, 2011
- Christopher Beggs, Ryan McGowan:

Fostering SCADA and IT Relationships: An Industry Perspective. 1-11 - Bryan Pickett, Mike Lingenfelter:

Influence Strategy: Consistency and Legitimacy as Key Factors. 12-36 - Graeme Pye:

Critical Infrastructure Systems: Security Analysis and Modelling Approach. 37-58 - Mandeep Singh Bhatia:

World War III: The Cyber War. 59-69 - Christopher Paul, Isaac R. Porche:

Toward a U.S. Army Cyber Security Culture. 70-80
Volume 1, Number 4, 2011
- Thomas Woolford, Jonathan Matusitz:

The Memetic Engineering of Anonymous, the Cyberterrorist Group. 1-9 - Mhamed Zineddine:

Cyber War Retaliation Decision: A Fuzzy Multi Criteria Decision Making Approach. 10-31 - Topi Tuukkanen:

Adapting the Current National Defence Doctrine to Cyber Domain. 32-52 - Maximiliano E. Korstanje

:
Violencia de Estado, guerra, resistencia. Por una nueva política de la Izquierda. 53-55

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














