


default search action
International Journal of Cyber Warfare and Terrorism, Volume 10
Volume 10, Number 1, 2020
- Maximiliano E. Korstanje

:
Terrorism in the Website: Society 4.0 and Fundamentalism in Scrutiny. 1-14 - Mariah Talia Solis, Jessica Pearson, Deirdre P. Dixon

, Abigail Blanco, Raymond Papp:
Terrorism Effects on Businesses Post 9/11. 15-33 - Miika Sartonen, Aki-Mauri Huhtinen, Petteri Simola, Kari T. Takamaa, Veli-Pekka Kivimäki

:
A Framework for the Weapons of Influence. 34-49
Volume 10, Number 2, 2020
- Naghmeh Moradpoor Sheykhkanloo, Adam J. Hall:

Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset. 1-26 - Yuriy V. Kostyuchenko

, Viktor Pushkar
, Olga Malysheva, Maxim Yuschenko:
On the Behavior-Based Risk Communication Models in Crisis Management and Social Risks Minimization. 27-45 - Winfred Yaokumah

:
Predicting and Explaining Cyber Ethics with Ethical Theories. 46-63 - James Howden, Leandros Maglaras

, Mohamed Amine Ferrag
:
The Security Aspects of Automotive Over-the-Air Updates. 64-81 - Yadigar N. Imamverdiyev

, Fargana J. Abdullayeva
:
Deep Learning in Cybersecurity: Challenges and Approaches. 82-105
Volume 10, Number 3, 2020
- William Hutchinson:

Deceiving Autonomous Drones. 1-14 - Matthew J. Warren

:
Political Cyber Operations: A South Pacific Case Study. 15-27 - Helaine Leggat:

Cyber Warfare: An Enquiry Into the Applicability of National Law to Cyberspace. 28-46 - Mansoor Al-Gharibi, Matthew J. Warren

, William Yeoh
:
Risks of Critical Infrastructure Adoption of Cloud Computing by Government. 47-58 - Ruwan Nagahawatta

, Matthew J. Warren
, William Yeoh
:
A Study of Cyber Security Issues in Sri Lanka. 59-72
Volume 10, Number 4, 2020
- Keshnee Padayachee

:
Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour. 1-19 - Doris Ngozi Morah

, Omojola Oladokun
:
Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic Relations in Nigeria. 20-35 - Trishana Ramluckan:

A South African Legal Perspective on the Regulation of Net Neutrality and Its Implications for Cyber-Security and Cyber-Warfare. 36-47 - Jawad Hussain Awan

, Shahzad Memon
, Azhar Ali Shah, Kamran Taj Pathan:
Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges, Vulnerabilities, and Solutions. 48-63

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














