default search action
International Journal of Cyber Warfare and Terrorism, Volume 12
Volume 12, Number 1, 2022
- Yuriy V. Kostyuchenko, Viktor Pushkar:
On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of "L/DPR" During the Warfare in Donbass, East Ukraine, 2014-2021. 1-19 - Loo Seng Neo:
Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis. 1-15 - Lev Topor, Moran Pollack:
Fake Identities in Social Cyberspace: From Escapism to Terrorism. 1-17 - Skanda Vivek, Charles Harry:
Evaluating the Strategic Consequences of Cyber Targeting Strategies on Road Transport Networks: A Case Study of Washington DC. 1-14 - Sanjay Kumar Gautam, Himanshu Khajuria, Reeta Rani Gupta, Biswa Prakash Nayak:
Recent Trends in Child Sexual Abuse Material (CSAM) Distribution in Indian Cyberspace. 1-15 - Paul Coonley Boateng, Gerald Dapaah Gyamfi:
Assessing the Defence Cooperation Agreements Between the USA and African Countries: The Case of Ghana. 1-14 - Zubeida Casmod Dawood, Carien Van 't Wout:
An Ontology Towards Predicting Terrorism Events. 1-13 - Ziad Kh. Al-Enizi, Muawya Naser:
The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights. 1-10 - Maximiliano Emanuel Korstanje:
Differences and Commonalities Between Terrorism and COVID-19: Globalization in Ruins. 1-14 - Yuriy V. Kostyuchenko, Viktor Pushkar, Olga Malysheva, Maxim Yuschenko:
The Impact of the COVID-19 Pandemic on the Radical Behavior and Armed Conflict Escalation Risks: Case of Donbas (East Ukraine) Warfare. 1-21 - Fargana J. Abdullayeva:
Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection. 1-15 - Ehsan Arzroomchilar:
Techno-Radicalism: An Account of Radicalism in the Technology Era. 1-14 - Glorin Sebastian:
Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan. 1-15 - Ben Stewart S., Dhanush N., Santhosh G., Angelin Gladston:
Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention. 1-24 - Donald Douglas Atsa'am, Ruth Wario:
A Lone Wolf vs. an Affiliated Terrorist: Knowledge Inference on Who Poses More Danger to the Tourist. 1-9 - Parwaiz Ahmad Najar, Hafizullah Dar, Priya Singh, Ashaq Hussain Najar:
Anti-Social Factors Influence the Decision Making of Tourists: A Study of Kashmir. 1-14 - Romil Rawat, Sonali Gupta, S. Sivaranjani, Chandra Umakantham Om Kumar, Megha Kuliha, K. Sakthidasan Sankaran:
Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks. 1-14 - Alfred Paa Gyaisey, Acheampong Owusu:
Multi-Contextual Analysis of Internet Security Perception and Behavior: Perspectives of Anglophone and Francophone Internet Users. 1-20 - Olalonpe Oluwakemi Ajise, Babatunde Joshua Omotosho:
Boko Haram Insurgency and Violence Against Women and Girls in Nigeria. 1-13 - Nicola Fabiano:
Artificial Intelligence and Facial Recognition in an IoT Ecosystem: The Impact on Data Protection and Privacy and the Relevance of Ethics. 1-11
Volume 12, Number 2, 2022
- Sergiy Dotsenko, Oleg Illiashenko, Vyacheslav Kharchenko, Olga Morozova:
Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity. 1-21 - Pietro Rossetti, Fabio Garzia, Nicola Silverio Genco, Antonio Sacchetti:
IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment. 1-20 - Umberto Battista, Pietro De Vito, Davide Ottonello, Deborah Hugon:
Agent-Based Simulation of Heterogeneous Crowd Flows in Critical Infrastructures During Emergencies. 1-18
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.