


default search action
International Journal of Cyber Warfare and Terrorism, Volume 6
Volume 6, Number 1, 2016
- Ali Al Mazari, Ahmed H. Anjariny, Shakeel A. Habib, Emmanuel Nyakwende:

Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies. 1-12 - Roland Heickerö:

Cyber Espionage and Illegitimate Information Retrieval. 13-23 - Margarita Levin Jaitner, Áine MacDermott

:
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views. 24-40 - Timo Kiravuo, Seppo Tiilikainen, Mikko Särelä, Jukka Manner

:
A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward. 41-52
Volume 6, Number 2, 2016
- Tuija Kuusisto, Rauno Kuusisto, Wolfgang Roehrig:

Situation Understanding for Operational Art in Cyber Operations. 1-14 - Martti Lehto:

Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences. 15-31 - Andrew N. Liaropoulos:

Reconceptualising Cyber Security: Safeguarding Human Rights in the Era of Cyber Surveillance. 32-40 - Harry Brown III

:
SPCTA: An Analytical Framework for Analyzing Cyber Threats by Non-State Actors. 41-60
Volume 6, Number 3, 2016
- Barend Pretorius, Brett van Niekerk

:
Cyber-Security for ICS/SCADA: A South African Perspective. 1-16 - Ignatius Swart, Barry Irwin

, Marthie Grobler
:
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion. 17-30 - Jim Q. Chen:

Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework. 31-42 - Lanier A. Watkins, John S. Hurley:

The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity. 43-52 - Louise Leenen, Thomas Meyer

:
Semantic Technologies and Big Data Analytics for Cyber Defence. 53-64 - Renier van Heerden, Peter Chan, Louise Leenen, Jacques Theron:

Using an Ontology for Network Attack Planning. 65-78 - Suhaila Ismail, Elena Sitnikova, Jill Slay:

SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors. 79-95
Volume 6, Number 4, 2016
- Lindsay A. West, Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, Gavin Macgregor-Skinner:

Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting: Constitutionality and Societal Implications. 1-12 - Yeslam Al-Saggaf

:
Understanding Online Radicalisation Using Data Science. 13-27 - Israel Fianyi, Tanveer A. Zia

:
Biometric Technology Solutions to Countering Today's Terrorism. 28-40 - Taiseera Al-Balushi, Saqib Ali

, Osama Rehman:
Economics of Cyber Security and the Way Forward. 41-57

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














