default search action
International Journal of Cyber Warfare and Terrorism, Volume 6
Volume 6, Number 1, 2016
- Ali Al Mazari, Ahmed H. Anjariny, Shakeel A. Habib, Emmanuel Nyakwende:
Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies. 1-12 - Roland Heickerö:
Cyber Espionage and Illegitimate Information Retrieval. 13-23 - Margarita Levin Jaitner, Áine MacDermott:
Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security: The West European and the Russian Views. 24-40 - Timo Kiravuo, Seppo Tiilikainen, Mikko Särelä, Jukka Manner:
A White Hat Study of a Nation's Publicly Accessible Critical Digital Infrastructure and a Way Forward. 41-52
Volume 6, Number 2, 2016
- Tuija Kuusisto, Rauno Kuusisto, Wolfgang Roehrig:
Situation Understanding for Operational Art in Cyber Operations. 1-14 - Martti Lehto:
Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences. 15-31 - Andrew N. Liaropoulos:
Reconceptualising Cyber Security: Safeguarding Human Rights in the Era of Cyber Surveillance. 32-40 - Harry Brown III:
SPCTA: An Analytical Framework for Analyzing Cyber Threats by Non-State Actors. 41-60
Volume 6, Number 3, 2016
- Barend Pretorius, Brett van Niekerk:
Cyber-Security for ICS/SCADA: A South African Perspective. 1-16 - Ignatius Swart, Barry Irwin, Marthie Grobler:
Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion. 17-30 - Jim Q. Chen:
Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework. 31-42 - Lanier A. Watkins, John S. Hurley:
The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity. 43-52 - Louise Leenen, Thomas Meyer:
Semantic Technologies and Big Data Analytics for Cyber Defence. 53-64 - Renier van Heerden, Peter Chan, Louise Leenen, Jacques Theron:
Using an Ontology for Network Attack Planning. 65-78 - Suhaila Ismail, Elena Sitnikova, Jill Slay:
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors. 79-95
Volume 6, Number 4, 2016
- Lindsay A. West, Richard V. Martin, Courtney Perkins, Jennifer M. Quatel, Gavin Macgregor-Skinner:
Opposing Viewpoints on Youth Social Media Banning in the U.S. for the Combatance of Extremist Recruiting: Constitutionality and Societal Implications. 1-12 - Yeslam Al-Saggaf:
Understanding Online Radicalisation Using Data Science. 13-27 - Israel Fianyi, Tanveer A. Zia:
Biometric Technology Solutions to Countering Today's Terrorism. 28-40 - Taiseera Al-Balushi, Saqib Ali, Osama Rehman:
Economics of Cyber Security and the Way Forward. 41-57
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.