default search action
Search dblp for Publications
export results for "toc:db/journals/ijcwt/ijcwt3.bht:"
@article{DBLP:journals/ijcwt/AxelrodH13, author = {C. Warren Axelrod and Sukumar Haldar}, title = {Security Risks to {IT} Supply Chains under Economic Stress}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {58--73}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100107}, doi = {10.4018/IJCWT.2013100107}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/AxelrodH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/DasguptaF13, author = {Dipankar Dasgupta and Denise Ferebee}, title = {Consequences of Diminishing Trust in Cyberspace}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {3}, pages = {19--31}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013070102}, doi = {10.4018/IJCWT.2013070102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/DasguptaF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Edgar-Nevill13, author = {Denis Edgar{-}Nevill}, title = {The {EU} {ECENTRE} Project: Education as a Defensive Weapon in the War Against Cybercrime}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {10--21}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100102}, doi = {10.4018/IJCWT.2013100102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Edgar-Nevill13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Grant13, author = {Tim J. Grant}, title = {Tools and Technologies for Professional Offensive Cyber Operations}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {3}, pages = {49--71}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013070104}, doi = {10.4018/IJCWT.2013070104}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Grant13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/HewittMT13, author = {Anne M. Hewitt and Danielle Mirliss and Riad Twal}, title = {Incident and Disaster Management Training: An Update on Using Virtual World Scenarios for Emergency Management Training}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {2}, pages = {1--21}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013040101}, doi = {10.4018/IJCWT.2013040101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/HewittMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/IlvonenV13, author = {Ilona Ilvonen and Pasi Virtanen}, title = {Preparing for Cyber Threats with Information Security Policies}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {22--31}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100103}, doi = {10.4018/IJCWT.2013100103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/IlvonenV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Inna13, author = {Vasilyeva Inna}, title = {The Value of Interaction for Russia, the {USA} and China Facing the Information Warfare}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {1--9}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100101}, doi = {10.4018/IJCWT.2013100101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Inna13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/KomaromiUE13, author = {Kurt Komaromi and Fahri Unsal and G. Scott Erickson}, title = {Online Interaction with Millenials: Institution vs. Community}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {1}, pages = {46--62}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013010104}, doi = {10.4018/IJCWT.2013010104}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/KomaromiUE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/KulmalaK13, author = {Riikka Kulmala and Juha Kettunen}, title = {Intellectual Property Protection in Small Knowledge Intensive Enterprises}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {1}, pages = {29--45}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013010103}, doi = {10.4018/IJCWT.2013010103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/KulmalaK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/KuusistoK13, author = {Tuija Kuusisto and Rauno Kuusisto}, title = {Strategic Communication for Supporting Cyber-Security}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {3}, pages = {72--79}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013070105}, doi = {10.4018/IJCWT.2013070105}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/KuusistoK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Lehto13, author = {Martti Lehto}, title = {The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {3}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013070101}, doi = {10.4018/IJCWT.2013070101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Lehto13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/MartinsSRV13, author = {Jos{\'{e}} Martins and Henrique dos Santos and Ant{\'{o}}nio Rosinha and Agostinho Valente}, title = {Information Security Management: {A} Case Study in a Portuguese Military Organization}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {3}, pages = {32--48}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013070103}, doi = {10.4018/IJCWT.2013070103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/MartinsSRV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/McCarthyM13, author = {John McCarthy and William Mahoney}, title = {{SCADA} Threats in the Modern Airport}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {32--39}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100104}, doi = {10.4018/IJCWT.2013100104}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/McCarthyM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Medlin13, author = {B. Dawn Medlin}, title = {Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {2}, pages = {58--70}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013040104}, doi = {10.4018/IJCWT.2013040104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Medlin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/MulkeyKK13, author = {Clifton J. Mulkey and Dulal C. Kar and Ajay K. Katangur}, title = {An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {2}, pages = {38--57}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013040103}, doi = {10.4018/IJCWT.2013040103}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/MulkeyKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/OhashiH13, author = {Masakazu Ohashi and Mayumi Hori}, title = {On the Study of Certified Originality for Digital Alteration Problem: Technology Developments of the Time Authentication}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {1}, pages = {15--28}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013010102}, doi = {10.4018/IJCWT.2013010102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/OhashiH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Radziwill13, author = {Yaroslav Radziwill}, title = {What Lawyers Want: Legally Significant Questions that Only {IT} Specialists can Answer}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {52--57}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100106}, doi = {10.4018/IJCWT.2013100106}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Radziwill13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Rejas-MusleraDAB13, author = {Ricardo J. Rejas{-}Muslera and Elena Davara and Alain Abran and Luigi Buglione}, title = {Intellectual Property Systems in Software}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {1}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013010101}, doi = {10.4018/IJCWT.2013010101}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Rejas-MusleraDAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/RenaudG13, author = {Karen Renaud and Wendy Goucher}, title = {Monkey See - Monkey Take Photo: The Risk of Mobile Information Leakage}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {4}, pages = {40--51}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013100105}, doi = {10.4018/IJCWT.2013100105}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/RenaudG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Tabansky13, author = {Lior Tabansky}, title = {Critical Infrastructure Protection: Evolution of Israeli Policy}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {3}, pages = {80--87}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013070106}, doi = {10.4018/IJCWT.2013070106}, timestamp = {Sun, 19 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Tabansky13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/VeerasamyL13, author = {Namosha Veerasamy and Aubrey Labuschagne}, title = {Ascertaining Trust Indicators in Social Networking Sites}, journal = {Int. J. Cyber Warf. Terror.}, volume = {3}, number = {2}, pages = {22--37}, year = {2013}, url = {https://doi.org/10.4018/ijcwt.2013040102}, doi = {10.4018/IJCWT.2013040102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/VeerasamyL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.