|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 14 keywords
|
|
|
Results
Found 73 publication records. Showing 73 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
88 | Nancy Houston |
How Human Issues Impact Confronting Cyber Terrorism. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
81 | Juan M. Estévez-Tapiador |
The Emergence of Cyber-Terrorism. |
IEEE Distributed Syst. Online |
2004 |
DBLP DOI BibTeX RDF |
cyber-terrorism, Black Ice, Dan Verton, critical infrastructure |
64 | David Mair |
Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Metodi Hadji-Janev |
Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski |
Steganography in Support of the Global Terrorism. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Nancy Houston |
Cultural Aspects of Information Sharing and Collaboration. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Stefano Mele |
The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Ronald S. Bearse |
Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Alan Brill |
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Stuart MacDonald |
Assessing and Responding to the Cyberterrorism Threat. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Alan Brill |
Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Elliot Zweig |
From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Raoul Chiesa |
Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Arthur L. Brocato Jr. |
Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Ivica Simonovski |
The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
64 | Zlatogor Minchev |
Human Factor Dual Role in Modern Cyberspace Social Engineering. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
60 | In-Jung Kim, Cheol Won Lee, Eul-Gyu Im |
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
autogenous terror, cyber terrorism, CERT, ISAC |
49 | Jigang Liu, Tetsutaro Uehara |
Computer Forensics in Japan: A Preliminary Study. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park |
Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Vicious Attack, Early Warining, Routing Information, Intrusion Detection System |
41 | Daegeon Kim |
Prediction of terrorism pattern accompanied by cyber-terrorism and the development direction of corresponding legal systems. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang |
Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. |
J. Univers. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Dan Li 0002, Kefei Wang, Jitender S. Deogun |
A Fuzzy Anomaly Detection System. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Andrew H. Sung, Srinivas Mukkamala |
The Feature Selection and Intrusion Detection Problems. |
ASIAN |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Srinivas Mukkamala, Andrew H. Sung |
A Comparative Study of Techniques for Intrusion Detection. |
ICTAI |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, information security, AI techniques |
36 | Flora S. Tsai, Kap Luk Chan |
Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime |
31 | Paulo Veríssimo |
Thou Shalt Not Trust non-Trustworthy Systems. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Paul Mullins 0001, Jim Wolfe, Michael Fry 0003, Erik L. Wynters, William C. Calhoun, Robert Montante, William Oblitey |
Panel on integrating security concepts into existing computer courses. |
SIGCSE |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Maria Papathanasaki, Georgios Dimitriou, Leandros A. Maglaras, Ismini Vasileiou, Helge Janicke |
From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? |
CoRR |
2020 |
DBLP BibTeX RDF |
|
31 | T. Ambika, K. Senthilvel |
Cyber Crimes against the State: A Study on Cyber Terrorism in India. |
Webology |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Maria Papathanasaki, Georgios Dimitriou, Leandros A. Maglaras, Ismini Vasileiou, Helge Janicke |
From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? |
PCI |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Venkatachary Sampath Kumar, Jagdish Prasad, Ravi Samikannu |
A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector. |
Int. J. Crit. Infrastructures |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Poonam Kumar, Saurabh Mittal |
The Perpetration and Prevention of Cyber Crime: An Analysis of Cyber Terrorism in India. |
Int. J. Technoethics |
2012 |
DBLP DOI BibTeX RDF |
|
31 | Murat Dogrul, Adil Aslan, Eyyup Celik |
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism. |
CyCon |
2011 |
DBLP BibTeX RDF |
|
31 | Susan Haugen |
E-government, cyber-crime and cyber-terrorism: a population at risk. |
Electron. Gov. an Int. J. |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Michael W. David, Kouichi Sakurai |
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Abedalrzag Aldalbeeh, Ahmad Alsharqawi |
Cyber terrorism and its role in the outbreak of international crisis. |
Int. J. Electron. Secur. Digit. Forensics |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger, Erik S. Boyle |
Cyber terrorism cases and stock market valuation effects. |
Inf. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Victoria A. Jangada Correia |
An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom. |
SN Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Jordan J. Plotnek, Jill Slay |
Cyber terrorism: A homogenized taxonomy and definition. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Oleksandr Milov, Yevgen Melenti, Stanislav Milevskyi, Serhii Pohasii, Serhii Yevseiev |
Cyber Terrorism as an Object of Modeling. |
ISecIT |
2021 |
DBLP BibTeX RDF |
|
24 | Primavera Fisogni |
Cyber Terrorism and Self-Radicalization - Emergent Phenomena of Onlife Age: An Essay Through the General System Theory. |
Int. J. Cyber Warf. Terror. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Julian Droogan, Lise Waldek |
Should we be afraid of cyber-terrorism? |
Int. J. Electron. Secur. Digit. Forensics |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib |
Discovering Cyber Terrorism Using Trace Pattern. |
Int. J. Netw. Secur. |
2016 |
DBLP BibTeX RDF |
|
24 | Ali Al Mazari, Ahmed H. Anjariny, Shakeel A. Habib, Emmanuel Nyakwende |
Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies. |
Int. J. Cyber Warf. Terror. |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri |
A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. |
Inf. Secur. J. A Glob. Perspect. |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Mehmet Nesip Ogun (eds.) |
Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses |
|
2015 |
DBLP BibTeX RDF |
|
24 | Jian Hua, Sanjay Bapna |
The economic impact of cyber terrorism. |
J. Strateg. Inf. Syst. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hossein Taji |
Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. |
Comput. Law Secur. Rev. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Pardis Moslemzadeh Tehrani, Nazura Abdul Manap |
A rational jurisdiction for cyber terrorism. |
Comput. Law Secur. Rev. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Jian Hua, Sanjay Bapna |
How Can We Deter Cyber Terrorism? |
Inf. Secur. J. A Glob. Perspect. |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Natalia Tereshchenko |
US Foreign Policy Challenges of Non-State Actors' Cyber Terrorism against Critical Infrastructure. |
Int. J. Cyber Warf. Terror. |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Rabiah Ahmad, Zahri Yunos |
The Application of Mixed Method in Developing a Cyber Terrorism Framework. |
J. Information Security |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff |
Perception on Cyber Terrorism: A Focus Group Discussion Approach. |
J. Information Security |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Rabiah Ahmad, Zahri Yunos, Shahrin Sahib |
Understanding cyber terrorism: The grounded theory method applied. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Jonathan Matusitz |
Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo. |
Inf. Secur. J. A Glob. Perspect. |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Tridib Bandyopadhyay |
Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach. |
Int. J. Cyber Warf. Terror. |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Oleksandr Pastukhov |
Cyber terrorism prevention and counteraction workshop review. |
Comput. Law Secur. Rev. |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jian Hua, Sanjay Bapna |
Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking. |
ICIS |
2011 |
DBLP BibTeX RDF |
|
24 | Mahmoud Eid |
Cyber-Terrorism and Ethical Journalism: A Need for Rationalism. |
Int. J. Technoethics |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Zahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail |
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. |
IAS |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Zahri Yunos, Syahrul Hafidz Suid |
Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework. |
ISI |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Yanzhao Li |
National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Tridib Bandyopadhyay, Herbert J. Mattord |
Defending Cyber Terrorism - A Game Theoretic Modeling Approach. |
AMCIS |
2008 |
DBLP BibTeX RDF |
|
24 | Christopher Beggs |
Cyber-Terrorism in Australia. |
Encyclopedia of Information Ethics and Security |
2007 |
DBLP BibTeX RDF |
|
24 | Atul Kamboj, Mukhdeep Singh |
Cyber Terrorism: Terrorists go hi-tech. |
Egypt. Comput. Sci. J. |
2007 |
DBLP BibTeX RDF |
|
24 | Janet J. Prichard, Laurie E. MacDonald |
Cyber Terrorism: A Study of the Extent of Coverage in Computer Science Textbooks. |
J. Inf. Technol. Educ. |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Stephen Hinde |
Cyber-terrorism in context. |
Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Kathleen Tolan |
Initiatives in the Fight Against Cyber Terrorism. |
Certification and Security in E-Services |
2002 |
DBLP BibTeX RDF |
|
24 | Stephen Hinde |
Incalculable potential for damage by cyber-terrorism. |
Comput. Secur. |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Steven Furnell, Matthew J. Warren |
Computer hacking and cyber terrorism: the real threats in the new millennium? |
Comput. Secur. |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang |
A Hybrid Model for Worm Simulations in a Large Network. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Internet incidents, simulation, Network modeling, Internet worms |
21 | Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park |
Hybrid Modeling for Large-Scale Worm Propagation Simulations. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
Internet incidents, simulation, Network modeling, Internet worms |
21 | Eugene H. Spafford |
What starisstar information security? |
SIGCSE |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #73 of 73 (100 per page; Change: )
|
|