Search dblp for Publications

export results for "toc:db/journals/ijcwt/ijcwt10.bht:"

 download as .bib file

@article{DBLP:journals/ijcwt/Al-GharibiWY20,
  author       = {Mansoor Al{-}Gharibi and
                  Matthew J. Warren and
                  William Yeoh},
  title        = {Risks of Critical Infrastructure Adoption of Cloud Computing by Government},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {3},
  pages        = {47--58},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020070104},
  doi          = {10.4018/IJCWT.2020070104},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Al-GharibiWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/AwanMSP20,
  author       = {Jawad Hussain Awan and
                  Shahzad Memon and
                  Azhar Ali Shah and
                  Kamran Taj Pathan},
  title        = {Proposed Framework of Smart Transportation in Pakistan: Issues, Challenges,
                  Vulnerabilities, and Solutions},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {4},
  pages        = {48--63},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020100104},
  doi          = {10.4018/IJCWT.2020100104},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/AwanMSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/HowdenMF20,
  author       = {James Howden and
                  Leandros A. Maglaras and
                  Mohamed Amine Ferrag},
  title        = {The Security Aspects of Automotive Over-the-Air Updates},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {2},
  pages        = {64--81},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020040104},
  doi          = {10.4018/IJCWT.2020040104},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/HowdenMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Hutchinson20,
  author       = {William Hutchinson},
  title        = {Deceiving Autonomous Drones},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {3},
  pages        = {1--14},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020070101},
  doi          = {10.4018/IJCWT.2020070101},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Hutchinson20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/ImamverdiyevA20,
  author       = {Yadigar N. Imamverdiyev and
                  Fargana J. Abdullayeva},
  title        = {Deep Learning in Cybersecurity: Challenges and Approaches},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {2},
  pages        = {82--105},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020040105},
  doi          = {10.4018/IJCWT.2020040105},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/ImamverdiyevA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Korstanje20,
  author       = {Maximiliano E. Korstanje},
  title        = {Terrorism in the Website: Society 4.0 and Fundamentalism in Scrutiny},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {1},
  pages        = {1--14},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020010101},
  doi          = {10.4018/IJCWT.2020010101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Korstanje20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/KostyuchenkoPMY20,
  author       = {Yuriy V. Kostyuchenko and
                  Viktor Pushkar and
                  Olga Malysheva and
                  Maxim Yuschenko},
  title        = {On the Behavior-Based Risk Communication Models in Crisis Management
                  and Social Risks Minimization},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {2},
  pages        = {27--45},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020040102},
  doi          = {10.4018/IJCWT.2020040102},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/KostyuchenkoPMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Leggat20,
  author       = {Helaine Leggat},
  title        = {Cyber Warfare: An Enquiry Into the Applicability of National Law to
                  Cyberspace},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {3},
  pages        = {28--46},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020070103},
  doi          = {10.4018/IJCWT.2020070103},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Leggat20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/MorahO20,
  author       = {Doris Ngozi Morah and
                  Omojola Oladokun},
  title        = {Cross-Regional Analysis of Terrorism Reporting and Dynamics of Ethnic
                  Relations in Nigeria},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {4},
  pages        = {20--35},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020100102},
  doi          = {10.4018/IJCWT.2020100102},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/MorahO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/NagahawattaWY20,
  author       = {Ruwan Nagahawatta and
                  Matthew J. Warren and
                  William Yeoh},
  title        = {A Study of Cyber Security Issues in Sri Lanka},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {3},
  pages        = {59--72},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020070105},
  doi          = {10.4018/IJCWT.2020070105},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/NagahawattaWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Padayachee20,
  author       = {Keshnee Padayachee},
  title        = {Understanding the Relationship Between the Dark Triad of Personality
                  Traits and Neutralization Techniques Toward Cybersecurity Behaviour},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {4},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020100101},
  doi          = {10.4018/IJCWT.2020100101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Padayachee20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Ramluckan20,
  author       = {Trishana Ramluckan},
  title        = {A South African Legal Perspective on the Regulation of Net Neutrality
                  and Its Implications for Cyber-Security and Cyber-Warfare},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {4},
  pages        = {36--47},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020100103},
  doi          = {10.4018/IJCWT.2020100103},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Ramluckan20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/SartonenHSTK20,
  author       = {Miika Sartonen and
                  Aki{-}Mauri Huhtinen and
                  Petteri Simola and
                  Kari T. Takamaa and
                  Veli{-}Pekka Kivim{\"{a}}ki},
  title        = {A Framework for the Weapons of Influence},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {1},
  pages        = {34--49},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020010103},
  doi          = {10.4018/IJCWT.2020010103},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/SartonenHSTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/SheykhkanlooH20,
  author       = {Naghmeh Moradpoor Sheykhkanloo and
                  Adam J. Hall},
  title        = {Insider Threat Detection Using Supervised Machine Learning Algorithms
                  on an Extremely Imbalanced Dataset},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {2},
  pages        = {1--26},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020040101},
  doi          = {10.4018/IJCWT.2020040101},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/SheykhkanlooH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/SolisPDBP20,
  author       = {Mariah Talia Solis and
                  Jessica Pearson and
                  Deirdre P. Dixon and
                  Abigail Blanco and
                  Raymond Papp},
  title        = {Terrorism Effects on Businesses Post 9/11},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {1},
  pages        = {15--33},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020010102},
  doi          = {10.4018/IJCWT.2020010102},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/SolisPDBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Warren20,
  author       = {Matthew J. Warren},
  title        = {Political Cyber Operations: {A} South Pacific Case Study},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {3},
  pages        = {15--27},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020070102},
  doi          = {10.4018/IJCWT.2020070102},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Warren20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Yaokumah20,
  author       = {Winfred Yaokumah},
  title        = {Predicting and Explaining Cyber Ethics with Ethical Theories},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {10},
  number       = {2},
  pages        = {46--63},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJCWT.2020040103},
  doi          = {10.4018/IJCWT.2020040103},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Yaokumah20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics