Search dblp for Publications

export results for "toc:db/journals/ijcwt/ijcwt5.bht:"

 download as .bib file

@article{DBLP:journals/ijcwt/BurmeisterPA15,
  author       = {Oliver K. Burmeister and
                  Jackie Phahlamohlaka and
                  Yeslam Al{-}Saggaf},
  title        = {Good Governance and Virtue in South Africa's Cyber Security Policy
                  Implementation},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {1},
  pages        = {19--29},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015010102},
  doi          = {10.4018/IJCWT.2015010102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/BurmeisterPA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/HilliardSHB15,
  author       = {Phil Hilliard and
                  Frank J. Stech and
                  Kristin E. Heckman and
                  Janice Redington Ballo},
  title        = {Scientometric Analysis of Chinese Cyber-Denial and Deception Research},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {4},
  pages        = {15--58},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015100102},
  doi          = {10.4018/IJCWT.2015100102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/HilliardSHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/HirshfieldBBCFM15,
  author       = {Leanne M. Hirshfield and
                  Philip Bobko and
                  Alexander J. Barelka and
                  Mark R. Costa and
                  Gregory J. Funke and
                  Vincent F. Mancuso and
                  Victor S. Finomore Jr. and
                  Benjamin A. Knott},
  title        = {The Role of Human Operators' Suspicion in the Detection of Cyber Attacks},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {3},
  pages        = {28--44},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015070103},
  doi          = {10.4018/IJCWT.2015070103},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/HirshfieldBBCFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Huhtinen15,
  author       = {Aki{-}Mauri Huhtinen},
  title        = {The Double Edge of the Information Sword},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {2},
  pages        = {21--30},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015040102},
  doi          = {10.4018/IJCWT.2015040102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Huhtinen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/JaquireS15,
  author       = {Victor Jaquire and
                  Basie von Solms},
  title        = {A Strategic Framework for a Secure Cyberspace in Developing Countries
                  with Special Emphasis on the Risk of Cyber Warfare},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {1},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015010101},
  doi          = {10.4018/IJCWT.2015010101},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/JaquireS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Korstanje15,
  author       = {Maximiliano E. Korstanje},
  title        = {Conflictive Touring: The Roots of Terrorism},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {2},
  pages        = {53--67},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015040104},
  doi          = {10.4018/IJCWT.2015040104},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Korstanje15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Korstanje15a,
  author       = {Maximiliano E. Korstanje},
  title        = {Terrorists Tend to Target Innocent Tourists: {A} Radical Review},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {3},
  pages        = {45--54},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015070104},
  doi          = {10.4018/IJCWT.2015070104},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Korstanje15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/LimMAC15,
  author       = {Joo Soon Lim and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {Information Security Culture: Towards an Instrument for Assessing
                  Security Management Practices},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {2},
  pages        = {31--52},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015040103},
  doi          = {10.4018/IJCWT.2015040103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/LimMAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/MezherKS15,
  author       = {Toufic Mezher and
                  Sameh El Khatib and
                  Thilanka Maduwanthi Sooriyaarachchi},
  title        = {Cyberattacks on Critical Infrastructure and Potential Sustainable
                  Development Impacts},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {3},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015070101},
  doi          = {10.4018/IJCWT.2015070101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/MezherKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Olagbemiro15,
  author       = {Albert Olagbemiro},
  title        = {Cyberspace as a Complex Adaptive System and the Policy and Operational
                  Implications for Cyberwarfare},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {4},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015100101},
  doi          = {10.4018/IJCWT.2015100101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Olagbemiro15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/PillayM15,
  author       = {Kiru Pillay and
                  Manoj S. Maharaj},
  title        = {The Restructuring and Re-Orientation of Civil Society in a Web 2.0
                  World: {A} Case Study of Greenpeace},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {1},
  pages        = {47--61},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015010104},
  doi          = {10.4018/IJCWT.2015010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/PillayM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/RastogiS15,
  author       = {Rahul Rastogi and
                  Rossouw von Solms},
  title        = {{IT} Security for {SCADA:} {A} Position Paper},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {3},
  pages        = {19--27},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015070102},
  doi          = {10.4018/IJCWT.2015070102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/RastogiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/TamaddonAB15,
  author       = {Sohail Tamaddon and
                  Atif Ahmad and
                  Rachelle Bosua},
  title        = {Secure Knowledge Management: Influencing the Development of Human
                  Knowledge Sharing Networks},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {2},
  pages        = {1--20},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015040101},
  doi          = {10.4018/IJCWT.2015040101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/TamaddonAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/VeerasamyG15,
  author       = {Namosha Veerasamy and
                  Marthie Grobler},
  title        = {Logic Tester for the Classification of Cyberterrorism Attacks},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {1},
  pages        = {30--46},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015010103},
  doi          = {10.4018/IJCWT.2015010103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/VeerasamyG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics