Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcwt/ijcwt5.bht:"
@article{DBLP:journals/ijcwt/BurmeisterPA15, author = {Oliver K. Burmeister and Jackie Phahlamohlaka and Yeslam Al{-}Saggaf}, title = {Good Governance and Virtue in South Africa's Cyber Security Policy Implementation}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {1}, pages = {19--29}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015010102}, doi = {10.4018/IJCWT.2015010102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/BurmeisterPA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/HilliardSHB15, author = {Phil Hilliard and Frank J. Stech and Kristin E. Heckman and Janice Redington Ballo}, title = {Scientometric Analysis of Chinese Cyber-Denial and Deception Research}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {4}, pages = {15--58}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015100102}, doi = {10.4018/IJCWT.2015100102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/HilliardSHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/HirshfieldBBCFM15, author = {Leanne M. Hirshfield and Philip Bobko and Alexander J. Barelka and Mark R. Costa and Gregory J. Funke and Vincent F. Mancuso and Victor S. Finomore Jr. and Benjamin A. Knott}, title = {The Role of Human Operators' Suspicion in the Detection of Cyber Attacks}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {3}, pages = {28--44}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015070103}, doi = {10.4018/IJCWT.2015070103}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/HirshfieldBBCFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Huhtinen15, author = {Aki{-}Mauri Huhtinen}, title = {The Double Edge of the Information Sword}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {2}, pages = {21--30}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015040102}, doi = {10.4018/IJCWT.2015040102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Huhtinen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/JaquireS15, author = {Victor Jaquire and Basie von Solms}, title = {A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {1}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015010101}, doi = {10.4018/IJCWT.2015010101}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/JaquireS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Korstanje15, author = {Maximiliano E. Korstanje}, title = {Conflictive Touring: The Roots of Terrorism}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {2}, pages = {53--67}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015040104}, doi = {10.4018/IJCWT.2015040104}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Korstanje15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Korstanje15a, author = {Maximiliano E. Korstanje}, title = {Terrorists Tend to Target Innocent Tourists: {A} Radical Review}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {3}, pages = {45--54}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015070104}, doi = {10.4018/IJCWT.2015070104}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Korstanje15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/LimMAC15, author = {Joo Soon Lim and Sean B. Maynard and Atif Ahmad and Shanton Chang}, title = {Information Security Culture: Towards an Instrument for Assessing Security Management Practices}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {2}, pages = {31--52}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015040103}, doi = {10.4018/IJCWT.2015040103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/LimMAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/MezherKS15, author = {Toufic Mezher and Sameh El Khatib and Thilanka Maduwanthi Sooriyaarachchi}, title = {Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {3}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015070101}, doi = {10.4018/IJCWT.2015070101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/MezherKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Olagbemiro15, author = {Albert Olagbemiro}, title = {Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {4}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015100101}, doi = {10.4018/IJCWT.2015100101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Olagbemiro15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/PillayM15, author = {Kiru Pillay and Manoj S. Maharaj}, title = {The Restructuring and Re-Orientation of Civil Society in a Web 2.0 World: {A} Case Study of Greenpeace}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {1}, pages = {47--61}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015010104}, doi = {10.4018/IJCWT.2015010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/PillayM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/RastogiS15, author = {Rahul Rastogi and Rossouw von Solms}, title = {{IT} Security for {SCADA:} {A} Position Paper}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {3}, pages = {19--27}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015070102}, doi = {10.4018/IJCWT.2015070102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/RastogiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/TamaddonAB15, author = {Sohail Tamaddon and Atif Ahmad and Rachelle Bosua}, title = {Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {2}, pages = {1--20}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015040101}, doi = {10.4018/IJCWT.2015040101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/TamaddonAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/VeerasamyG15, author = {Namosha Veerasamy and Marthie Grobler}, title = {Logic Tester for the Classification of Cyberterrorism Attacks}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {1}, pages = {30--46}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015010103}, doi = {10.4018/IJCWT.2015010103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/VeerasamyG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.