Search dblp for Publications

export results for "toc:db/journals/ijcwt/ijcwt2.bht:"

 download as .bib file

@article{DBLP:journals/ijcwt/BarcombKMS12,
  author       = {Kris E. Barcomb and
                  Dennis J. Krill and
                  Robert F. Mills and
                  Michael A. Saville},
  title        = {Establishing Cyberspace Sovereignty},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {3},
  pages        = {26--38},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012070103},
  doi          = {10.4018/IJCWT.2012070103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/BarcombKMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Bernik12,
  author       = {Igor Bernik},
  title        = {Internet Study: Cyber Threats and Cybercrime Awareness and Fear},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {3},
  pages        = {1--11},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012070101},
  doi          = {10.4018/IJCWT.2012070101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Bernik12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Cohen-Almagor12,
  author       = {Raphael Cohen{-}Almagor},
  title        = {In Internet's Way: Radical, Terrorist Islamists on the Free Highway},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {3},
  pages        = {39--58},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012070104},
  doi          = {10.4018/IJCWT.2012070104},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Cohen-Almagor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/CzosseckP12,
  author       = {Christian Czosseck and
                  Karlis Podins},
  title        = {A Vulnerability-Based Model of Cyber Weapons and its Implications
                  for Cyber Conflict},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {1},
  pages        = {14--26},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012010102},
  doi          = {10.4018/IJCWT.2012010102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/CzosseckP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/HeerdenIBL12,
  author       = {Renier van Heerden and
                  Barry Irwin and
                  Ivan D. Burke and
                  Louise Leenen},
  title        = {A Computer Network Attack Taxonomy and Ontology},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {3},
  pages        = {12--25},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012070102},
  doi          = {10.4018/IJCWT.2012070102},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/HeerdenIBL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Huhtinen12,
  author       = {Aki{-}Mauri Huhtinen},
  title        = {From Military Threats to Everyday Fear: Computer Games as the Representation
                  of Military Information Operations},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {2},
  pages        = {1--10},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012040101},
  doi          = {10.4018/IJCWT.2012040101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Huhtinen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Huhtinen12a,
  author       = {Aki{-}Mauri Huhtinen},
  title        = {What Does the Concept of Ambidexterity Mean in the Current Military
                  Planning Process and Organization Construction?},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {2},
  pages        = {11--21},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012040102},
  doi          = {10.4018/IJCWT.2012040102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Huhtinen12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Korstanje12,
  author       = {Maximiliano E. Korstanje},
  title        = {A World without Islam},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {1},
  pages        = {50--52},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012010105},
  doi          = {10.4018/IJCWT.2012010105},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Korstanje12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/McCuneH12,
  author       = {Jayson McCune and
                  Dwight A. Haworth},
  title        = {Securing America Against Cyber War},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {1},
  pages        = {39--49},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012010104},
  doi          = {10.4018/IJCWT.2012010104},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/McCuneH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/MolokAC12,
  author       = {Nurul Nuha Abdul Molok and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {Online Social Networking: {A} Source of Intelligence for Advanced
                  Persistent Threats},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {1},
  pages        = {1--13},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012010101},
  doi          = {10.4018/IJCWT.2012010101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/MolokAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/SalminenH12,
  author       = {Mirva Salminen and
                  Aki{-}Mauri Huhtinen},
  title        = {The Comprehensive Approach as a Strategic Design to Run the Military-Industrial
                  Complex in Operations},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {2},
  pages        = {22--30},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012040103},
  doi          = {10.4018/IJCWT.2012040103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/SalminenH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Subedi12,
  author       = {Jishnu Subedi},
  title        = {Application of Information Technology in Disaster and Emergency Management},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {4},
  pages        = {1--12},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012100101},
  doi          = {10.4018/IJCWT.2012100101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Subedi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Tereshchenko12,
  author       = {Natalia Tereshchenko},
  title        = {{US} Foreign Policy Challenges of Non-State Actors' Cyber Terrorism
                  against Critical Infrastructure},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {4},
  pages        = {28--48},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012100103},
  doi          = {10.4018/IJCWT.2012100103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Tereshchenko12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/Tomaiuolo12,
  author       = {Michele Tomaiuolo},
  title        = {Trust Enforcing and Trust Building, Different Technologies and Visions},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {4},
  pages        = {49--66},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012100104},
  doi          = {10.4018/IJCWT.2012100104},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/Tomaiuolo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/VuurenGZ12,
  author       = {Joey Jansen van Vuuren and
                  Marthie Grobler and
                  Jannie Zaaiman},
  title        = {Cyber Security Awareness as Critical Driver to National Security},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {1},
  pages        = {27--38},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012010103},
  doi          = {10.4018/IJCWT.2012010103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/VuurenGZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/VuurenLPZ12,
  author       = {Joey Jansen van Vuuren and
                  Louise Leenen and
                  Jackie Phahlamohlaka and
                  Jannie Zaaiman},
  title        = {An Approach to Governance of CyberSecurity in South Africa},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {4},
  pages        = {13--27},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012100102},
  doi          = {10.4018/IJCWT.2012100102},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/VuurenLPZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics