![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ijcwt/ijcwt2.bht:"
@article{DBLP:journals/ijcwt/BarcombKMS12, author = {Kris E. Barcomb and Dennis J. Krill and Robert F. Mills and Michael A. Saville}, title = {Establishing Cyberspace Sovereignty}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {3}, pages = {26--38}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012070103}, doi = {10.4018/IJCWT.2012070103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/BarcombKMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Bernik12, author = {Igor Bernik}, title = {Internet Study: Cyber Threats and Cybercrime Awareness and Fear}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {3}, pages = {1--11}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012070101}, doi = {10.4018/IJCWT.2012070101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Bernik12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Cohen-Almagor12, author = {Raphael Cohen{-}Almagor}, title = {In Internet's Way: Radical, Terrorist Islamists on the Free Highway}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {3}, pages = {39--58}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012070104}, doi = {10.4018/IJCWT.2012070104}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Cohen-Almagor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/CzosseckP12, author = {Christian Czosseck and Karlis Podins}, title = {A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {1}, pages = {14--26}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012010102}, doi = {10.4018/IJCWT.2012010102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/CzosseckP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/HeerdenIBL12, author = {Renier van Heerden and Barry Irwin and Ivan D. Burke and Louise Leenen}, title = {A Computer Network Attack Taxonomy and Ontology}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {3}, pages = {12--25}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012070102}, doi = {10.4018/IJCWT.2012070102}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/HeerdenIBL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Huhtinen12, author = {Aki{-}Mauri Huhtinen}, title = {From Military Threats to Everyday Fear: Computer Games as the Representation of Military Information Operations}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {2}, pages = {1--10}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012040101}, doi = {10.4018/IJCWT.2012040101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Huhtinen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Huhtinen12a, author = {Aki{-}Mauri Huhtinen}, title = {What Does the Concept of Ambidexterity Mean in the Current Military Planning Process and Organization Construction?}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {2}, pages = {11--21}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012040102}, doi = {10.4018/IJCWT.2012040102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Huhtinen12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Korstanje12, author = {Maximiliano E. Korstanje}, title = {A World without Islam}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {1}, pages = {50--52}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012010105}, doi = {10.4018/IJCWT.2012010105}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/Korstanje12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/McCuneH12, author = {Jayson McCune and Dwight A. Haworth}, title = {Securing America Against Cyber War}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {1}, pages = {39--49}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012010104}, doi = {10.4018/IJCWT.2012010104}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/McCuneH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/MolokAC12, author = {Nurul Nuha Abdul Molok and Atif Ahmad and Shanton Chang}, title = {Online Social Networking: {A} Source of Intelligence for Advanced Persistent Threats}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {1}, pages = {1--13}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012010101}, doi = {10.4018/IJCWT.2012010101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/MolokAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/SalminenH12, author = {Mirva Salminen and Aki{-}Mauri Huhtinen}, title = {The Comprehensive Approach as a Strategic Design to Run the Military-Industrial Complex in Operations}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {2}, pages = {22--30}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012040103}, doi = {10.4018/IJCWT.2012040103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/SalminenH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Subedi12, author = {Jishnu Subedi}, title = {Application of Information Technology in Disaster and Emergency Management}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {4}, pages = {1--12}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012100101}, doi = {10.4018/IJCWT.2012100101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Subedi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Tereshchenko12, author = {Natalia Tereshchenko}, title = {{US} Foreign Policy Challenges of Non-State Actors' Cyber Terrorism against Critical Infrastructure}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {4}, pages = {28--48}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012100103}, doi = {10.4018/IJCWT.2012100103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Tereshchenko12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/Tomaiuolo12, author = {Michele Tomaiuolo}, title = {Trust Enforcing and Trust Building, Different Technologies and Visions}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {4}, pages = {49--66}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012100104}, doi = {10.4018/IJCWT.2012100104}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/Tomaiuolo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/VuurenGZ12, author = {Joey Jansen van Vuuren and Marthie Grobler and Jannie Zaaiman}, title = {Cyber Security Awareness as Critical Driver to National Security}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {1}, pages = {27--38}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012010103}, doi = {10.4018/IJCWT.2012010103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/VuurenGZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/VuurenLPZ12, author = {Joey Jansen van Vuuren and Louise Leenen and Jackie Phahlamohlaka and Jannie Zaaiman}, title = {An Approach to Governance of CyberSecurity in South Africa}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {4}, pages = {13--27}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012100102}, doi = {10.4018/IJCWT.2012100102}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/VuurenLPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.