


default search action
International Journal of Cyber Warfare and Terrorism, Volume 12
Volume 12, Number 1, 2022
- Yuriy V. Kostyuchenko

, Viktor Pushkar
:
On the Analysis of Horror Stories in the Militants' Narratives as Markers of Violent Behavior and Conflict Identity: Case of "L/DPR" During the Warfare in Donbass, East Ukraine, 2014-2021. 1-19 - Loo Seng Neo:

Understanding the Community's Perceptions Towards Online Radicalisation: An Exploratory Analysis. 1-15 - Lev Topor

, Moran Pollack
:
Fake Identities in Social Cyberspace: From Escapism to Terrorism. 1-17 - Skanda Vivek, Charles Harry:

Evaluating the Strategic Consequences of Cyber Targeting Strategies on Road Transport Networks: A Case Study of Washington DC. 1-14 - Sanjay Kumar Gautam

, Himanshu Khajuria
, Reeta Rani Gupta
, Biswa Prakash Nayak
:
Recent Trends in Child Sexual Abuse Material (CSAM) Distribution in Indian Cyberspace. 1-15 - Paul Coonley Boateng, Gerald Dapaah Gyamfi

:
Assessing the Defence Cooperation Agreements Between the USA and African Countries: The Case of Ghana. 1-14 - Zubeida Casmod Dawood, Carien Van 't Wout:

An Ontology Towards Predicting Terrorism Events. 1-13 - Ziad Kh. Al-Enizi, Muawya Naser:

The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights. 1-10 - Maximiliano Emanuel Korstanje

:
Differences and Commonalities Between Terrorism and COVID-19: Globalization in Ruins. 1-14 - Yuriy V. Kostyuchenko

, Viktor Pushkar
, Olga Malysheva, Maxim Yuschenko:
The Impact of the COVID-19 Pandemic on the Radical Behavior and Armed Conflict Escalation Risks: Case of Donbas (East Ukraine) Warfare. 1-21 - Fargana J. Abdullayeva

:
Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection. 1-15 - Ehsan Arzroomchilar

:
Techno-Radicalism: An Account of Radicalism in the Technology Era. 1-14 - Glorin Sebastian

:
Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan. 1-15 - Ben Stewart S., Dhanush N., Santhosh G., Angelin Gladston:

Efficient Client-Side Cross-Platform Compatible Solution for Phishing Prevention. 1-24 - Donald Douglas Atsa'am

, Ruth Wario
:
A Lone Wolf vs. an Affiliated Terrorist: Knowledge Inference on Who Poses More Danger to the Tourist. 1-9 - Parwaiz Ahmad Najar

, Hafizullah Dar, Priya Singh
, Ashaq Hussain Najar:
Anti-Social Factors Influence the Decision Making of Tourists: A Study of Kashmir. 1-14 - Romil Rawat

, Sonali Gupta, S. Sivaranjani, Chandra Umakantham Om Kumar, Megha Kuliha, K. Sakthidasan Sankaran:
Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks. 1-14 - Alfred Paa Gyaisey, Acheampong Owusu

:
Multi-Contextual Analysis of Internet Security Perception and Behavior: Perspectives of Anglophone and Francophone Internet Users. 1-20 - Olalonpe Oluwakemi Ajise, Babatunde Joshua Omotosho

:
Boko Haram Insurgency and Violence Against Women and Girls in Nigeria. 1-13 - Nicola Fabiano

:
Artificial Intelligence and Facial Recognition in an IoT Ecosystem: The Impact on Data Protection and Privacy and the Relevance of Ethics. 1-11
Volume 12, Number 2, 2022
- Sergiy Dotsenko, Oleg Illiashenko

, Vyacheslav Kharchenko, Olga Morozova:
Integrated Information Model of an Enterprise and Cybersecurity Management System: From Data to Activity. 1-21 - Pietro Rossetti, Fabio Garzia, Nicola Silverio Genco, Antonio Sacchetti:

IoT and Edge Computing as Enabling Technologies of Human Factors Monitoring in CBRN Environment. 1-20 - Umberto Battista

, Pietro De Vito
, Davide Ottonello, Deborah Hugon:
Agent-Based Simulation of Heterogeneous Crowd Flows in Critical Infrastructures During Emergencies. 1-18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














