The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase cyber-terrorism (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2006 (16) 2007-2011 (17) 2012-2015 (26) 2016-2023 (14)
Publication types (Num. hits)
article(33) book(1) incollection(16) inproceedings(23)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 17 occurrences of 14 keywords

Results
Found 73 publication records. Showing 73 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
88Nancy Houston How Human Issues Impact Confronting Cyber Terrorism. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
81Juan M. Estévez-Tapiador The Emergence of Cyber-Terrorism. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyber-terrorism, Black Ice, Dan Verton, critical infrastructure
64David Mair Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Metodi Hadji-Janev Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski Steganography in Support of the Global Terrorism. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Nancy Houston Cultural Aspects of Information Sharing and Collaboration. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Stefano Mele The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Ronald S. Bearse Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Alan Brill The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Stuart MacDonald Assessing and Responding to the Cyberterrorism Threat. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Alan Brill Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Elliot Zweig From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Raoul Chiesa Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Arthur L. Brocato Jr. Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Ivica Simonovski The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
64Zlatogor Minchev Human Factor Dual Role in Modern Cyberspace Social Engineering. Search on Bibsonomy Terrorist Use of Cyberspace and Cyber Terrorism The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
60In-Jung Kim, Cheol Won Lee, Eul-Gyu Im Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF autogenous terror, cyber terrorism, CERT, ISAC
49Jigang Liu, Tetsutaro Uehara Computer Forensics in Japan: A Preliminary Study. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vicious Attack, Early Warining, Routing Information, Intrusion Detection System
41Daegeon Kim Prediction of terrorism pattern accompanied by cyber-terrorism and the development direction of corresponding legal systems. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
41Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao, Yueh-Min Huang Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Dan Li 0002, Kefei Wang, Jitender S. Deogun A Fuzzy Anomaly Detection System. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Srinivas Mukkamala, Andrew H. Sung A Comparative Study of Techniques for Intrusion Detection. Search on Bibsonomy ICTAI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, information security, AI techniques
36Flora S. Tsai, Kap Luk Chan Detecting Cyber Security Threats in Weblogs Using Probabilistic Models. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyber terrorism, data mining, blog, weblog, probabilistic latent semantic analysis, cyber security, cyber crime
31Paulo Veríssimo Thou Shalt Not Trust non-Trustworthy Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Paul Mullins 0001, Jim Wolfe, Michael Fry 0003, Erik L. Wynters, William C. Calhoun, Robert Montante, William Oblitey Panel on integrating security concepts into existing computer courses. Search on Bibsonomy SIGCSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Maria Papathanasaki, Georgios Dimitriou, Leandros A. Maglaras, Ismini Vasileiou, Helge Janicke From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
31T. Ambika, K. Senthilvel Cyber Crimes against the State: A Study on Cyber Terrorism in India. Search on Bibsonomy Webology The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Maria Papathanasaki, Georgios Dimitriou, Leandros A. Maglaras, Ismini Vasileiou, Helge Janicke From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? Search on Bibsonomy PCI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Venkatachary Sampath Kumar, Jagdish Prasad, Ravi Samikannu A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector. Search on Bibsonomy Int. J. Crit. Infrastructures The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Poonam Kumar, Saurabh Mittal The Perpetration and Prevention of Cyber Crime: An Analysis of Cyber Terrorism in India. Search on Bibsonomy Int. J. Technoethics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Murat Dogrul, Adil Aslan, Eyyup Celik Developing an international cooperation on cyber defense and deterrence against Cyber terrorism. Search on Bibsonomy CyCon The full citation details ... 2011 DBLP  BibTeX  RDF
31Susan Haugen E-government, cyber-crime and cyber-terrorism: a population at risk. Search on Bibsonomy Electron. Gov. an Int. J. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Michael W. David, Kouichi Sakurai Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Abedalrzag Aldalbeeh, Ahmad Alsharqawi Cyber terrorism and its role in the outbreak of international crisis. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger, Erik S. Boyle Cyber terrorism cases and stock market valuation effects. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Victoria A. Jangada Correia An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Jordan J. Plotnek, Jill Slay Cyber terrorism: A homogenized taxonomy and definition. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Oleksandr Milov, Yevgen Melenti, Stanislav Milevskyi, Serhii Pohasii, Serhii Yevseiev Cyber Terrorism as an Object of Modeling. Search on Bibsonomy ISecIT The full citation details ... 2021 DBLP  BibTeX  RDF
24Primavera Fisogni Cyber Terrorism and Self-Radicalization - Emergent Phenomena of Onlife Age: An Essay Through the General System Theory. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Julian Droogan, Lise Waldek Should we be afraid of cyber-terrorism? Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib Discovering Cyber Terrorism Using Trace Pattern. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2016 DBLP  BibTeX  RDF
24Ali Al Mazari, Ahmed H. Anjariny, Shakeel A. Habib, Emmanuel Nyakwende Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Zahri Yunos, Rabiah Ahmad, Nor Amalina Mohd Sabri A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Mehmet Nesip Ogun (eds.) Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses Search on Bibsonomy 2015 DBLP  BibTeX  RDF
24Jian Hua, Sanjay Bapna The economic impact of cyber terrorism. Search on Bibsonomy J. Strateg. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hossein Taji Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Pardis Moslemzadeh Tehrani, Nazura Abdul Manap A rational jurisdiction for cyber terrorism. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Jian Hua, Sanjay Bapna How Can We Deter Cyber Terrorism? Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Natalia Tereshchenko US Foreign Policy Challenges of Non-State Actors' Cyber Terrorism against Critical Infrastructure. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Rabiah Ahmad, Zahri Yunos The Application of Mixed Method in Developing a Cyber Terrorism Framework. Search on Bibsonomy J. Information Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Rabiah Ahmad, Zahri Yunos, Shahrin Sahib, Mariana Yusoff Perception on Cyber Terrorism: A Focus Group Discussion Approach. Search on Bibsonomy J. Information Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Rabiah Ahmad, Zahri Yunos, Shahrin Sahib Understanding cyber terrorism: The grounded theory method applied. Search on Bibsonomy CyberSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Jonathan Matusitz Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Tridib Bandyopadhyay Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Oleksandr Pastukhov Cyber terrorism prevention and counteraction workshop review. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jian Hua, Sanjay Bapna Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking. Search on Bibsonomy ICIS The full citation details ... 2011 DBLP  BibTeX  RDF
24Mahmoud Eid Cyber-Terrorism and Ethical Journalism: A Need for Rationalism. Search on Bibsonomy Int. J. Technoethics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Zahri Yunos, Syahrul Hafidz Suid, Rabiah Ahmad, Zuraini Ismail Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework. Search on Bibsonomy IAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Zahri Yunos, Syahrul Hafidz Suid Protection of Critical National Information Infrastructure (CNII) against cyber terrorism: Development of strategy and policy framework. Search on Bibsonomy ISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Yanzhao Li National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Tridib Bandyopadhyay, Herbert J. Mattord Defending Cyber Terrorism - A Game Theoretic Modeling Approach. Search on Bibsonomy AMCIS The full citation details ... 2008 DBLP  BibTeX  RDF
24Christopher Beggs Cyber-Terrorism in Australia. Search on Bibsonomy Encyclopedia of Information Ethics and Security The full citation details ... 2007 DBLP  BibTeX  RDF
24Atul Kamboj, Mukhdeep Singh Cyber Terrorism: Terrorists go hi-tech. Search on Bibsonomy Egypt. Comput. Sci. J. The full citation details ... 2007 DBLP  BibTeX  RDF
24Janet J. Prichard, Laurie E. MacDonald Cyber Terrorism: A Study of the Extent of Coverage in Computer Science Textbooks. Search on Bibsonomy J. Inf. Technol. Educ. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Stephen Hinde Cyber-terrorism in context. Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Kathleen Tolan Initiatives in the Fight Against Cyber Terrorism. Search on Bibsonomy Certification and Security in E-Services The full citation details ... 2002 DBLP  BibTeX  RDF
24Stephen Hinde Incalculable potential for damage by cyber-terrorism. Search on Bibsonomy Comput. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Steven Furnell, Matthew J. Warren Computer hacking and cyber terrorism: the real threats in the new millennium? Search on Bibsonomy Comput. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang A Hybrid Model for Worm Simulations in a Large Network. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet incidents, simulation, Network modeling, Internet worms
21Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park Hybrid Modeling for Large-Scale Worm Propagation Simulations. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Internet incidents, simulation, Network modeling, Internet worms
21Eugene H. Spafford What starisstar information security? Search on Bibsonomy SIGCSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #73 of 73 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license