[1]
|
On the scale from ransomware to cyberterrorism: the cases of JBS USA, Colonial Pipeline and the wiperware attacks against Ukraine
Journal of Cyber Policy,
2024
DOI:10.1080/23738871.2024.2377670
|
|
|
[2]
|
Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions
Digital Threats: Research and Practice,
2023
DOI:10.1145/3609230
|
|
|
[3]
|
Students’ Perception towards New Face of Education during This Unprecedented Phase of COVID-19 Outbreak: An Empirical Study of Higher Educational Institutions in Saudi Arabia
European Journal of Investigation in Health, Psychology and Education,
2022
DOI:10.3390/ejihpe12070061
|
|
|
[4]
|
Prospectiva de ciberseguridad nacional para Colombia a 2030
Revista Científica General José María Córdova,
2022
DOI:10.21830/19006586.866
|
|
|
[5]
|
National Security
2019
DOI:10.4018/978-1-5225-7912-0.ch010
|
|
|
[6]
|
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism
Advances in Digital Crime, Forensics, and Cyber Terrorism,
2019
DOI:10.4018/978-1-5225-8976-1.ch008
|
|
|
[7]
|
Computer and Cyber Security
2018
DOI:10.1201/9780429424878-4
|
|
|
[8]
|
Google Maps Security Concerns
Journal of Computer and Communications,
2018
DOI:10.4236/jcc.2018.61027
|
|
|
[9]
|
Combating Violent Extremism and Radicalization in the Digital Era
Advances in Religious and Cultural Studies,
2016
DOI:10.4018/978-1-5225-0156-5.ch021
|
|
|
[10]
|
A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia
Information Security Journal: A Global Perspective,
2015
DOI:10.1080/19393555.2014.998844
|
|
|
[11]
|
Evaluating cyber terrorism components in Malaysia
The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M),
2014
DOI:10.1109/ICT4M.2014.7020582
|
|
|
[12]
|
Grounding the component of cyber terrorism framework using the grounded theory
2014 Science and Information Conference,
2014
DOI:10.1109/SAI.2014.6918237
|
|
|