Works about CYBERTERRORISM
1
- Review of Economic Studies, 2025, v. 92, n. 3, p. 1532, doi. 10.1093/restud/rdae070
- Bordalo, Pedro;
- Burro, Giovanni;
- Coffman, Katherine;
- Gennaioli, Nicola;
- Shleifer, Andrei
- Article
2
- Journal of Namibian Studies, 2025, v. 44, p. 115
- Kerbouche, Ahmed;
- Miloudi, Lakhdar
- Article
3
- Eastern-European Journal of Enterprise Technologies, 2025, v. 135, n. 13, p. 6, doi. 10.15587/1729-4061.2025.332324
- Prokhorova, Viktoriia;
- Budanov, Oeksandr;
- Budanov, Pavlo;
- Slastianykova, Krystyna
- Article
4
- Eastern-European Journal of Enterprise Technologies, 2025, v. 135, n. 9, p. 33, doi. 10.15587/1729-4061.2025.329258
- Owaid, Salman Rasheed;
- Miahkykh, Hennadii;
- Odarushchenko, Elena;
- Kashkevich, Svitlana;
- Shyshatskyi, Andrii;
- Plekhova, Ganna;
- Hrymud, Andrii;
- Petruk, Serhii;
- Shaposhnikova, Olena;
- Stryhun, Vitalii
- Article
5
- Terrorism & Political Violence, 2025, v. 37, n. 5, p. 651, doi. 10.1080/09546553.2024.2362665
- Farber, Shai;
- Yehezkel, Snir Ahiad
- Article
6
- Cyber-Physical Systems, 2025, v. 11, n. 3, p. 265, doi. 10.1080/23335777.2024.2373388
- Rotibi, Ayodeji O.;
- Saxena, Neetesh;
- Burnap, Pete;
- Read, Craig
- Article
7
- Applied Computer Science (1895-3735), 2025, v. 21, n. 2, p. 96, doi. 10.35784/acs_7397
- BAWANEH, Mohammed J.;
- AL-HAZAIMEH, Obaida M.;
- AL-NAWASHI, Malek M.;
- AL-BSOOL, Monther H.;
- HANANDAH, Essam
- Article
8
- Asian Journal of Control, 2025, v. 27, n. 4, p. 1854, doi. 10.1002/asjc.3545
- Shi, Miaomiao;
- Hu, Chen;
- Guo, Jian;
- Ma, Lifeng;
- Yi, Xiaojian
- Article
9
- Eastern-European Journal of Enterprise Technologies, 2025, v. 135, n. 2, p. 17, doi. 10.15587/1729-4061.2025.333720
- Ussatova, Olga;
- Makilenov, Shakirt;
- Karyukin, Vladislav;
- Razaque, Abdul;
- Amanzholova, Saule;
- Begimbayeva, Yenlik
- Article
10
- Internet of Things (IoT), 2025, v. 6, n. 2, p. 23, doi. 10.3390/iot6020023
- Sabri, Omar;
- Al-Shargabi, Bassam;
- Abuarqoub, Abdelrahman;
- Hakami, Tahani Ali
- Article
11
- Network (2673-8732), 2025, v. 5, n. 2, p. 20, doi. 10.3390/network5020020
- Ojetunde, Babatunde;
- Kurihara, Takuya;
- Yano, Kazuto;
- Sakano, Toshikazu;
- Yokoyama, Hiroyuki
- Article
12
- Network (2673-8732), 2025, v. 5, n. 2, p. 13, doi. 10.3390/network5020013
- Alromaihi, Noora;
- Rouached, Mohsen;
- Akremi, Aymen
- Article
13
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 2, p. 34, doi. 10.3390/jcp5020034
- Chamkar, Samir Achraf;
- Zaydi, Mounia;
- Maleh, Yassine;
- Gherabi, Noreddine
- Article
14
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 2, p. 23, doi. 10.3390/jcp5020023
- Farooq, Muhammad Omer;
- Kunz, Thomas
- Article
15
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 2, p. 20, doi. 10.3390/jcp5020020
- Shuwandy, Moceheb Lazam;
- Alasad, Qutaiba;
- Hammood, Maytham M.;
- Yass, Ayad A.;
- Abdulateef, Salwa Khalid;
- Alsharida, Rawan A.;
- Qaddoori, Sahar Lazim;
- Thalij, Saadi Hamad;
- Frman, Maath;
- Kutaibani, Abdulsalam Hamid;
- Abd, Noor S.
- Article
16
- Telecom, 2025, v. 6, n. 2, p. 21, doi. 10.3390/telecom6020021
- Koukaras, Christos;
- Koukaras, Paraskevas;
- Ioannidis, Dimosthenis;
- Stavrinides, Stavros G.
- Article
17
- Journal of Industrial Integration & Management, 2025, v. 10, n. 2, p. 341, doi. 10.1142/S2424862224500179
- Jyoti;
- Kesharwani, Subodh;
- Chaudhry, Sohail S.
- Article
18
- Systems, 2025, v. 13, n. 6, p. 463, doi. 10.3390/systems13060463
- Alamir, Roba H.;
- Noor, Ayman;
- Almukhalfi, Hanan;
- Almukhlifi, Reham;
- Noor, Talal H.
- Article
19
- Journal of Marine Science & Engineering, 2025, v. 13, n. 6, p. 1087, doi. 10.3390/jmse13061087
- Oruc, Aybars;
- Kavallieratos, Georgios;
- Gkioulos, Vasileios;
- Katsikas, Sokratis
- Article
20
- ICTACT Journal on Communication Technology, 2025, v. 16, n. 2, p. 3515, doi. 10.21917/ijct.2025.0523
- Janani, A. P.;
- Thimmiaraja, J.
- Article
21
- Electrical Engineering, 2025, v. 107, n. 6, p. 7363, doi. 10.1007/s00202-024-02925-4
- Raj, Utkarsh;
- Shankar, Ravi;
- Rani, Surbhi;
- Ranjan, Mrinal
- Article
22
- Sensors (14248220), 2025, v. 25, n. 12, p. 3617, doi. 10.3390/s25123617
- Manogaran, Nalini;
- Shankar, Yamini Bhavani;
- Nandagopal, Malarvizhi;
- Su, Hui-Kai;
- Kuo, Wen-Kai;
- Ravichandran, Sanmugasundaram;
- Seerangan, Koteeswaran
- Article
23
- Journal of the Korea Institute of Information & Communication Engineering, 2025, v. 29, n. 6, p. 800, doi. 10.6109/jkiice.2025.29.6.800
- Article
24
- International Policy Digest, 2025, p. 1
- Article
25
- Information (2078-2489), 2025, v. 16, n. 6, p. 470, doi. 10.3390/info16060470
- Alshehri, Sarah Mohammed;
- Sharaf, Sanaa Abdullah;
- Molla, Rania Abdullrahman
- Article
26
- Symmetry (20738994), 2025, v. 17, n. 6, p. 898, doi. 10.3390/sym17060898
- Zhang, Chenghong;
- Su, Lingyin
- Article
27
- Journal of Systems Science & Information, 2011, v. 9, n. 3, p. 201
- Article
28
- Performance Improvement, 2016, v. 55, n. 8, p. 17, doi. 10.1002/pfi.21614
- Ritzman, Matthew E.;
- Kahle‐Piasecki, Lisa
- Article
29
- ABI Technik, 2025, v. 45, n. 1, p. 55, doi. 10.1515/abitech-2025-0007
- Article
30
- ABI Technik, 2022, v. 42, n. 1, p. 43, doi. 10.1515/abitech-2022-0005
- Kost, Michael;
- Loibl M.A., Bastian;
- Reuter, Peter;
- Stenke, Matthias
- Article
31
- Fraser Forum, 2008, p. 12
- Article
32
- Journal of Health Care Law & Policy, 2018, v. 21, n. 1, p. 29
- Article
33
- Journal of Chinese Political Science, 2023, v. 28, n. 1, p. 127, doi. 10.1007/s11366-022-09813-3
- Article
34
- Communist & Post-Communist Studies, 2020, v. 53, n. 3, p. 123, doi. 10.1525/cpcs.2020.53.3.123
- Dremliuga, Roman;
- Dremliuga, Olga;
- Kuznetsov, Pavel
- Article
35
- Peace Review, 2021, v. 33, n. 4, p. 427, doi. 10.1080/10402659.2021.2042993
- Article
36
- Peace Review, 2005, v. 17, n. 2/3, p. 239, doi. 10.1080/14631370500332973
- Article
37
- Journal of Supercomputing, 2024, v. 80, n. 17, p. 24975, doi. 10.1007/s11227-024-06392-3
- Bezanjani, Behnam Rezaei;
- Ghafouri, Seyyed Hamid;
- Gholamrezaei, Reza
- Article
38
- Journal of Supercomputing, 2024, v. 80, n. 16, p. 24520, doi. 10.1007/s11227-024-06345-w
- Wang, Xiao;
- Dai, Lie;
- Yang, Guang
- Article
39
- Journal of Comparative Policy Analysis, 2012, v. 14, n. 3, p. 254, doi. 10.1080/13876988.2012.687619
- Article
40
- Loss Prevention Bulletin, 2019, n. 268, p. 2
- Article
41
- Loss Prevention Bulletin, 2015, n. 242, p. 9
- Article
42
- Loss Prevention Bulletin, 2012, n. 224, p. 5
- Article
43
- Advances in Complex Systems, 2014, v. 17, n. 2, p. 1, doi. 10.1142/S021952591450009X
- GHEDINI, CINARA G.;
- RIBEIRO, CARLOS H. C.
- Article
44
- Advances in Complex Systems, 2009, v. 12, n. 1, p. 73, doi. 10.1142/S0219525909002106
- Article
45
- Security Spectrum: Journal of Advanced Security Research, 2024, p. 185, doi. 10.15158/485r-2b15
- Article
46
- Measurement Techniques, 2011, v. 54, n. 6, p. 636, doi. 10.1007/s11018-011-9778-9
- Dobrodeev, A.;
- Gorshkov, A.;
- Tulemisov, U.
- Article
47
- Michigan Technology Law Review, 2021, v. 28, n. 1, p. 175, doi. 10.36645/mtlr.28.1.arms
- Article
48
- Multidisciplinary Journal of School Education, 2023, v. 12, n. 1, p. 413, doi. 10.35765/mjse.2023.1223.18
- Article
49
- Digital, 2024, v. 4, n. 4, p. 866, doi. 10.3390/digital4040043
- Al-Janabi, Samir;
- Jabbar, Haidar;
- Syms, Francis
- Article
50
- International Journal of Information & Communication Technology Research (2251-6107), 2023, v. 15, n. 3, p. 21
- FarahaniNia, Sina;
- Sadeghiyan, Babak;
- Dehghan, Motahareh;
- Niksefat, Salman
- Article