共 48 条
[21]
Steganalysis - a Way Forward Against Cyber Terrorism
[J].
2012 20TH TELECOMMUNICATIONS FORUM (TELFOR),
2012,
:681-684
[22]
Cyber Terrorism and Effective Counteraction to it in Modern Conditions
[J].
EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES,
2020,
:9103-9108
[23]
Fighting Cyber Terrorism: comparison of Turkey and Russia
[J].
2018 INTERNATIONAL CONGRESS ON BIG DATA, DEEP LEARNING AND FIGHTING CYBER TERRORISM (IBIGDELFT),
2018,
:98-101
[24]
A Layered Network Collapse Method in Cyber Terrorism
[J].
PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020),
2020,
:18-22
[25]
A Comprehensive Review of Cyber Terrorism in the Current Scenario
[J].
2016 2ND IEEE INTERNATIONAL INNOVATIVE APPLICATIONS OF COMPUTATIONAL INTELLIGENCE ON POWER, ENERGY AND CONTROLS WITH THEIR IMPACT ON HUMANITY (CIPECH),
2016,
:277-281
[27]
CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS
[J].
POLICING IN CENTRAL AND EASTERN EUROPE - SOCIAL CONTROL OF UNCONVENTIONAL DEVIANCE: CONFERENCE PROCEEDINGS,
2011,
:175-+
[28]
Assessing the Risks of Cyber Terrorism in Central Asian countries
[J].
COUNTERING TERRORIST RECRUITMENT IN THE CONTEXT OF ARMED COUNTER-TERRORISM OPERATIONS,
2016, 125
:102-106
[29]
A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia
[J].
INFORMATION SECURITY JOURNAL,
2015, 24 (1-3)
:15-23
[30]
Cyber Terrorism Taxonomies: Definition, Targets, Patterns and Mitigation Strategies
[J].
PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015),
2015,
:11-18