1 |
Confronting Apocalyptic Terrorism: Lessons from France and Japan |
Nilay Saiya
|
|
2 |
Catastrophe risk, insurance and terrorism |
Richard Ericson & Aaron Doyle
|
|
3 |
Automatic Gait Recognition and its Potential Role in Counterterrorism |
Joan Condell, ;Priyanka Chaurasia,; James Connolly, ;Patheepan Yogarajah, ; Girijesh Prasad & Rachel Monaghan
|
|
4 |
Urban Terror: The Case of Lone Wolf Peter Mangs |
Mattias Gardell
|
|
5 |
Cyber intelligence and international security: breaking the legal and diplomatic silence? |
Dennis Broeders
|
|
6 |
errorism, trauma, tolerance: Bearing witness to white supremacist attack on Muslims in Christchurch, New Zealand |
Tina Besley & Michael A. Peters
|
|
7 |
Network security – an updated perspective |
Gulshan Kumar & Krishan Kumar
|
|
8 |
Infrastructure Vulnerability Index of drinking water systems to terrorist attacks |
M. Maiolo & D. Pantusa |
|
|
9 |
Terrorism and Political Violence |
Michael Krona & Olivia Caskey
|
|
10 |
The Totalitarianism of Jihadist Islamism and its Challenge to Europe and to Islam |
Bassam Tibi
|
|
11 |
The challenges of military adaptation to the cyber domain: a case study of the Netherlands |
Max Smeets
|
|
12 |
The hegemony of Prevent: turning counter terrorism policing into common sense |
Amna Kaleem
|
|
13 |
Public opinion and alliance commitments in cybersecurity an attack against all? |
Miguel Alberto Gomez & Gregory Winger
|
|
14 |
Social Media Mechanisms for Right-Wing Political Violence in the 21st Century: Discursive Opportunities, Group Dynamics, and Co Ordination |
Mattias Wahlström & Anton Törnberg
|
|
15 |
Great power narratives on the challenges of cyber norm building |
Mischa Hansel
|
|
16 |
Governance of cyber warfare in the Netherlands: an exploratory investigation |
Alexander Claver
|
|
17 |
Islamophobia, Islamic dress and precarious bodies |
Kimberley Brayson
|
|
18 |
Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing |
Petar Radanliev
|
|
19 |
A US history of not conducting cyber attacks |
Max Smeets
|
|
20 |
Theorising the “suspect community”: counterterrorism, security practices and the public imagination |
Marie Breen-Smyth
|
|
21 |
Cyber campaigns and strategic outcomes |
Richard J. Harknett & Max Smeets
|
|
22 |
The role of cyber intelligence in policing cybercrime in South Africa: Insights from law enforcement officers |
Pieter Matsaung & David Tubatsi Masiloane
|
|
23 |
Cyber security of IP-based data communication network for power system operations |
Wai Shun Kwok & Cho Hoi Chek
|
|
24 |
Digital platforms, Hindutva, and disinformation: Communicative strategies and the Leicester violence |
Mohan J. Dutta
|
|
25 |
Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study |
Kousik Barik; Sanjay Misra;Karabi Konar;Luis Fernandez-Sanz & Murat Koyuncu
|
|
26 |
Protocol construction for preventing the cyber nuclear terrorism in the nuclear power plants (NPPs) using the nonlinear algorithm |
Kyung Bae Jang;Chang Hyun Baek & Tae Ho Woo
|
|
27 |
STEAM-Integrated Interfaith Learning Through Maker Education: A Framework for Innovative Religious Learning |
Rusmir Hosic,; Fadhlan Muchlas Abrori, ;Zsolt Lavicza, ;Houssam Kasti,; Tony Houghton & Eva Ulbrich
|
|
28 |
Impact of Factors Influencing Cyber Threats on Autonomous Vehicles |
A. Seetharaman;Nitin Patwa;Veena Jadhav;A. S. Saravanan & Dhivya Sangeeth
|
|
29 |
Cyber conflict short of war: a European strategic vacuum |
Tobias Liebetrau
|
|
30 |
Proxy Warfare and the Future of Conflict |
Andrew Mumford
|
|
31 |
The Cyber Dimension of the Russia–Ukraine War |
Marcus Willett
|
|
32 |
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand? |
Dennis Broeders; Els de Busser; Fabio Cristiano & Tatiana Tropina
|
|
33 |
The survivability of autonomous vessels from cyber-attacks |
Steve Symes;Eddie Blanco-Davis;Tony Graham;Jin Wang & Edward Shaw
|
|
34 |
Interfaith dialogue: seven key questions for theory, policy and practice |
Andrew Orton
|
|
35 |
Five Pillars of American Grand Strategy |
Paul D. Miller
|
|
36 |
Tolerance of high school students in an urban transition city: a study in Batu Cit |
Drajat Tri Kartono, ;Bagong Suyanto,; Rahma Sugihartati, ;M. Turhan Yani, ;Mun’im Sirry, ;TMun’im Sirry, ;Theofilus Apolinaris Suryadinata, ;Bakat Jati Prasetyo & Lutfi Andriani
|
|
37 |
Cyber risk and the changing role of insurance |
Mark Camillo
|
|
38 |
Policy measures and cyber insurance: a framework |
Daniel Woods & Andrew Simpson
|
|
39 |
‘Prophet Ibrahim’s faith and interfaith dialogue: a philosophical inquiry into religious epistemology’. |
Md. Delwar Husen
|
|
40 |
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services |
Ioannis Stellios;Kostas Mokos & Panayiotis Kotzanikolaou
|
|
41 |
Cybersecurity and cyber defence in the emerging democracies |
Carlos Solar
|
|
42 |
On market concentration and cybersecurity risk |
Dan Geer;Eric Jardine & Eireann Leverett
|
|
43 |
Cyber-Weapons |
Thomas Rid & Peter McBurney
|
|
44 |
Cyber-security governance framework pillars for Zimbabwean local authorities |
Brian Chundu;Tavengwa Masamha & Obert Sifile
|
|
45 |
Rising sun in the cyber domain: Japan’s strategic shift toward active cyber defense |
Dai Mochinaga
|
|
46 |
Unpacking Russia’s Cyber-Incident Response |
Roman Kolodii
|
|
47 |
Lesson from rote’s palm tree to unlock the global harmony |
Dewa Agung Gede Agung, ;Ulfatun Nafi’ah, ;Idris & Bayu Kurniawan
|
|
48 |
The hidden threat of cyber-attacks – undermining public confidence in government |
Ryan Shandler & Miguel Alberto Gomez
|
|
49 |
Like ticking time bombs. Improvising structural competency to ‘Defuse’ the exploding of violence against emergency care workers in Italy |
Mirko Pasquini
|
|
50 |
Cyber-attacks and the right of self-defense: a case study of the Netherlands |
Ferry Oorsprong;Paul Ducheine & Peter Pijpers
|
|