Articles/Publications Repository LIST

Sr # Articles/Publications Repository LIST Published By Piblished By
1 Confronting Apocalyptic Terrorism: Lessons from France and Japan Nilay Saiya
2 Catastrophe risk, insurance and terrorism Richard Ericson & Aaron Doyle
3 Automatic Gait Recognition and its Potential Role in Counterterrorism Joan Condell, ;Priyanka Chaurasia,; James Connolly, ;Patheepan Yogarajah, ; Girijesh Prasad & Rachel Monaghan
4 Urban Terror: The Case of Lone Wolf Peter Mangs Mattias Gardell
5 Cyber intelligence and international security: breaking the legal and diplomatic silence? Dennis Broeders
6 errorism, trauma, tolerance: Bearing witness to white supremacist attack on Muslims in Christchurch, New Zealand Tina Besley & Michael A. Peters
7 Network security – an updated perspective Gulshan Kumar & Krishan Kumar
8 Infrastructure Vulnerability Index of drinking water systems to terrorist attacks M. Maiolo & D. Pantusa |
9 Terrorism and Political Violence Michael Krona & Olivia Caskey
10 The Totalitarianism of Jihadist Islamism and its Challenge to Europe and to Islam Bassam Tibi
11 The challenges of military adaptation to the cyber domain: a case study of the Netherlands Max Smeets
12 The hegemony of Prevent: turning counter terrorism policing into common sense Amna Kaleem
13 Public opinion and alliance commitments in cybersecurity an attack against all? Miguel Alberto Gomez & Gregory Winger
14 Social Media Mechanisms for Right-Wing Political Violence in the 21st Century: Discursive Opportunities, Group Dynamics, and Co Ordination Mattias Wahlström & Anton Törnberg
15 Great power narratives on the challenges of cyber norm building Mischa Hansel
16 Governance of cyber warfare in the Netherlands: an exploratory investigation Alexander Claver
17 Islamophobia, Islamic dress and precarious bodies Kimberley Brayson
18 Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing Petar Radanliev
19 A US history of not conducting cyber attacks Max Smeets
20 Theorising the “suspect community”: counterterrorism, security practices and the public imagination Marie Breen-Smyth
21 Cyber campaigns and strategic outcomes Richard J. Harknett & Max Smeets
22 The role of cyber intelligence in policing cybercrime in South Africa: Insights from law enforcement officers Pieter Matsaung & David Tubatsi Masiloane
23 Cyber security of IP-based data communication network for power system operations Wai Shun Kwok & Cho Hoi Chek
24 Digital platforms, Hindutva, and disinformation: Communicative strategies and the Leicester violence Mohan J. Dutta
25 Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study Kousik Barik; Sanjay Misra;Karabi Konar;Luis Fernandez-Sanz & Murat Koyuncu
26 Protocol construction for preventing the cyber nuclear terrorism in the nuclear power plants (NPPs) using the nonlinear algorithm Kyung Bae Jang;Chang Hyun Baek & Tae Ho Woo
27 STEAM-Integrated Interfaith Learning Through Maker Education: A Framework for Innovative Religious Learning Rusmir Hosic,; Fadhlan Muchlas Abrori, ;Zsolt Lavicza, ;Houssam Kasti,; Tony Houghton & Eva Ulbrich
28 Impact of Factors Influencing Cyber Threats on Autonomous Vehicles A. Seetharaman;Nitin Patwa;Veena Jadhav;A. S. Saravanan & Dhivya Sangeeth
29 Cyber conflict short of war: a European strategic vacuum Tobias Liebetrau
30 Proxy Warfare and the Future of Conflict Andrew Mumford
31 The Cyber Dimension of the Russia–Ukraine War Marcus Willett
32 Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand? Dennis Broeders; Els de Busser; Fabio Cristiano & Tatiana Tropina
33 The survivability of autonomous vessels from cyber-attacks Steve Symes;Eddie Blanco-Davis;Tony Graham;Jin Wang & Edward Shaw
34 Interfaith dialogue: seven key questions for theory, policy and practice Andrew Orton
35 Five Pillars of American Grand Strategy Paul D. Miller
36 Tolerance of high school students in an urban transition city: a study in Batu Cit Drajat Tri Kartono, ;Bagong Suyanto,; Rahma Sugihartati, ;M. Turhan Yani, ;Mun’im Sirry, ;TMun’im Sirry, ;Theofilus Apolinaris Suryadinata, ;Bakat Jati Prasetyo & Lutfi Andriani
37 Cyber risk and the changing role of insurance Mark Camillo
38 Policy measures and cyber insurance: a framework Daniel Woods & Andrew Simpson
39 ‘Prophet Ibrahim’s faith and interfaith dialogue: a philosophical inquiry into religious epistemology’. Md. Delwar Husen
40 Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services Ioannis Stellios;Kostas Mokos & Panayiotis Kotzanikolaou
41 Cybersecurity and cyber defence in the emerging democracies Carlos Solar
42 On market concentration and cybersecurity risk Dan Geer;Eric Jardine & Eireann Leverett
43 Cyber-Weapons Thomas Rid & Peter McBurney
44 Cyber-security governance framework pillars for Zimbabwean local authorities Brian Chundu;Tavengwa Masamha & Obert Sifile
45 Rising sun in the cyber domain: Japan’s strategic shift toward active cyber defense Dai Mochinaga
46 Unpacking Russia’s Cyber-Incident Response Roman Kolodii
47 Lesson from rote’s palm tree to unlock the global harmony Dewa Agung Gede Agung, ;Ulfatun Nafi’ah, ;Idris & Bayu Kurniawan
48 The hidden threat of cyber-attacks – undermining public confidence in government Ryan Shandler & Miguel Alberto Gomez
49 Like ticking time bombs. Improvising structural competency to ‘Defuse’ the exploding of violence against emergency care workers in Italy Mirko Pasquini
50 Cyber-attacks and the right of self-defense: a case study of the Netherlands Ferry Oorsprong;Paul Ducheine & Peter Pijpers