| 1 |
Confronting Apocalyptic Terrorism: Lessons from France and Japan |
Nilay Saiya
|
|
| 2 |
Catastrophe risk, insurance and terrorism |
Richard Ericson & Aaron Doyle
|
|
| 3 |
Automatic Gait Recognition and its Potential Role in Counterterrorism |
Joan Condell, ;Priyanka Chaurasia,; James Connolly, ;Patheepan Yogarajah, ; Girijesh Prasad & Rachel Monaghan
|
|
| 4 |
Urban Terror: The Case of Lone Wolf Peter Mangs |
Mattias Gardell
|
|
| 5 |
Cyber intelligence and international security: breaking the legal and diplomatic silence? |
Dennis Broeders
|
|
| 6 |
errorism, trauma, tolerance: Bearing witness to white supremacist attack on Muslims in Christchurch, New Zealand |
Tina Besley & Michael A. Peters
|
|
| 7 |
Network security – an updated perspective |
Gulshan Kumar & Krishan Kumar
|
|
| 8 |
Infrastructure Vulnerability Index of drinking water systems to terrorist attacks |
M. Maiolo & D. Pantusa |
|
|
| 9 |
Terrorism and Political Violence |
Michael Krona & Olivia Caskey
|
|
| 10 |
The Totalitarianism of Jihadist Islamism and its Challenge to Europe and to Islam |
Bassam Tibi
|
|
| 11 |
The challenges of military adaptation to the cyber domain: a case study of the Netherlands |
Max Smeets
|
|
| 12 |
The hegemony of Prevent: turning counter terrorism policing into common sense |
Amna Kaleem
|
|
| 13 |
Public opinion and alliance commitments in cybersecurity an attack against all? |
Miguel Alberto Gomez & Gregory Winger
|
|
| 14 |
Social Media Mechanisms for Right-Wing Political Violence in the 21st Century: Discursive Opportunities, Group Dynamics, and Co Ordination |
Mattias Wahlström & Anton Törnberg
|
|
| 15 |
Great power narratives on the challenges of cyber norm building |
Mischa Hansel
|
|
| 16 |
Governance of cyber warfare in the Netherlands: an exploratory investigation |
Alexander Claver
|
|
| 17 |
Islamophobia, Islamic dress and precarious bodies |
Kimberley Brayson
|
|
| 18 |
Cyber diplomacy: defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing |
Petar Radanliev
|
|
| 19 |
A US history of not conducting cyber attacks |
Max Smeets
|
|
| 20 |
Theorising the “suspect community”: counterterrorism, security practices and the public imagination |
Marie Breen-Smyth
|
|
| 21 |
Cyber campaigns and strategic outcomes |
Richard J. Harknett & Max Smeets
|
|
| 22 |
The role of cyber intelligence in policing cybercrime in South Africa: Insights from law enforcement officers |
Pieter Matsaung & David Tubatsi Masiloane
|
|
| 23 |
Cyber security of IP-based data communication network for power system operations |
Wai Shun Kwok & Cho Hoi Chek
|
|
| 24 |
Digital platforms, Hindutva, and disinformation: Communicative strategies and the Leicester violence |
Mohan J. Dutta
|
|
| 25 |
Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study |
Kousik Barik; Sanjay Misra;Karabi Konar;Luis Fernandez-Sanz & Murat Koyuncu
|
|
| 26 |
Protocol construction for preventing the cyber nuclear terrorism in the nuclear power plants (NPPs) using the nonlinear algorithm |
Kyung Bae Jang;Chang Hyun Baek & Tae Ho Woo
|
|
| 27 |
STEAM-Integrated Interfaith Learning Through Maker Education: A Framework for Innovative Religious Learning |
Rusmir Hosic,; Fadhlan Muchlas Abrori, ;Zsolt Lavicza, ;Houssam Kasti,; Tony Houghton & Eva Ulbrich
|
|
| 28 |
Impact of Factors Influencing Cyber Threats on Autonomous Vehicles |
A. Seetharaman;Nitin Patwa;Veena Jadhav;A. S. Saravanan & Dhivya Sangeeth
|
|
| 29 |
Cyber conflict short of war: a European strategic vacuum |
Tobias Liebetrau
|
|
| 30 |
Proxy Warfare and the Future of Conflict |
Andrew Mumford
|
|
| 31 |
The Cyber Dimension of the Russia–Ukraine War |
Marcus Willett
|
|
| 32 |
Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand? |
Dennis Broeders; Els de Busser; Fabio Cristiano & Tatiana Tropina
|
|
| 33 |
The survivability of autonomous vessels from cyber-attacks |
Steve Symes;Eddie Blanco-Davis;Tony Graham;Jin Wang & Edward Shaw
|
|
| 34 |
Interfaith dialogue: seven key questions for theory, policy and practice |
Andrew Orton
|
|
| 35 |
Five Pillars of American Grand Strategy |
Paul D. Miller
|
|
| 36 |
Tolerance of high school students in an urban transition city: a study in Batu Cit |
Drajat Tri Kartono, ;Bagong Suyanto,; Rahma Sugihartati, ;M. Turhan Yani, ;Mun’im Sirry, ;TMun’im Sirry, ;Theofilus Apolinaris Suryadinata, ;Bakat Jati Prasetyo & Lutfi Andriani
|
|
| 37 |
Cyber risk and the changing role of insurance |
Mark Camillo
|
|
| 38 |
Policy measures and cyber insurance: a framework |
Daniel Woods & Andrew Simpson
|
|
| 39 |
‘Prophet Ibrahim’s faith and interfaith dialogue: a philosophical inquiry into religious epistemology’. |
Md. Delwar Husen
|
|
| 40 |
Assessing smart light enabled cyber-physical attack paths on urban infrastructures and services |
Ioannis Stellios;Kostas Mokos & Panayiotis Kotzanikolaou
|
|
| 41 |
Cybersecurity and cyber defence in the emerging democracies |
Carlos Solar
|
|
| 42 |
On market concentration and cybersecurity risk |
Dan Geer;Eric Jardine & Eireann Leverett
|
|
| 43 |
Cyber-Weapons |
Thomas Rid & Peter McBurney
|
|
| 44 |
Cyber-security governance framework pillars for Zimbabwean local authorities |
Brian Chundu;Tavengwa Masamha & Obert Sifile
|
|
| 45 |
Rising sun in the cyber domain: Japan’s strategic shift toward active cyber defense |
Dai Mochinaga
|
|
| 46 |
Unpacking Russia’s Cyber-Incident Response |
Roman Kolodii
|
|
| 47 |
Lesson from rote’s palm tree to unlock the global harmony |
Dewa Agung Gede Agung, ;Ulfatun Nafi’ah, ;Idris & Bayu Kurniawan
|
|
| 48 |
The hidden threat of cyber-attacks – undermining public confidence in government |
Ryan Shandler & Miguel Alberto Gomez
|
|
| 49 |
Like ticking time bombs. Improvising structural competency to ‘Defuse’ the exploding of violence against emergency care workers in Italy |
Mirko Pasquini
|
|
| 50 |
Cyber-attacks and the right of self-defense: a case study of the Netherlands |
Ferry Oorsprong;Paul Ducheine & Peter Pijpers
|
|