About
Technology
Issues
FAQ
Title
Abstract
Text
Figure Captions
Table Cells
Section Titles
Keywords
Subjects
Authors
From
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1995
1990
1985
1980
1975
1970
1960
1950
1940
1930
1920
1910
1900
1850
1800
1700
1600
To
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1995
1990
1985
1980
1975
1970
1960
1950
1940
1930
1920
1910
1900
1850
1800
1700
1600
All Types
Articles
Communications
Reviews
Discussions
Case Reports
Chapters
Books
News
Editorials
Order By
Order By Year ASC
Order By Year DESC
Order By Citations ASC
Order By Citations DESC
Go
Scientometrics
Impact Factor
Discipline Ranks
H-Index
G-Index
Articles
Citations
Article Citations
Citation Distribution
Search This Journal
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
exaly
›
Journals
›
International Journal of Cyber Warfare and Terrorism
›
Top Articles
International Journal of Cyber Warfare and Terrorism
0.3
(top 25%)
Impact Factor
0.5
(top 25%)
extended IF
7
(top 31%)
H-Index
59
authors
195
papers
323
citations
95
citing journals
142
citing authors
Most Cited Articles of International Journal of Cyber Warfare and Terrorism
Title
Year
Citations
Estonia after the 2007 Cyber Attacks
2011
18
A Computer Network Attack Taxonomy and Ontology
2012
11
Why Risk-Research is More Prominent in English Speaking Countries in the Digital Society
2014
9
The Role of Human Operators' Suspicion in the Detection of Cyber Attacks
2015
8
The Triumph of Fear
2014
8
Toward Approaches to Big Data Analysis for Terroristic Behavior Identification: Child Soldiers in Illegal Armed Groups During the Conflict in the Donbas Region (East Ukraine)
2017
7
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks
2017
7
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict
2012
7
Misuse Detection for Mobile Devices Using Behaviour Profiling
2011
7
In Internet’s Way
2012
6
Stealing Consciousness
2014
6
Information Security Culture
2015
5
A Distributed IDS for Industrial Control Systems
2014
5
Protection of Australia in the Cyber Age
2011
5
A Framework for Cybersecurity Strategy Formation
2014
5
Cyber-Security for ICS/SCADA
2016
5
Cyber Terrorism and Self-Radicalization - Emergent Phenomena of Onlife Age
2019
5
Cyberpeacekeeping
2019
4
Clausewitz and the Utility of Cyberattacks in War
2014
4
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
2013
4
SCADA Threats in the Modern Airport
2013
4
World War III
2011
4
Towards the Human Information Security Firewall
2011
4
Incident and Disaster Management Training
2013
4
Slow Education and Cognitive Agility
2019
3
0
1
2
next
How are inpact factors calculated?
The impact factor (IF) is calculated by counting citations from peer-reviewed journals only.
extended IF
also counts citations from books and conference papers. However, no patent, abstract, working papers, online documents, etc., are covered.
site/software ©
exaly
; All materials licenced under
CC by-SA
.