Free database of papers and journals






Results 1 to 20 of 778 articles found
2009

What (cyber)reading for the (cyber)classroom?

Neohelicon (0.1 14), 36, 533-550.
2012

Cyber Security without Cyber War

Journal of Conflict and Security Law (0.2 25), 17, 187-209.
2012

Inside Cyber Warfare: Mapping the Cyber Underworld

Computers & Security (4.4 89), 31, 801.
2021

Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic

Computers & Security (4.4 89), 105, 102248.
2000

Cyber-Race

Harvard Law Review (90★★), 113, 1130.
2007

Cyber law

Computer Law and Security Report (2.5 40★★), 23, 86.
2019

Cyber Trust

Journal of Business Ethics (5.6 224★★), 156, 1-13.
2012

Cyber Attacks

Computers & Security (4.4 89), 31, 251.
2002

Cyber-Arbitration

European Business Organization Law Review (1.4 24★★), 3, 611-628.
2016

Beyond the Castle Model of cyber-risk and cyber-security

Government Information Quarterly (6.8 107★★), 33, 250-257.
2007

Evaluation of cyber legislations: trading in the global cyber village

Aviation cyber security: legal aspects of cyber threats

2012

Cyber pornography in India and its implication on cyber café operators

Computer Law and Security Report (2.5 40★★), 28, 69-76.
2012

Definitional constructs of cyber‐bullying and cyber‐aggression from a triangulatory overview: a preliminary study into elements of cyber‐bullying

1999

Fraud on the Revenue: Emerging Cyber Cash, Cyber Banks and Fraud

Journal of Financial Crime (1 27), 7, 75-78.
2013

Active cyber defense with denial and deception: A cyber-wargame experiment

Computers & Security (4.4 89), 37, 72-77.
2020

Exploring the Needs of Victims of Cyber-dependent and Cyber-enabled Crimes

Victims & Offenders (1.4 30), 15, 60-77.
2017

A cyber SIOP? Operational considerations for strategic offensive cyber planning

2014

[Editorial] Cyber-privacy or cyber-surveillance? Legal responses to fear in cyberspace

2018

Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge

IEEE Security & Privacy (1.8 66), 16, 42-51.
Anatomy of Results
The left numbers are the publication year, and the number of citations (hyperlink to the full citation report of the paper)
paranthesis after the journal provides its impact factor.
paranthesis after the author indicates the number of publications and Author's Impact Factor
EXALY
Authors
Journals
Institutions