Free database of papers and journals






Results 21 to 40 of 778 articles found
2011

Taming the cyber frontier

Computer Fraud & Security (1.1 26), 2011, 5-9.
2010

Cyber Weapons Convention

Computer Law and Security Report (2.5 40★★), 26, 547-551.
2004

Cyber Criminals on Trial

CJM (13), 58, 22-23.
2020

Cyberbullying and cyber-mobbing

Informatologia (0.2 2), 53, 140-156.
1996

Cyber crime: the US experience

1996

US fights cyber terrorism

Computer Fraud & Security (1.1 26), 1996, 2.
2000

Training for Cyber-War

Computer Fraud & Security (1.1 26), 2000, 14-15.
1999

Cyber-crime the US experience

Computers & Security (4.4 89), 18, 16-18.
2012

Insuring cyber-assets

Computer Fraud & Security (1.1 26), 2012, 5-8.
2017

Insuring against cyber-attacks

Computer Fraud & Security (1.1 26), 2017, 18-20.
1998

Cyber Wars and other threats

Computers & Security (4.4 89), 17, 115-118.
2017

Sovereignty in the Age of Cyber

AJIL Unbound (0.8 15), 111, 207-212.
2016

The hazards of cyber-vigilantism

Computer Law and Security Report (2.5 40★★), 32, 642-649.
2012

Classification of Cyber Conflict

Journal of Conflict and Security Law (0.2 25), 17, 245-260.
2014

Correspondence: A Cyber Disagreement

International Security (5.8 124★★), 39, 181-192.
2018

The rise of the cyber insider

Computer Fraud & Security (1.1 26), 2018, 20.
2016

In Cyber (Governance) We Trust

Global Policy (1.6 39), 7, 79-82.
2013

Iran under cyber-attack – or not

Computer Fraud & Security (1.1 26), 2013, 20.
2003

Cyber-terrorism in context

Computers & Security (4.4 89), 22, 188-192.
2019

Is Cyber Strategy Possible?

The Washington Quarterly (0.9 40), 42, 131-152.
Anatomy of Results
The left numbers are the publication year, and the number of citations (hyperlink to the full citation report of the paper)
paranthesis after the journal provides its impact factor.
paranthesis after the author indicates the number of publications and Author's Impact Factor
EXALY
Authors
Journals
Institutions