Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,954,789 papers from all fields of science
Search
Sign In
Create Free Account
Cyberterrorism
Known as:
Cyber-terrorist
, Cyber-terrorism/Archive1
, Cyber terrorism
Expand
Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
.hack
Computer security
Cybercrime
Cybergeddon
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Detection of botnet by analyzing network traffic flow characteristics using open source tools
K. Shanthi
,
D. Seenivasan
IEEE 9th International Conference on Intelligent…
2015
Corpus ID: 18219303
Botnets are emerging as the most serious cyber threat among different forms of malware. Today botnets have been facilitating to…
Expand
Review
2013
Review
2013
Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model
Liying Zhang
,
Lun Xie
,
Weize Li
,
Zhiliang Wang
2013
Corpus ID: 17972132
Compared with the conventional control systems, networked control systems (NCSs) are more open to the external network. As a…
Expand
2013
2013
Atoms for Terror? Nuclear Programs and Non-Catastrophic Nuclear and Radiological Terrorism
B. Early
,
M. Fuhrmann
,
Quan Li
2013
Corpus ID: 51749851
Bryan R. Early, Matthew Fuhrmann and Quan Li British Journal of Political Science / FirstView Article / March 2013, pp 1 22 DOI…
Expand
Review
2012
Review
2012
Understanding Cyber Threats and Vulnerabilities
E. Luiijf
Critical Infrastructure Protection
2012
Corpus ID: 30088438
This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical…
Expand
2009
2009
The Cyber Threat to National Critical Infrastructures: Beyond Theory
Kenneth Geers
Information Security Journal
2009
Corpus ID: 9844391
ABSTRACT Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
2005
2005
Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection
Srinivas Mukkamala
,
A. Sung
2005
Corpus ID: 60820578
Due to increasing incidence of cyber attacks and heightened concerns for cyber terrorism, implementing effective intrusion…
Expand
Review
2004
Review
2004
Cyberterrorism, computer crime, and reality
C. Foltz
Information Management & Computer Security
2004
Corpus ID: 206380162
The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively…
Expand
2003
2003
Hackers as terrorists? why it doesn't compute
Maura Conway
2003
Corpus ID: 264253282
1999
1999
The Likelihood of Nuclear Terrorism
G. Cameron
1999
Corpus ID: 53136424
The implications of the increased opportunity to proliferate arising from the collapse of the Soviet Union are far from clear…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE