Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cyberterrorism

Known as: Cyber-terrorist, Cyber-terrorism/Archive1, Cyber terrorism 
Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Because malicious intrusions into critical information infrastructures are essential to the success of cyberterrorists, effective… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Abstract: Research indicates that two major forms of partner violence exist, intimate terrorism (IT) and situational couple… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Cyberterrorism conjures up images of vicious terrorists unleashing catastrophic attacks against computer networks, wreaking havoc… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Most requirements engineers are poorly trained to elicit, analyze, and specify security requirements, often confusing them with… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
tion of violence or threatened violence intended to sow panic in a society, to weaken or even overthrow the incumbents, and to… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Cyber attacks, network security and information pose complex problems that reach into new areas for national security and public… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The pervasive and ubiquitous nature of the Internet coupled with growing concerns about cyber terrorism demand immediate… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?