Journal articles on the topic 'Jihadist cyber'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 journal articles for your research on the topic 'Jihadist cyber.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Brandea, Bianca. "Implications of the jihadist terrorism in cyberspace." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (2024): 157–65. http://dx.doi.org/10.53477/2284-9378-24-10.
Full textBalogh, Péter. "Jihadist war or a challenge of disintegration?" Belvedere Meridionale 31, no. 4 (2019): 233–50. http://dx.doi.org/10.14232/belv.2019.4.17.
Full textGarcía Català, Maria Teresa. "Big Data Analysis of the #BringBackOurGirls Cyber-Campaign." Debats. Revista de cultura, poder i societat 5 (December 30, 2020): 261–70. http://dx.doi.org/10.28939/iam.debats-en.2020-15.
Full textMozid, Ashraful, and Nelufer Yesmen. "Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review." Journal of Advanced Forensic Sciences 1, no. 1 (2020): 1–9. http://dx.doi.org/10.14302/issn.2692-5915.jafs-20-3204.
Full textFenton, Adam James. "Preventing Catastrophic Cyber–Physical Attacks on the Global Maritime Transportation System: A Case Study of Hybrid Maritime Security in the Straits of Malacca and Singapore." Journal of Marine Science and Engineering 12, no. 3 (2024): 510. http://dx.doi.org/10.3390/jmse12030510.
Full textMbugua, Charles, Sammy Mang'eli, and Mary Ragui. "Mentoring: A Faith Based Relational Leadership Approach in Preventing and Countering Violent Extremism in Kenya." International Journal for Innovation Education and Research 7, no. 11 (2019): 1208–24. http://dx.doi.org/10.31686/ijier.vol7.iss11.1990.
Full textStewart, Garrett. "Open-Circuit Narrative: Programmed Reading in Richard Powers." Novel 55, no. 3 (2022): 547–65. http://dx.doi.org/10.1215/00295132-10007583.
Full textAntinori, Arije. "L'evoluzione jihadista (cyber-)globalizzata." SICUREZZA E SCIENZE SOCIALI, no. 2 (December 2017): 33–51. http://dx.doi.org/10.3280/siss2017-002004.
Full textKim, Eunyoung. "Cognitive warfare, game and visual images: ISIS Jihadists narratives analyses." Korean Association of Criminal Psychology 19, no. 3 (2023): 7–24. http://dx.doi.org/10.25277/kcpr.2023.19.3.7.
Full textZdravkovski, Aleksander. "Cyber sheiks and grassroots jihadis: the war in Syria and the devolution of the Bosnian Salafi communities." Small Wars & Insurgencies 29, no. 5-6 (2018): 941–63. http://dx.doi.org/10.1080/09592318.2018.1519306.
Full textFinlayson, Mark. "Corpus Annotation in Service of Intelligent Narrative Technologies." Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 7, no. 2 (2011): 17–20. http://dx.doi.org/10.1609/aiide.v7i2.12459.
Full textJabbarinasir, H. "Cooperation Between Iran and Russia in the Fight Against International Terrorism: the Current State, Opportunities and Prospects." World Economy and International Relations 67, no. 1 (2023): 90–100. http://dx.doi.org/10.20542/0131-2227-2023-67-1-90-100.
Full textKhokhlov, N., A. Vasiliev, A. Belichenko, P. Kirdyankina, and A. Korotayev. "Echo of Arab Spring in Western Europe." International Trends / Mezhdunarodnye protsessy 19, no. 2 (2021): 21–49. http://dx.doi.org/10.17994/it.2021.19.2.65.7.
Full textAnzalone, Christopher. "Salafism in Nigeria: Islam, Preaching, and Politics." American Journal of Islamic Social Sciences 35, no. 3 (2018): 98–103. http://dx.doi.org/10.35632/ajiss.v35i3.489.
Full textAnzalone, Christopher. "Salafism in Nigeria: Islam, Preaching, and Politics." American Journal of Islam and Society 35, no. 3 (2018): 98–103. http://dx.doi.org/10.35632/ajis.v35i3.489.
Full textالأردن, مكتب المعهد في. "عروض مختصرة". الفكر الإسلامي المعاصر (إسلامية المعرفة سابقا) 8, № 29 (2002): 158–47. http://dx.doi.org/10.35632/citj.v8i29.2847.
Full text"Aspects of Counterterrorism: New Approaches to Countering Terrorism: Designing and Evaluating Counter-Radicalization and De-Radicalization Programs; Hacking ISIS: How to Destroy the Cyber Jihad; Inside Al-Shabaab: The Secret History of Al-Qaeda’s Most Powerful Ally." International Dialogue 10, no. 1 (2020). http://dx.doi.org/10.32873/uno.dc.id.10.1.1178.
Full textBelkacem, Iratni. "The Evolution Of Terrorism In The Middle East From Jihadists To Cyber Criminals." المجلة الجزائرية للعلوم الاجتماعية والانسانية, 2020, 439. http://dx.doi.org/10.52125/2237-008-001-023.
Full text