1,196
Views
8
CrossRef citations to date
0
Altmetric
Articles

Crossing the Rubicon: Understanding Cyber Terrorism in the European Context

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Donald Holbrook. (2015) A critical analysis of the role of the internet in the preparation and planning of acts of terrorism. Dynamics of Asymmetric Conflict 8:2, pages 121-133.
Read now

Articles from other publishers (7)

Chakkaphat Chamnanphan, Surapol Vorapatratorn, Khwunta Kirimasthong, Tossapon Boongoen & Natthakan Iam-On. (2023) Improvised Explosive Device Detection Using CNN With X-Ray Images. Journal of Advances in Information Technology 14:4, pages 674-684.
Crossref
Ferdinand J. HaberlFerdinand J. Haberl. 2023. Jihadi Intelligence and Counterintelligence. Jihadi Intelligence and Counterintelligence 289 309 .
Abhinav Juneja, Sapna Juneja, Vikram Bali, Vishal Jain & Hemant Upadhyay. 2021. The Smart Cyber Ecosystem for Sustainable Development. The Smart Cyber Ecosystem for Sustainable Development 431 441 .
Deniz TURAN & Eser GEMİCİ. (2020) Terörizmin Finansman Kaynakları ve Karapara Aklamanın Terörizmin Finansmanında ki Rolü. Anadolu Üniversitesi Sosyal Bilimler Dergisi 20:2, pages 257-278.
Crossref
Barry Cartwright, George R. S. Weir & Richard Frank. 2019. Security, Privacy, and Digital Forensics in the Cloud. Security, Privacy, and Digital Forensics in the Cloud 217 237 .
Kennedy E. Ehimwenma, Paul Crowther, Lyuba Alboul, Martin Beer & Kennedy J. Offor. (2018) An agent based approach for improvised explosive device detection, public alertness and safety. An agent based approach for improvised explosive device detection, public alertness and safety.
Steve S. Sin, Laura A. Blackerby, Elvis Asiamah & Rhyner Washburn. (2016) Determining extremist organisations' likelihood of conducting cyber attacks. Determining extremist organisations' likelihood of conducting cyber attacks.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.