Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework
暂无分享,去创建一个
[1] Maura Conway,et al. Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet , 2002, First Monday.
[2] Richard Ford,et al. Cyberterrorism? , 2002, Comput. Secur..
[3] Hsinchun Chen,et al. Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[4] N Veerasamy. Towards a Conceptual Framework for Cyber-terrorism , 2009 .
[5] Matthew Warren. Terrorism and the Internet , 2007 .
[6] James A. Lewis. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats , 2002 .