-
1
-
-
84899275512
-
-
Retrieved March 18, 2008, from
-
Almeida, M. (2008). Statistics report 2005-2007, March 5, 2008. Retrieved March 18, 2008, from www.zone-h.org
-
(2008)
Statistics Report 2005-2007, March 5, 2008
-
-
Almeida, M.1
-
2
-
-
84899404315
-
Cyberspace as a combat zone: The phenomenon of electronic jihad
-
The Middle East Media Research Institute, February 7
-
Alshech, E. (2007). Cyberspace as a combat zone: The phenomenon of electronic jihad. MEMRI Inquiry and Analysis Series, 329. The Middle East Media Research Institute, February 7.
-
(2007)
MEMRI Inquiry and Analysis Series
, vol.329
-
-
Alshech, E.1
-
3
-
-
34248236985
-
Cyberwar is coming!
-
doi:10.1080/01495939308402915
-
Arguilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12, 141-165. doi:10.1080/01495939308402915
-
(1993)
Comparative Strategy
, vol.12
, pp. 141-165
-
-
Arguilla, J.1
Ronfeldt, D.2
-
5
-
-
84899377491
-
-
Retrieved June 30, 2008, from
-
As-Salim, M. (2003) 39 Ways to serve and participate in jihâd. Retrieved June 30, 2008, from http://tibyan.wordpress.com/2007/08/24/39ways-to-serve-and-participate-in-jihad/.
-
(2003)
39 Ways to Serve and Participate in Jihâd
-
-
As-Salim, M.1
-
6
-
-
84899293954
-
-
ATC, Anti-TerrorismCoalition
-
ATC. (2004). ATC's OBL crew investigation. Anti-TerrorismCoalition.
-
(2004)
ATC's OBL Crew Investigation
-
-
-
7
-
-
84899351525
-
-
Attrition, Retrieved 1996 from
-
Attrition. (1996). Attrition mirror. Retrieved 1996 from http://attrition.org/mirror/attrition/1996.html#dec
-
(1996)
Attrition Mirror
-
-
-
9
-
-
69849123189
-
Web war I: Is Europe's first information war a new kind of war?
-
doi:10.1080/01495930802185312
-
Blank, S. (2008). Web war I: Is Europe's first information war a new kind of war? Comparative Strategy, 27, 227-247. doi:10.1080/01495930802185312
-
(2008)
Comparative Strategy
, vol.27
, pp. 227-247
-
-
Blank, S.1
-
10
-
-
84899316667
-
-
Cartoon, Retrieved April 21, 2009, from
-
Cartoon. (2006). Cartoon body count. Retrieved April 21, 2009, from http://web.archive.org/web/20060326071135/http://www.cartoonbodycount.com/
-
(2006)
Cartoon Body Count
-
-
-
12
-
-
77955869553
-
Kremlin-backed group behind Estonia cyber blitz
-
(March)
-
Clover, C. (2009). Kremlin-backed group behind Estonia cyber blitz. Financial Times (North American Edition), (March): 11.
-
(2009)
Financial Times (North American Edition)
, pp. 11
-
-
Clover, C.1
-
13
-
-
84899189412
-
Email attack on Sri Lanka computers
-
CSI
-
CSI. (1998). Email attack on Sri Lanka computers. Computer Security Alert, 183, 8.
-
(1998)
Computer Security Alert
, vol.183
, pp. 8
-
-
-
14
-
-
84899267355
-
-
Retrieved September, 2007, from
-
Davis, J. (2007). Web war one. Retrieved September, 2007, from http://www.wired.com/images/press/pdf/webwarone.pdf
-
(2007)
Web War One
-
-
Davis, J.1
-
16
-
-
0242440508
-
Activism, hacktivism, and cyberterrorism
-
In Arquilla, J., & Ronfeldt, D. (Eds.), Santa Monica, CA: RAND
-
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism. In Arquilla, J., & Ronfeldt, D. (Eds.), Networks and netwars (pp. 239-288). Santa Monica, CA: RAND.
-
(2001)
Networks and Netwars
, pp. 239-288
-
-
Denning, D.E.1
-
17
-
-
84899267393
-
-
Retrieved October 7, 1999, from
-
Drogin, B. (1999). Russians seem to be hacking into Pentagon. Retrieved October 7, 1999, from http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/1999/10/07/MN58558.DTL
-
(1999)
Russians Seem to be Hacking into Pentagon
-
-
Drogin, B.1
-
18
-
-
84899399690
-
-
EDT, Retrieved December 17, 2008, from
-
EDT. (2008). EDT. Retrieved December 17, 2008, from http://www.thing.net/~rdom/ecd/ecd.html
-
(2008)
EDT
-
-
-
20
-
-
77957915837
-
How China will use cyber warfare to leapfrog in military competitiveness
-
Retrieved 2008 from
-
Fritz, J. (2008). How China will use cyber warfare to leapfrog in military competitiveness. Culture Mandala, 8(1), 28-80. Retrieved 2008 from http://epublications.bond.edu.au/cm/vol8/iss1/2/
-
(2008)
Culture Mandala
, vol.8
, Issue.1
, pp. 28-80
-
-
Fritz, J.1
-
21
-
-
84899311010
-
-
Georgia Update, Retrieved October 9, 2008, from
-
Georgia Update. (2008). Russian invasion of Georgia. Retrieved October 9, 2008, from www.georgiaupdate.gov.ge
-
(2008)
Russian Invasion of Georgia
-
-
-
22
-
-
84899273205
-
-
Retrieved September 26, 2001, from
-
Graham, J. (2001). Hackers strike Middle Eastern sites. Retrieved September 26, 2001, from http://www.usatoday.com/tech/news/2001/09/19/hack-attack-launched.htm
-
(2001)
Hackers Strike Middle Eastern Sites
-
-
Graham, J.1
-
24
-
-
84899239671
-
What about Estonia? A social psychological analysis of the first Internet war
-
(in press)
-
Guadagno, R. E., Cialdini, R. B., & Evron, G. (2009). (in press). What about Estonia? A social psychological analysis of the first Internet war. Cyberpsychology & Behavior.
-
(2009)
Cyberpsychology & Behavior
-
-
Guadagno, R.E.1
Cialdini, R.B.2
Evron, G.3
-
25
-
-
84899386249
-
-
Retrieved August 24, 2005, from
-
Hall, A. (2005). Al-Qaeda chiefs reveal world domination design. Retrieved August 24, 2005, from http://www.theage.com.au/news/war-on-terror/alqaeda-chiefs-reveal-world-domination-design/2005/08/23/1124562861654.html
-
(2005)
Al-Qaeda Chiefs Reveal World Domination Design
-
-
Hall, A.1
-
29
-
-
84899277390
-
-
iDefense, Fairfax, VA, Intelligence Services Report
-
iDefense. (2001a). Israeli-Palestinian cyber conflict. Fairfax, VA: Intelligence Services Report.
-
(2001)
Israeli-Palestinian Cyber Conflict
-
-
-
30
-
-
84899161025
-
-
iDefense, Fairfax, VA: Intelligence Operations Whitepaper
-
iDefense. (2001b). US-China cyber skirmish of April-May 2001. Fairfax, VA: Intelligence Operations Whitepaper.
-
(2001)
US-China Cyber Skirmish of April-May 2001
-
-
-
31
-
-
84899309002
-
-
Internet Haganah, February 7. Retrieved October 21, 2008, from
-
Internet Haganah. (2006). How the brothers attacked the website of Jyllands-Posten. February 7. Retrieved October 21, 2008, from http://internethaganah.com/harchives/005456.html
-
(2006)
How the Brothers Attacked the Website of Jyllands-Posten
-
-
-
32
-
-
84899172515
-
-
Jamestown, Retrieved March 5, 2008, from
-
Jamestown. (2008). Hacking manual by jailed jihadi appears on web. Retrieved March 5, 2008, from http://www.jamestown.org/programs/gta/single/?tx_ttnews%5Btt_news%5D=4763&tx_ttnews%5BbackPid%5D=246&no_cache=1
-
(2008)
Hacking Manual by Jailed Jihadi Appears on Web
-
-
-
33
-
-
75249106370
-
-
Retrieved January 28, 2009, from
-
Keizer, G. (2009). Russian 'cybermilitia' knocks Kyrgyzstan offline. Retrieved January 28, 2009, from http://www.computerworld.com/s/article/9126947/Russian_cybermilitia_knocks_Kyrgyzstan_offline
-
(2009)
Russian 'cybermilitia' Knocks Kyrgyzstan Offline
-
-
Keizer, G.1
-
34
-
-
84899245165
-
-
Retrieved October 22, 1999, from
-
Knight, W. (1999). Jam Echelon day descends into spam farce. Retrieved October 22, 1999, from http://news.zdnet.co.uk/emergingtech/0,1000000183,2074601,00.htm
-
(1999)
Jam Echelon Day Descends into Spam Farce
-
-
Knight, W.1
-
38
-
-
84899355487
-
-
Make Love Not Spam, Retrieved April 3, 2009, from
-
Make Love Not Spam. (2004). Make Love Not Spam. Retrieved April 3, 2009, from http://www.makelovenotspam.com/
-
(2004)
Make Love Not Spam
-
-
-
45
-
-
84899206961
-
-
Retrieved August 21, 2006, from
-
Onley, D. S., & Wait, P. (2006). Red storm rising. Retrieved August 21, 2006, from http://www.gcn.com/Articles/2006/08/17/Red-storm-rising.aspx
-
(2006)
Red Storm Rising
-
-
Onley, D.S.1
Wait, P.2
-
54
-
-
0004137326
-
-
2nd ed., New York, Thunder's Mouth Press
-
Schwartau, W. (1996). Information warfare (2nd ed.). New York: Thunder's Mouth Press.
-
(1996)
Information Warfare
-
-
Schwartau, W.1
-
55
-
-
84899232222
-
-
Retrieved December 22, 2009, from
-
Ulph, S. (2006). Internet mujahideen refine electronic warfare tactics. Retrieved December 22, 2009, from http://www.jamestown.org/programs/gta/single/?tx_ttnews%5Btt_news%5D=666&tx_ttnews%5BbackPid%5D=239&no_cache=1
-
(2006)
Internet Mujahideen Refine Electronic Warfare Tactics
-
-
Ulph, S.1
-
56
-
-
84873822978
-
Cyber terrorism and information warfare: Government perspectives
-
In Alexander, Y., & Swetnam, M. S. (Eds.)
-
Vatis, M. (2001). Cyber terrorism and information warfare: Government perspectives. In Alexander, Y., & Swetnam, M. S. (Eds.), Cyber terrorism and information warfare. Ardsley: Transnational Publishers, Inc.
-
(2001)
Cyber Terrorism and Information Warfare. Ardsley: Transnational Publishers, Inc
-
-
Vatis, M.1
|