Amanote Research

Amanote Research

    RegisterSign In

Combating Cyber Terrorism-Assessment of Log for Malicious Signatures

American Journal of Applied Sciences - United States
doi 10.3844/ajassp.2013.1660.1666
Full Text
Open PDF
Abstract

Available in full text

Categories
Multidisciplinary
Date

December 1, 2013

Authors

Unknown

Publisher

Science Publications


Related search

Policing Cyber Terrorism

Journal of Cybersecurity Research (JCR)
2018English

Islamic Jihad: Sectarian Factors in Combating Terrorism

2015English

A Framework for Cyber War Against International Terrorism

International Journal of Internet Technology and Secured Transactions
Computer NetworksComputer Science ApplicationsCommunications
2011English

Challenges in Combating the Cyber Crime

Mediterranean Journal of Social Sciences
2014English

Blockchain Technology in Countering Cyber Terrorism

Actual Problems of Russian Law
2019English

International Journal of Cyber Warfare and Terrorism

International Journal of Cyber Warfare and Terrorism
Information SystemsRiskComputer NetworksHardwareCommunicationsManagementSafetyArchitectureReliabilitySafety ResearchQualitySoftware
English

Criminal Policy in the System of Combating Female Terrorism

Bulletin of the L.N.Gumilyov Eurasian National University
2018English

Combating Violent Extremism in Africa: Terrorism and Piracy

African Security
Safety ResearchInternational RelationsPolitical Science
2019English

Unabated Cyber Terrorism and Human Security in Nigeria

Asian Social Science
ArtsFinanceHumanitiesEconomicsEconometricsSocial Sciences
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy