References
Abuse of Internet for terrorist purposes In Vol. 63 Issue 3. Belgrade: Institute for International Politics and Economy, 2011.
New way of terrorism: Internet and cyber-terrorism In Vol. 6, No.4. Budapest: Miklos Zrinyi National Defence University, 2007.
The Use of Internet for Terrorist Purposes. New York: United Nations, United Nations Office on Drugs and Crime, 2012.
Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security." International Journal of Advanced Research in Computer Science and Software Engineering 5, no. 7 (2015): 680-6. "
International Terrorism. Los Angeles, 1975.
Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review. Hague: International Centre for Counter-Terrorism Research Paper, 2003.
Radicalization into Extremism and Terrorism." Intelligencer: Journal of U.S. Intelligence Studies 19, no. 2 (2012). "
Glossary and Abbreviations of Terms and Concepts Relating to Terrorism and Counter-Terrorism. London: Routledge, 2011.
The Internet as a Terrorist Tool to Recruit Youth. Arlington: Youth Recruitment & Radicalization Roundtable, 2009.
Recruitment and Mobilization for the Islamist Militant Movement in Europe. London: King’s College, 2007.
How ISIS Games Twitter., 2014.
The Terrorist’s Handbook., 2005.
The Mujahideen Poisons Handbook., 2004.
The Encyclopedia of Jihad." Faculty Publications and Presentations, Liberty University, 2001. "
The Sabotage Handbook., 2001.
Virtual Terrorism: How Modern Terrorism Uses the Internet." Journal of International Security Affairs (2007). "
The Use of Internet for Terrorist Purposes. New York: United Nations, United Nations Office on Drugs and Crime, 2012.
Cyber attack exposes 20,000 Israeli credit card numbers and details about users." New York Times. "