International Journal of Cyber Warfare and Terrorism
Published by IGI Global Publishing
ISSN : 1947-3435 eISSN : 1947-3443
Abbreviation : Int. J. Cyber Warf. Terror.
Aims & Scope
The mission of the International Journal of Cyber Warfare and Terrorism (IJCWT) is to explore a range of security related topics and generate research debates in relation to cyber warfare and terrorism.
Targeting researchers, practitioners, academicians, government officials, military professionals and other industry professionals, IJCWT provides a forum to discuss human, technical, and policy issues in relation to cyber warfare and terrorism.
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 0.1 |
2024 | 0.20 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.145 |
Quartile
Year | Value |
---|---|
2024 | Q4 |
h-index
Year | Value |
---|---|
2024 | 9 |
Journal Rank
Year | Value |
---|---|
2024 | 24938 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 57 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science, Decision Sciences, Engineering and Social Sciences, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Malevolent Information Crawling Mechanism for Forming Structured Illegal Organisations in Hidden Networks
Citation: 55
Authors: Romil, Sonali, S., Megha, K. Sakthidasan
-
Insider Threat Detection Using Supervised Machine Learning Algorithms on an Extremely Imbalanced Dataset
Citation: 26
Authors: Naghmeh Moradpoor, Adam
-
Perceptual Operating Systems for the Trade Associations of Cyber Criminals to Scrutinize Hazardous Content
Citation: 23
Authors: Romil, Anand
-
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks
Citation: 17
Authors: Naghmeh Moradpoor
-
The Security Aspects of Automotive Over-the-Air Updates
Citation: 12
Authors: James, Leandros, Mohamed Amine