Article Title,Year,Volume,Issue,Page Range,Author Terrorism in the website: society 4.0 and fundamentalism in scrutiny,2020,10,1,1-14,Korstanje A framework for the weapons of influence,2020,10,1,34-49,Simola On the behavior-based risk communication models in crisis management and social risks minimization:,2020,10,2,27-45,Kostyuchenko The security aspects of automotive over-the-air updates,2020,10,2,64-81,Maglaras Cross-regional analysis of terrorism reporting and dynamics of ethnic relations in Nigeria,2020,10,4,20-35,Morah Proposed framework of smart transportation in Pakistan: issues challenges vulnerabilitiesand solutions,2020,10,4,48-63,Awan Knowledge extraction on the nexus between terrorism criteria and attacks on private citizens and property,2021,11,1,20-30,Wario Social media: a protagonist for terrorism,2021,11,1,31-44,Olomojobi Tracing the cultural background of lone-wolf terrorism: dilemmas contradictions and opportunities for the next decade,2021,11,1,45-56,Korstanje Detecting markers of radicalisation in social media posts: insights from modified Delphi technique and literature review,2021,11,2,12-28,Neo Can terrorism mold itself to outer space?: an international legal perspective,2021,11,2,56-75,Silverburg A lone wolf vs. an affiliated terrorist: knowledge inference on who poses more danger to the tourist,2022,12,1,1-9,Wario Boko Haram insurgency and violence against women and girls in Nigeria,2022,12,1,1-13,Ajise An ontology towards predicting terrorism events,2022,12,1,1-13,Dawood Agent-based simulation of heterogeneous crowd flows in critical infrastructures during emergencies,2022,12,2,1-18,Battista Evaluating the strategic consequences of cyber targeting strategies on road transport networks: a case study of Washington DC,2022,12,1,1-14,Vivek Differences and commonalities between terrorism and COVID-19: globalization in ruins,2022,12,1,1-14,Korstanje Fake identities in social cyberspace: from escapism to terrorism,2022,12,1,1-17,Topor Malevolent information crawling mechanism for forming structured illegal organisations in hidden networks,2022,12,1,1-14,Rawat On the analysis of horror stories in the militants' narratives as markers of violent behavior and conflict identity: case of "L/DPR" during the warfare in Donbass east Ukraine 2014-2021,2022,12,1,1-19,Kostyuchenko Recent trends in child sexual abuse material (CSAM) distribution in Indian cyberspace,2022,12,1,1-15,Khajuria The impact of the COVID-19 pandemic on the radical behavior and armed conflict escalation risks: case of Donbas (east Ekraine) warfare,2022,12,1,1-21,Pushkar Techno-radicalism: an account of radicalism in the technology era,2022,12,1,1-14,Arzroomchilar Understanding the community's perceptions towards online radicalisation: an exploratory analysis,2022,12,1,1-15,Neo