1. A dynamic cyber terrorism framework;Ahmad;International Journal of Computer Science and Information Security,2012
2. Understanding cyber terrorism: The grounded theory method applied;Ahmad,2012
3. Information operations: Warfare and the hard reality of soft power;Armistead,2004
4. Australia Security Legislation Amendment (Terrorism) Act;Australian Governement,2002
5. Dynamo efficiency in compressible convective dynamos with and without penetration;Brummel;Geophysical and Astrophysical Fluid Dynamics,2010