-
1
-
-
1842607024
-
Attack and conquer: International anarchy and the offense-defense deterrence balance
-
Winter
-
Adams, Karen Ruth. 2003-04. "Attack and Conquer: International Anarchy and the Offense-Defense Deterrence Balance," International Security 28, 3 (Winter), 45-83.
-
(2003)
International Security
, vol.28
, Issue.3
, pp. 45-83
-
-
Ruth, A.K.1
-
4
-
-
0035536306
-
Rebuilding the foundations of offense-defense theory
-
August
-
Biddle, Stephen. 2001. "Rebuilding the Foundations of Offense-Defense Theory," Journal of Politics, 63, 3 (August), 741-744.
-
(2001)
Journal of Politics
, vol.63
, Issue.3
, pp. 741-744
-
-
Stephen, B.1
-
5
-
-
34247889742
-
-
Cambridge, MA: MIT Press
-
Brown, Michael E., Owen R. Cote' Jr., Sean M. Lynn-Jones, and Steven E. Miller. 2004. Offense, Defense, and War. Cambridge, MA: MIT Press.
-
(2004)
Offense, Defense, and War
-
-
Brown, M.E.1
Cote Jr., O.R.2
Lynn-Jones, S.M.3
Miller, S.E.4
-
6
-
-
79952483764
-
The evolution of cyber warfare
-
February 27
-
Bruno, Greg. 2008. "The Evolution of Cyber Warfare," Council on Foreign Relations. February 27, 2008. http://www.cfr.org/publication/15577/ evolution-of-cyber-warfare.html?breadcrumb=% 2F.
-
(2008)
Council on Foreign Relations
-
-
Greg, B.1
-
7
-
-
79959354085
-
Waging deterrence in the twenty-first century
-
Spring
-
Chilton, Kevin, General, and Greg Weaver. 2009. "Waging Deterrence in the Twenty-First Century," Strategic Studies Quarterly, (Spring), 31-42.
-
(2009)
Strategic Studies Quarterly
, pp. 31-42
-
-
Chilton, K.G.1
Weaver, G.2
-
8
-
-
79952472485
-
The characterization and measurement of cyber warfare
-
May 2008
-
Dobitz, Kyle, Brad Haas, Michael Holtje, Amanda Jokerst, Geoff Ochsner, and Stephanie Silva. 2008. "The Characterization and Measurement of Cyber Warfare," USSTRATCOM Global Innovation and Strategy Center (GISC) Project 08-01, May 2008. http://handle.dtic.mil/100.2/ADA497907.
-
(2008)
USSTRATCOM Global Innovation and Strategy Center (GISC) Project 08-01
-
-
Dobitz, K.1
Brad, H.2
Michael, H.3
Jokerst, A.4
Ochsner, G.5
Silva, S.6
-
9
-
-
79952459734
-
-
Intellisec: Decision Risk, and Forensics. July 509.
-
"Foreign Government Inspire Cyber Attacks on Corporate Targets." 2009. Intellisec: Decision Risk, and Forensics. July 5, 2009.http://www.intellisec.com/blog/2009/07/05/foreign-government-inside-cyber- attacks-on-corporate-targets-forensic-protection/
-
(2009)
Foreign Government I.0 Nspire Cyber Attacks on Corporate Targets
-
-
-
10
-
-
84879987163
-
-
Malden, MA: Polity Press
-
Freedman, Lawrence. 2004. Deterrence. Malden, MA: Polity Press.
-
(2004)
Deterrence
-
-
Freedman, L.1
-
11
-
-
79952462916
-
Gates: Cyber attack a constant threat
-
April 21, 2009
-
"Gates: Cyber Attack A Constant Threat." 2009. CBSnews.com, April 21, 2009. http://www.cbsnews.com/stories/2009/04/21/tech/main4959079.shtml
-
(2009)
CBSnews
-
-
-
12
-
-
0031087039
-
What is the offense-defense balance and can we measure it?
-
Spring
-
Glaser, Charles L. and Chaim Kaufmann. 1998. "What is the Offense-Defense Balance and Can We Measure It?" International Security 22, 3 (Spring), 44-82.
-
(1998)
International Security
, vol.22
, Issue.3
, pp. 44-82
-
-
Glaser, C.L.1
Kaufmann, C.2
-
15
-
-
79952482585
-
Integrated security: A strategic response to anonymity and the problem of the Few
-
ed. Emily O. Goldman. Portland, OR: Frank Cass
-
Harknett, Richard J. 2004. "Integrated Security: A Strategic Response to Anonymity and the Problem of the Few." National Security in the Information Age. ed. Emily O. Goldman. Portland, OR: Frank Cass.'
-
(2004)
National Security in the Information Age
-
-
Harknett, R.J.1
-
16
-
-
79952474092
-
State preferences, systemic constraints, and the absolute weapon
-
eds. T.V. Paul, Richard J. Harknett, and James J. Wirtz. Ann Arbor, MI: University of Michigan Press
-
2000a. "State Preferences, Systemic Constraints, and the Absolute Weapon. In The Absolute Weapon Revisited. eds. T.V. Paul, Richard J. Harknett, and James J. Wirtz. Ann Arbor, MI: University of Michigan Press.
-
(2000)
The Absolute Weapon Revisited
-
-
-
17
-
-
79952468284
-
Threat as outcome: The security challenge of information technology
-
Joint Center For International and Security Studies jciss.ucdavis.edu
-
2000b "Threat as Outcome: The Security Challenge of Information Technology," ITIS Working Paper No. 1, Joint Center For International and Security Studies
-
(2000)
ITIS Working Paper No. 1
-
-
-
18
-
-
0042428228
-
Information warfare and deterrence
-
Autumn
-
1996. "Information Warfare and Deterrence." Parameters (Autumn), 93-107.
-
(1996)
Parameters
, pp. 93-107
-
-
-
19
-
-
0010139488
-
The logic of conventional deterrence and the end of the cold War
-
Autumn
-
1994. "The Logic of Conventional Deterrence and the End of the Cold War," Security Studies 4, 1 (Autumn), 86-114.
-
(1994)
Security Studies
, vol.4
, Issue.1
, pp. 86-114
-
-
-
20
-
-
85044814578
-
The Cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen
-
December
-
Harknett, Richard J. and James A. Stever. 2009. "The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen," Journal of Homeland Security and Emergency Management. 6, 1 (December).
-
(2009)
Journal of Homeland Security and Emergency Management
, vol.6
, pp. 1
-
-
Harknett, R.J.1
Stever, J.A.2
-
21
-
-
84974380232
-
Cooperation under the security dilemma
-
Jervis, Robert. 1978. "Cooperation Under the Security Dilemma." World Politics 30, 2, 167-214.
-
(1978)
World Politics
, vol.30
, Issue.2
, pp. 167-214
-
-
Jervis, R.1
-
22
-
-
79952461854
-
North Korea behind cyber attacks: South's spy chief
-
com. October 29, 2009
-
Kim, Jack. 2009. "North Korea behind cyber attacks: South's spy chief." Reuters.com. October 29, 2009. http://www.reuters.com/article/ idUSTRE59T09B20091030.
-
(2009)
Reuters
-
-
Kim, J.1
-
23
-
-
79952466050
-
What constitutes an act of war in cyberspace?
-
Masters paper presented to March 2008
-
Kinley, Kelli. 2008. "What Constitutes an Act of War in Cyberspace?" Masters paper presented to Air Force Institute of Technology, March 2008. http://handle.dtic.mil/100.2/ADA480404.
-
(2008)
Air Force Institute of Technology
-
-
Kinley, K.1
-
24
-
-
0001148702
-
The Offensive/defensive balance of military technology: A theoretical and historical analysis
-
June
-
Levy, Jack S. 1984. "The Offensive/Defensive Balance of Military Technology: A Theoretical and Historical Analysis." International Studies Quarterly 28, 2 (June), 219-238.
-
(1984)
International Studies Quarterly
, vol.28
, Issue.2
, pp. 219-238
-
-
Levy, J.S.1
-
26
-
-
79952466207
-
Information war, information peace
-
Spring
-
1998. "Information War, Information Peace," Journal of International Affairs 51, 2 (Spring).
-
(1998)
Journal of International Affairs
, vol.51
, pp. 2
-
-
-
27
-
-
0034377604
-
Grasping the technological peace
-
Summer
-
Lieber, Keir A. 2000. "Grasping the Technological Peace." International Security 25, 1 (Summer), 71-104.
-
(2000)
International Security
, vol.25
, Issue.1
, pp. 71-104
-
-
Lieber, K.A.1
-
28
-
-
78751636824
-
After the Transistor, a Leap into the Microcosm
-
August 31, 2009
-
Markoff, John. 2009a. "After the Transistor, a Leap into the Microcosm." New York Times. August 31, 2009. http://www.nytimes.com/2009/ 09/01/science/01trans.html.
-
(2009)
New York Times
-
-
Markoff, J.1
-
29
-
-
79952476230
-
Internet's anonymity makes cyberattack hard to trace
-
July 16, 2009
-
2009b. "Internet's Anonymity Makes Cyberattack Hard to Trace." New York Times. July 16, 2009. http://www.nytimes.com/2009/07/17/technology/ 17cyber.html
-
(2009)
New York Times
-
-
-
30
-
-
79952457997
-
Mouse click could plunge city into darkness, experts say
-
September 27, 2007
-
Meserve, Jeanne. 2007. "Mouse click could plunge city into darkness, experts say." CNN.com. September 27, 2007. http://www.cnn.com/2007/US/09/ 27/power.at.risk/index.html?iref=newssearch#cnnSTC
-
(2007)
CNN.com
-
-
Meserve, J.1
-
31
-
-
79952464363
-
Capability of the people's republic of china to conduct cyber warfare and computer network exploitation
-
Prepared for October 9, 2009
-
Video Northrop Grumman. 2009. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Prepared for The US-China Economic and Security Review Commission, October 9, 2009. http://handle.dtic.mil/100.2/ADA509000.
-
(2009)
The US-China Economic and Security Review Commission
-
-
Grumman, V.N.1
-
35
-
-
79952470256
-
Identity fraud up in total dollars, victims
-
February 9, 2009
-
Stempel, Jonathan. 2009. "Identity Fraud Up in Total Dollars, Victims." Reuters.com, February 9, 2009. http://www.reuters.com/article/ domesticNews/idUSTRE51831G20090209
-
(2009)
Reuters.com
-
-
Stempel, J.1
-
36
-
-
79952477125
-
Youth sentenced in government hacking case
-
September 23, 2000
-
Stout, David. 2000. "Youth Sentenced in Government Hacking Case." New York Times. September 23, 2000. http://www.nytimes.com/2000/09/ 23/us/youth-sentenced-in-government-hacking-case.html.
-
(2000)
New York Times
-
-
Stout, D.1
-
39
-
-
79952469091
-
-
2006 U.S National Security Strategy
-
2006 U.S. National Security Strategy. http://www.whitehouse.gov/nsc/nss/ 2006/.
-
-
-
-
44
-
-
79952460303
-
-
Congressional Research Service (CRS) Report for Congress, November 15, 2007
-
Wilson, Clay. 2007. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service (CRS) Report for Congress, November 15, 2007.
-
(2007)
Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
-
-
Wilson, C.1
-
45
-
-
79952461853
-
Information warfare survivability: Is the best defense a good offense?
-
Loyola University, Chicago IL. USA, July 2000
-
Yurcik, William. 2000. "Information Warfare Survivability: Is the Best Defense a Good Offense?" Proceedings of the 5th Annual Ethics and Technology Conference, Loyola University, Chicago IL. USA, July 2000.
-
(2000)
Proceedings of the 5th Annual Ethics and Technology Conference
-
-
Yurcik, W.1
|