-
1
-
-
80053480287
-
Russian group's claims reopen debate on estonian cyberattacks
-
28 Feb.
-
C. Arnold, "Russian Group's Claims Reopen Debate on Estonian Cyberattacks," Radio Free Europe Radio Liberty, 28 Feb. 2011; www.rferl.org/content/Russian-Groups-Claims-Reopen-Debate-On-Estonian- Cyberattacks-/1564694.html.
-
(2011)
Radio Free Europe Radio Liberty
-
-
Arnold, C.1
-
2
-
-
80053497974
-
Researcher says russian government involved in georgia cyber attacks
-
22 Aug.
-
J. Wagley, "Researcher Says Russian Government Involved in Georgia Cyber Attacks," Security Management, 22 Aug. 2008; www.securitymanagement. com/news/researcher-says-russian-government-involved-georgia-cyber-attacks- 004509.
-
(2008)
Security Management
-
-
Wagley, J.1
-
3
-
-
80053545863
-
There is no need for kremlin in this hypothesis, or why ddos is the new poetry
-
17 Aug.
-
E. Morozov, "There Is No Need for Kremlin in This Hypothesis, or Why DDOS Is the New Poetry," Foreign Policy, 17 Aug. 2009; http://netefect.foreignpolicy.com/posts/2009/08/17/there-is-no-need-for-kremlin- in-this-hypothesis.
-
(2009)
Foreign Policy
-
-
Morozov, E.1
-
5
-
-
80053509750
-
Project grey goose phase ii report: The evolving state of cyber warfare
-
J. Carr, "Project Grey Goose Phase II Report: The Evolving State of Cyber Warfare," Greylogic, 2009; ww w.scr ibd.com/doc/13442963/Project- Grey-Goose-Phase-II-Report.
-
(2009)
Greylogic
-
-
Carr, J.1
-
11
-
-
84858847648
-
Vast hacking by a china fearful of the web
-
10 Mar.
-
J. Glanz and J. Markof, "Vast Hacking by a China Fearful of the Web," The New York Times, 10 Mar. 2010; www.nytimes.com/2010/12/05/world/ asia/05 wikileaks-china.html?-r=1.
-
(2010)
The New York Times
-
-
Glanz, J.1
Markof, J.2
-
14
-
-
80053488005
-
The ethics of cyber conf ict
-
K.E. Him-ma and H.T. Tavani, eds., John Wiley and Sons
-
D.E. Denning, "The Ethics of Cyber Conf ict," The Handbook of Information and Computer Ethics, K.E. Him-ma and H.T. Tavani, eds., John Wiley and Sons, 2008.
-
(2008)
The Handbook of Information and Computer Ethics
-
-
Denning, D.E.1
-
15
-
-
80053496948
-
Extending the law of war to cyberspace
-
T. Gjelten, "Extending the Law of War to Cyberspace," Nat'l Public Radio, 2010; www.npr.org/templates/story/story.php?storyId=130023318.
-
(2010)
Nat'l Public Radio
-
-
Gjelten, T.1
-
16
-
-
77954111093
-
How much is too much? an examination of the principle of jus in bello propor-tionality
-
H.E. Shamash, "How Much Is Too Much? An Examination of the Principle of Jus in Bello Propor-t i o n a l i t y," Israeli Defense Forces Law Rev., vol. 2, 2005-2006; http://papers.ssrn.com/sol3/papers.cfm? abstract-id=908369.
-
(2005)
Israeli Defense Forces Law Rev.
, vol.2
-
-
Shamash, H.E.1
-
17
-
-
84865309180
-
Combatant status and computer network attack
-
S. Watts, "Combatant Status and Computer Network A t t a c k," Virginia J. International Law, vol. 5, no. 2, 2009; www.vjil.org/wp-content/ uploads/2010/01/VJIL-50.2-Watts.pdf.
-
(2009)
Virginia J. International Law
, vol.5
, Issue.2
-
-
Watts, S.1
|