메뉴 건너뛰기




Volumn 9, Issue 5, 2011, Pages 16-22

Cybermilitias and political hackers: Use of irregular forces in cyberwarfare

Author keywords

cyberlaw; cybermilitias; Cyberwarfare; hacktivists; political hackers

Indexed keywords

CYBERLAW; CYBERMILITIAS; CYBERWARFARE; HACKTIVISTS; POLITICAL HACKERS;

EID: 80053512050     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2011.46     Document Type: Article
Times cited : (21)

References (17)
  • 1
    • 80053480287 scopus 로고    scopus 로고
    • Russian group's claims reopen debate on estonian cyberattacks
    • 28 Feb.
    • C. Arnold, "Russian Group's Claims Reopen Debate on Estonian Cyberattacks," Radio Free Europe Radio Liberty, 28 Feb. 2011; www.rferl.org/content/Russian-Groups-Claims-Reopen-Debate-On-Estonian- Cyberattacks-/1564694.html.
    • (2011) Radio Free Europe Radio Liberty
    • Arnold, C.1
  • 2
    • 80053497974 scopus 로고    scopus 로고
    • Researcher says russian government involved in georgia cyber attacks
    • 22 Aug.
    • J. Wagley, "Researcher Says Russian Government Involved in Georgia Cyber Attacks," Security Management, 22 Aug. 2008; www.securitymanagement. com/news/researcher-says-russian-government-involved-georgia-cyber-attacks- 004509.
    • (2008) Security Management
    • Wagley, J.1
  • 3
    • 80053545863 scopus 로고    scopus 로고
    • There is no need for kremlin in this hypothesis, or why ddos is the new poetry
    • 17 Aug.
    • E. Morozov, "There Is No Need for Kremlin in This Hypothesis, or Why DDOS Is the New Poetry," Foreign Policy, 17 Aug. 2009; http://netefect.foreignpolicy.com/posts/2009/08/17/there-is-no-need-for-kremlin- in-this-hypothesis.
    • (2009) Foreign Policy
    • Morozov, E.1
  • 5
    • 80053509750 scopus 로고    scopus 로고
    • Project grey goose phase ii report: The evolving state of cyber warfare
    • J. Carr, "Project Grey Goose Phase II Report: The Evolving State of Cyber Warfare," Greylogic, 2009; ww w.scr ibd.com/doc/13442963/Project- Grey-Goose-Phase-II-Report.
    • (2009) Greylogic
    • Carr, J.1
  • 11
    • 84858847648 scopus 로고    scopus 로고
    • Vast hacking by a china fearful of the web
    • 10 Mar.
    • J. Glanz and J. Markof, "Vast Hacking by a China Fearful of the Web," The New York Times, 10 Mar. 2010; www.nytimes.com/2010/12/05/world/ asia/05 wikileaks-china.html?-r=1.
    • (2010) The New York Times
    • Glanz, J.1    Markof, J.2
  • 14
    • 80053488005 scopus 로고    scopus 로고
    • The ethics of cyber conf ict
    • K.E. Him-ma and H.T. Tavani, eds., John Wiley and Sons
    • D.E. Denning, "The Ethics of Cyber Conf ict," The Handbook of Information and Computer Ethics, K.E. Him-ma and H.T. Tavani, eds., John Wiley and Sons, 2008.
    • (2008) The Handbook of Information and Computer Ethics
    • Denning, D.E.1
  • 15
    • 80053496948 scopus 로고    scopus 로고
    • Extending the law of war to cyberspace
    • T. Gjelten, "Extending the Law of War to Cyberspace," Nat'l Public Radio, 2010; www.npr.org/templates/story/story.php?storyId=130023318.
    • (2010) Nat'l Public Radio
    • Gjelten, T.1
  • 16
    • 77954111093 scopus 로고    scopus 로고
    • How much is too much? an examination of the principle of jus in bello propor-tionality
    • H.E. Shamash, "How Much Is Too Much? An Examination of the Principle of Jus in Bello Propor-t i o n a l i t y," Israeli Defense Forces Law Rev., vol. 2, 2005-2006; http://papers.ssrn.com/sol3/papers.cfm? abstract-id=908369.
    • (2005) Israeli Defense Forces Law Rev. , vol.2
    • Shamash, H.E.1
  • 17
    • 84865309180 scopus 로고    scopus 로고
    • Combatant status and computer network attack
    • S. Watts, "Combatant Status and Computer Network A t t a c k," Virginia J. International Law, vol. 5, no. 2, 2009; www.vjil.org/wp-content/ uploads/2010/01/VJIL-50.2-Watts.pdf.
    • (2009) Virginia J. International Law , vol.5 , Issue.2
    • Watts, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.