-
1
-
-
84858166571
-
Georgian Attacks: Remember Estonia?
-
13 Aug
-
Adair, Steven. 13 Aug. 2008. "Georgian Attacks: Remember Estonia?". In Shadow Server
-
(2008)
Shadow Server
-
-
Adair, S.1
-
2
-
-
44449083733
-
The Hunt for the Kill Switch
-
May
-
Adee, Sally. May 2008. "The Hunt for the Kill Switch". In IEEE Spectrum
-
(2008)
IEEE Spectrum
-
-
Adee, S.1
-
4
-
-
84858260213
-
William Hague reveals hacker attack on Foreign Office in call for cyber rules
-
6 Feb
-
Arthur, Charles. 6 Feb. 2011. "William Hague reveals hacker attack on Foreign Office in call for cyber rules". In Guardian
-
(2011)
Guardian
-
-
Arthur, C.1
-
5
-
-
84858211970
-
MI5 alert on China's cyberspace spy threat
-
1 Dec
-
Blakely, Rhys. 1 Dec. 2007. "MI5 alert on China's cyberspace spy threat". In The Times
-
(2007)
The Times
-
-
Blakely, R.1
-
6
-
-
84855714294
-
Anonymous speaks: the inside story of the HBGary hack
-
15 Feb
-
Bright, Peter. 15 Feb. 2011. "Anonymous speaks: the inside story of the HBGary hack". In Ars Technica
-
(2011)
Ars Technica
-
-
Bright, P.1
-
7
-
-
81055128075
-
Israeli test on worm called crucial in Iran nuclear delay
-
16 Jan
-
Broad, J. William, John, Markoff and David, Sanger E. 16 Jan. 2011. "Israeli test on worm called crucial in Iran nuclear delay". In New York Times A1
-
(2011)
New York Times
-
-
Broad, J.W.1
John, M.2
David, S.E.3
-
8
-
-
84858211968
-
Project Grey Goose Phase II Report
-
20 March, Chapter 2
-
Carr, Jeffrey. 20 March 2009. "Project Grey Goose Phase II Report". In GreyLogic Chapter 2
-
(2009)
GreyLogic
-
-
Carr, J.1
-
11
-
-
77955869553
-
Kremlin-backed group behind Estonia cyber blitz
-
11 March
-
Clover, Charles. 11 March 2009. "Kremlin-backed group behind Estonia cyber blitz". In Financial Times
-
(2009)
Financial Times
-
-
Clover, C.1
-
12
-
-
84858239048
-
Pornographic videos flood YouTube
-
21 May
-
Courtney, Siobhan. 21 May 2009. "Pornographic videos flood YouTube". In BBC News
-
(2009)
BBC News
-
-
Courtney, S.1
-
13
-
-
84858239049
-
Crude, Inconsistent Threat: Understanding Anonymous
-
28 March
-
Crenshaw, Adrian. 28 March 2011. "Crude, Inconsistent Threat: Understanding Anonymous". In Irongeek.com
-
(2011)
Irongeek.com
-
-
Crenshaw, A.1
-
14
-
-
84858166564
-
Panetta: Intelligence Community Needs to Predict Uprisings
-
11 Feb
-
Daniel, Lisa. 11 Feb. 2011. "Panetta: Intelligence Community Needs to Predict Uprisings". In American Forces Press Service
-
(2011)
American Forces Press Service
-
-
Daniel, L.1
-
15
-
-
77950880711
-
-
Toronto: Munk Centre for International Studies
-
Deibert, Ron and Rafal, Rohozinsky. 2009. Tracking Ghostnet, Toronto: Munk Centre for International Studies.
-
(2009)
Tracking Ghostnet
-
-
Deibert, R.1
Rafal, R.2
-
16
-
-
84861017078
-
Computer Network Attacks and Self-Defense
-
Dinstein, Yoram. 2002. Computer Network Attacks and Self-Defense. International Law Studies, 76: 99-120.
-
(2002)
International Law Studies
, vol.76
, pp. 99-120
-
-
Dinstein, Y.1
-
17
-
-
84858166563
-
Estonia's cyberattacks: lessons learned, a year on
-
1 May
-
Espiner, Tim, 'Estonia's cyberattacks: lessons learned, a year on', ZDNet UK, 1 May 2008
-
(2008)
ZDNet UK
-
-
Espiner, T.1
-
18
-
-
63349101242
-
Battling Botnets and Online Mobs
-
Winter/Spring
-
Evron, Gadi. 2008. "Battling Botnets and Online Mobs". In Science & Technology, 121-8. Winter/Spring.
-
(2008)
Science & Technology
, pp. 121-128
-
-
Evron, G.1
-
19
-
-
84858260214
-
Authoritatively, Who was Behind the Estonian Attacks?
-
17 March
-
Evron, Gadi. 17 March 2009. "Authoritatively, Who was Behind the Estonian Attacks?". In Darkreading
-
(2009)
Darkreading
-
-
Evron, G.1
-
21
-
-
36749090574
-
Cyber-Combat's First Shot
-
16 Nov
-
Fulghum, A. David, Robert, Wall and Amy, Butler. 16 Nov. 2007. Cyber-Combat's First Shot. Aviation Week & Space Technology, 167: 28-31.
-
(2007)
Aviation Week & Space Technology
, vol.167
, pp. 28-31
-
-
Fulghum, A.D.1
Robert, W.2
Amy, B.3
-
24
-
-
79952640822
-
Dimensions of Cyber Attacks
-
Spring
-
Gandhi, Robin, Anup, Sharma, William, Mahoney, William, Sousan, Qiuming, Zhu and Phillip, Laplante. Spring 2011. "Dimensions of Cyber Attacks". In IEEE Technology and Society Magazine 28-38.
-
(2011)
IEEE Technology and Society Magazine
, pp. 28-38
-
-
Gandhi, R.1
Anup, S.2
William, M.3
William, S.4
Qiuming, Z.5
Phillip, L.6
-
25
-
-
0041016035
-
Deterrence Theory and Research
-
In: Melton Gary, Nader Laura, Dienstbier Richard A., editors Lincoln: Univ. of Nebraska Press
-
Gibbs, P. Jack. 1986. "Deterrence Theory and Research". In Law as a Behavioral Instrument, Edited by: Melton, Gary, Nader, Laura and Dienstbier, Richard A. Lincoln: Univ. of Nebraska Press.
-
(1986)
Law as a Behavioral Instrument
-
-
Gibbs, P.J.1
-
27
-
-
70549098211
-
Hackers attack via Chinese web sites
-
25 Aug
-
Graham, Bradley. 25 Aug. 2005. "Hackers attack via Chinese web sites". In Washington Post
-
(2005)
Washington Post
-
-
Graham, B.1
-
28
-
-
79958742157
-
A declaration of cyber-war
-
April
-
Gross, Joseph Michael. April 2011. "A declaration of cyber-war". In Vanity Fair
-
(2011)
Vanity Fair
-
-
Gross, J.M.1
-
29
-
-
79958762720
-
The Future of Things Cyber
-
Spring
-
Hayden, V. Michael. Spring 2011. The Future of Things Cyber. Strategic Studies Quarterly, 5/1: 3-7.
-
(2011)
Strategic Studies Quarterly
, vol.1-5
, pp. 3-7
-
-
Hayden, V.M.1
-
31
-
-
84858260215
-
Matching Langner's Stuxnet analysis and Symantec's dossier update
-
21 Feb
-
Langner, Ralph. 21 Feb. 2011. "Matching Langner's Stuxnet analysis and Symantec's dossier update". In The Last Line of Cyber Defense
-
(2011)
The Last Line of Cyber Defense
-
-
Langner, R.1
-
32
-
-
84858166572
-
Cracking Stuxnet
-
March
-
Langner, Ralph. March 2011. "Cracking Stuxnet". In TED Talk
-
(2011)
TED Talk
-
-
Langner, R.1
-
33
-
-
84858166568
-
A declaration of bankruptcy for US critical infrastructure protection
-
3 June
-
Langner, Ralph. 3 June 2011. "A declaration of bankruptcy for US critical infrastructure protection". In The Last Line of Cyber Defense
-
(2011)
The Last Line of Cyber Defense
-
-
Langner, R.1
-
36
-
-
77958600609
-
Defending a New Domain
-
Lynn, J. William. 2010. Defending a New Domain. Foreign Affairs, 89/5: 97-108.
-
(2010)
Foreign Affairs
, vol.5-89
, pp. 97-108
-
-
Lynn, J.W.1
-
37
-
-
84884966822
-
Cyber War and Cyber Warfare
-
In: Lord Kristin, Sharp Travis, editors Washington, DC: CNAS
-
Mahnken, G. Thomas. 2011. "Cyber War and Cyber Warfare". In America's Cyber Future: Security and Prosperity in the Information Age, Edited by: Lord, Kristin and Sharp, Travis. Vol. 2, 53-62. Washington, DC: CNAS.
-
(2011)
America's Cyber Future: Security and Prosperity in the Information Age
, vol.2
, pp. 53-62
-
-
Mahnken, G.T.1
-
38
-
-
80051905885
-
A silent attack, but not a subtle one
-
26 Sept
-
Markoff, John. 26 Sept. 2010. "A silent attack, but not a subtle one". In New York Times
-
(2010)
New York Times
-
-
Markoff, J.1
-
39
-
-
84858260219
-
KGB veteran denies CIA caused '82 blast
-
18 March
-
Medetsky, Anatoly. 18 March 2004. "KGB veteran denies CIA caused '82 blast". In Moscow Times
-
(2004)
Moscow Times
-
-
Medetsky, A.1
-
40
-
-
46049086394
-
Contractor blamed in DHS data breaches
-
24 Sept
-
Nakashima, Ellen and Brian, Krebs. 24 Sept. 2007. "Contractor blamed in DHS data breaches". In Washington Post A1
-
(2007)
Washington Post
-
-
Nakashima, E.1
Brian, K.2
-
41
-
-
33746200344
-
Pipeline Rupture and Subsequent Fire in Bellingham, Washington, June 10, 1999
-
Pipeline Accident Report NTSB/PAR-02/02, Washington DC
-
National Transportation Safety Board. "Pipeline Rupture and Subsequent Fire in Bellingham, Washington, June 10, 1999". Pipeline Accident Report NTSB/PAR-02/02 (Washington DC, 2002)
-
(2002)
-
-
-
42
-
-
84865438649
-
Politically Motivated Denial of Service Attacks
-
In: Czosseck Christian, Geers Kenneth, editors Amsterdam/Washington, DC: IOS Press
-
Nazario, Jose. 2009. "Politically Motivated Denial of Service Attacks". In The Virtual Battlefield, Edited by: Czosseck, Christian and Geers, Kenneth. 163-81. Amsterdam/Washington, DC: IOS Press.
-
(2009)
The Virtual Battlefield
, pp. 163-181
-
-
Nazario, J.1
-
45
-
-
84883032493
-
-
New York: Random House
-
Reed, C. Thomas. 2004. At the Abyss, New York: Random House.
-
(2004)
At the Abyss
-
-
Reed, C.T.1
-
46
-
-
74249090781
-
The Terror Fringe
-
December/Jan
-
Rid, Thomas and Marc, Hecker. December/Jan. 2010. The Terror Fringe. Policy Review, 158: 3-19.
-
(2010)
Policy Review
, vol.158
, pp. 3-19
-
-
Rid, T.1
Marc, H.2
-
47
-
-
77956985496
-
-
Tallinn: CCDCOE
-
Tikk, Eneken, Kadri, Kaska, Kristel, Rünnimeri, Mari, Kert, Anna-Maria, Talihärm and Liis, Vihul. 2008. Cyber Attacks against Georgia, Tallinn: CCDCOE.
-
(2008)
Cyber Attacks against Georgia
-
-
Tikk, E.1
Kadri, K.2
Kristel, R.3
Mari, K.4
Anna-Maria, T.5
Liis, V.6
-
49
-
-
84858253955
-
Cyber-Attacks and the Use of Force
-
Waxman, C. Matthew. 2011. Cyber-Attacks and the Use of Force. Yale Journal of International Law, 36: 421-59.
-
(2011)
Yale Journal of International Law
, vol.36
, pp. 421-459
-
-
Waxman, C.M.1
|