메뉴 건너뛰기




Volumn 35, Issue 1, 2012, Pages 5-32

Cyber War Will Not Take Place

Author keywords

Cyber War; Cyber Security; Espionage; Information Operations; Sabotage; Stuxnet; Subversion

Indexed keywords

COMPUTER SYSTEM; INFORMATION SYSTEM; INFORMATION TECHNOLOGY; INTERNET; WAR;

EID: 84858221367     PISSN: 01402390     EISSN: 1743937X     Source Type: Journal    
DOI: 10.1080/01402390.2011.608939     Document Type: Article
Times cited : (300)

References (49)
  • 1
    • 84858166571 scopus 로고    scopus 로고
    • Georgian Attacks: Remember Estonia?
    • 13 Aug
    • Adair, Steven. 13 Aug. 2008. "Georgian Attacks: Remember Estonia?". In Shadow Server
    • (2008) Shadow Server
    • Adair, S.1
  • 2
    • 44449083733 scopus 로고    scopus 로고
    • The Hunt for the Kill Switch
    • May
    • Adee, Sally. May 2008. "The Hunt for the Kill Switch". In IEEE Spectrum
    • (2008) IEEE Spectrum
    • Adee, S.1
  • 4
    • 84858260213 scopus 로고    scopus 로고
    • William Hague reveals hacker attack on Foreign Office in call for cyber rules
    • 6 Feb
    • Arthur, Charles. 6 Feb. 2011. "William Hague reveals hacker attack on Foreign Office in call for cyber rules". In Guardian
    • (2011) Guardian
    • Arthur, C.1
  • 5
    • 84858211970 scopus 로고    scopus 로고
    • MI5 alert on China's cyberspace spy threat
    • 1 Dec
    • Blakely, Rhys. 1 Dec. 2007. "MI5 alert on China's cyberspace spy threat". In The Times
    • (2007) The Times
    • Blakely, R.1
  • 6
    • 84855714294 scopus 로고    scopus 로고
    • Anonymous speaks: the inside story of the HBGary hack
    • 15 Feb
    • Bright, Peter. 15 Feb. 2011. "Anonymous speaks: the inside story of the HBGary hack". In Ars Technica
    • (2011) Ars Technica
    • Bright, P.1
  • 7
    • 81055128075 scopus 로고    scopus 로고
    • Israeli test on worm called crucial in Iran nuclear delay
    • 16 Jan
    • Broad, J. William, John, Markoff and David, Sanger E. 16 Jan. 2011. "Israeli test on worm called crucial in Iran nuclear delay". In New York Times A1
    • (2011) New York Times
    • Broad, J.W.1    John, M.2    David, S.E.3
  • 8
    • 84858211968 scopus 로고    scopus 로고
    • Project Grey Goose Phase II Report
    • 20 March, Chapter 2
    • Carr, Jeffrey. 20 March 2009. "Project Grey Goose Phase II Report". In GreyLogic Chapter 2
    • (2009) GreyLogic
    • Carr, J.1
  • 11
    • 77955869553 scopus 로고    scopus 로고
    • Kremlin-backed group behind Estonia cyber blitz
    • 11 March
    • Clover, Charles. 11 March 2009. "Kremlin-backed group behind Estonia cyber blitz". In Financial Times
    • (2009) Financial Times
    • Clover, C.1
  • 12
    • 84858239048 scopus 로고    scopus 로고
    • Pornographic videos flood YouTube
    • 21 May
    • Courtney, Siobhan. 21 May 2009. "Pornographic videos flood YouTube". In BBC News
    • (2009) BBC News
    • Courtney, S.1
  • 13
    • 84858239049 scopus 로고    scopus 로고
    • Crude, Inconsistent Threat: Understanding Anonymous
    • 28 March
    • Crenshaw, Adrian. 28 March 2011. "Crude, Inconsistent Threat: Understanding Anonymous". In Irongeek.com
    • (2011) Irongeek.com
    • Crenshaw, A.1
  • 14
    • 84858166564 scopus 로고    scopus 로고
    • Panetta: Intelligence Community Needs to Predict Uprisings
    • 11 Feb
    • Daniel, Lisa. 11 Feb. 2011. "Panetta: Intelligence Community Needs to Predict Uprisings". In American Forces Press Service
    • (2011) American Forces Press Service
    • Daniel, L.1
  • 15
    • 77950880711 scopus 로고    scopus 로고
    • Toronto: Munk Centre for International Studies
    • Deibert, Ron and Rafal, Rohozinsky. 2009. Tracking Ghostnet, Toronto: Munk Centre for International Studies.
    • (2009) Tracking Ghostnet
    • Deibert, R.1    Rafal, R.2
  • 16
    • 84861017078 scopus 로고    scopus 로고
    • Computer Network Attacks and Self-Defense
    • Dinstein, Yoram. 2002. Computer Network Attacks and Self-Defense. International Law Studies, 76: 99-120.
    • (2002) International Law Studies , vol.76 , pp. 99-120
    • Dinstein, Y.1
  • 17
    • 84858166563 scopus 로고    scopus 로고
    • Estonia's cyberattacks: lessons learned, a year on
    • 1 May
    • Espiner, Tim, 'Estonia's cyberattacks: lessons learned, a year on', ZDNet UK, 1 May 2008
    • (2008) ZDNet UK
    • Espiner, T.1
  • 18
    • 63349101242 scopus 로고    scopus 로고
    • Battling Botnets and Online Mobs
    • Winter/Spring
    • Evron, Gadi. 2008. "Battling Botnets and Online Mobs". In Science & Technology, 121-8. Winter/Spring.
    • (2008) Science & Technology , pp. 121-128
    • Evron, G.1
  • 19
    • 84858260214 scopus 로고    scopus 로고
    • Authoritatively, Who was Behind the Estonian Attacks?
    • 17 March
    • Evron, Gadi. 17 March 2009. "Authoritatively, Who was Behind the Estonian Attacks?". In Darkreading
    • (2009) Darkreading
    • Evron, G.1
  • 25
    • 0041016035 scopus 로고
    • Deterrence Theory and Research
    • In: Melton Gary, Nader Laura, Dienstbier Richard A., editors Lincoln: Univ. of Nebraska Press
    • Gibbs, P. Jack. 1986. "Deterrence Theory and Research". In Law as a Behavioral Instrument, Edited by: Melton, Gary, Nader, Laura and Dienstbier, Richard A. Lincoln: Univ. of Nebraska Press.
    • (1986) Law as a Behavioral Instrument
    • Gibbs, P.J.1
  • 27
    • 70549098211 scopus 로고    scopus 로고
    • Hackers attack via Chinese web sites
    • 25 Aug
    • Graham, Bradley. 25 Aug. 2005. "Hackers attack via Chinese web sites". In Washington Post
    • (2005) Washington Post
    • Graham, B.1
  • 28
    • 79958742157 scopus 로고    scopus 로고
    • A declaration of cyber-war
    • April
    • Gross, Joseph Michael. April 2011. "A declaration of cyber-war". In Vanity Fair
    • (2011) Vanity Fair
    • Gross, J.M.1
  • 29
    • 79958762720 scopus 로고    scopus 로고
    • The Future of Things Cyber
    • Spring
    • Hayden, V. Michael. Spring 2011. The Future of Things Cyber. Strategic Studies Quarterly, 5/1: 3-7.
    • (2011) Strategic Studies Quarterly , vol.1-5 , pp. 3-7
    • Hayden, V.M.1
  • 31
    • 84858260215 scopus 로고    scopus 로고
    • Matching Langner's Stuxnet analysis and Symantec's dossier update
    • 21 Feb
    • Langner, Ralph. 21 Feb. 2011. "Matching Langner's Stuxnet analysis and Symantec's dossier update". In The Last Line of Cyber Defense
    • (2011) The Last Line of Cyber Defense
    • Langner, R.1
  • 32
    • 84858166572 scopus 로고    scopus 로고
    • Cracking Stuxnet
    • March
    • Langner, Ralph. March 2011. "Cracking Stuxnet". In TED Talk
    • (2011) TED Talk
    • Langner, R.1
  • 33
    • 84858166568 scopus 로고    scopus 로고
    • A declaration of bankruptcy for US critical infrastructure protection
    • 3 June
    • Langner, Ralph. 3 June 2011. "A declaration of bankruptcy for US critical infrastructure protection". In The Last Line of Cyber Defense
    • (2011) The Last Line of Cyber Defense
    • Langner, R.1
  • 36
    • 77958600609 scopus 로고    scopus 로고
    • Defending a New Domain
    • Lynn, J. William. 2010. Defending a New Domain. Foreign Affairs, 89/5: 97-108.
    • (2010) Foreign Affairs , vol.5-89 , pp. 97-108
    • Lynn, J.W.1
  • 37
    • 84884966822 scopus 로고    scopus 로고
    • Cyber War and Cyber Warfare
    • In: Lord Kristin, Sharp Travis, editors Washington, DC: CNAS
    • Mahnken, G. Thomas. 2011. "Cyber War and Cyber Warfare". In America's Cyber Future: Security and Prosperity in the Information Age, Edited by: Lord, Kristin and Sharp, Travis. Vol. 2, 53-62. Washington, DC: CNAS.
    • (2011) America's Cyber Future: Security and Prosperity in the Information Age , vol.2 , pp. 53-62
    • Mahnken, G.T.1
  • 38
    • 80051905885 scopus 로고    scopus 로고
    • A silent attack, but not a subtle one
    • 26 Sept
    • Markoff, John. 26 Sept. 2010. "A silent attack, but not a subtle one". In New York Times
    • (2010) New York Times
    • Markoff, J.1
  • 39
    • 84858260219 scopus 로고    scopus 로고
    • KGB veteran denies CIA caused '82 blast
    • 18 March
    • Medetsky, Anatoly. 18 March 2004. "KGB veteran denies CIA caused '82 blast". In Moscow Times
    • (2004) Moscow Times
    • Medetsky, A.1
  • 40
    • 46049086394 scopus 로고    scopus 로고
    • Contractor blamed in DHS data breaches
    • 24 Sept
    • Nakashima, Ellen and Brian, Krebs. 24 Sept. 2007. "Contractor blamed in DHS data breaches". In Washington Post A1
    • (2007) Washington Post
    • Nakashima, E.1    Brian, K.2
  • 41
    • 33746200344 scopus 로고    scopus 로고
    • Pipeline Rupture and Subsequent Fire in Bellingham, Washington, June 10, 1999
    • Pipeline Accident Report NTSB/PAR-02/02, Washington DC
    • National Transportation Safety Board. "Pipeline Rupture and Subsequent Fire in Bellingham, Washington, June 10, 1999". Pipeline Accident Report NTSB/PAR-02/02 (Washington DC, 2002)
    • (2002)
  • 42
    • 84865438649 scopus 로고    scopus 로고
    • Politically Motivated Denial of Service Attacks
    • In: Czosseck Christian, Geers Kenneth, editors Amsterdam/Washington, DC: IOS Press
    • Nazario, Jose. 2009. "Politically Motivated Denial of Service Attacks". In The Virtual Battlefield, Edited by: Czosseck, Christian and Geers, Kenneth. 163-81. Amsterdam/Washington, DC: IOS Press.
    • (2009) The Virtual Battlefield , pp. 163-181
    • Nazario, J.1
  • 45
    • 84883032493 scopus 로고    scopus 로고
    • New York: Random House
    • Reed, C. Thomas. 2004. At the Abyss, New York: Random House.
    • (2004) At the Abyss
    • Reed, C.T.1
  • 46
    • 74249090781 scopus 로고    scopus 로고
    • The Terror Fringe
    • December/Jan
    • Rid, Thomas and Marc, Hecker. December/Jan. 2010. The Terror Fringe. Policy Review, 158: 3-19.
    • (2010) Policy Review , vol.158 , pp. 3-19
    • Rid, T.1    Marc, H.2
  • 49
    • 84858253955 scopus 로고    scopus 로고
    • Cyber-Attacks and the Use of Force
    • Waxman, C. Matthew. 2011. Cyber-Attacks and the Use of Force. Yale Journal of International Law, 36: 421-59.
    • (2011) Yale Journal of International Law , vol.36 , pp. 421-459
    • Waxman, C.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.