-
5
-
-
70449660579
-
Transformation in concept and policy
-
Summer 2005
-
Cimbala SJ (2005) Transformation in concept and policy. Joint Force Q 38 (Summer 2005)
-
(2005)
Joint Force Q
, vol.38
-
-
Cimbala, S.J.1
-
6
-
-
84859934099
-
A cyberwar of ideas? Deterrence and norms in cyberspace
-
Stevens T (2012) A cyberwar of ideas? Deterrence and norms in cyberspace. Contemp Secur Pol 33(1):148-170. http://dx.doi.org/10.1080/13523260.2012.659597
-
(2012)
Contemp Secur Pol
, vol.33
, Issue.1
, pp. 148-170
-
-
Stevens, T.1
-
7
-
-
34247095107
-
Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?
-
Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Soc Change 46(4-5):223-238
-
(2006)
Crime Law Soc Change
, vol.46
, Issue.4-5
, pp. 223-238
-
-
Stohl, M.1
-
8
-
-
84867297056
-
Cybersecurity: A pre-history
-
Warner M (2012) Cybersecurity: a pre-history. Intell Natl Secur 27(5):781-799. http://dx.doi.org/10.1080/02684527.2012.708530
-
(2012)
Intell Natl Secur
, vol.27
, Issue.5
, pp. 781-799
-
-
Warner, M.1
-
11
-
-
0012443107
-
Networks, netwar and information age terrorism
-
Lesser A, Hoffman B, Arquilla J, Ronfeldt D, Zanini M eds, Rand, Santa Monica
-
Arquilla J, Ronfeldt D, Zanini M (1999) Networks, netwar and information age terrorism. In: Lesser A, Hoffman B, Arquilla J, Ronfeldt D, Zanini M (eds) Countering the new terrorism. Rand, Santa Monica, pp 39-84
-
(1999)
Countering the New Terrorism
, pp. 39-84
-
-
Arquilla, J.1
Ronfeldt, D.2
Zanini, M.3
-
12
-
-
80051748104
-
-
Mother Jones 2 April 2009
-
Aquino S (2009) Should Obama control the Internet? In: Mother Jones 2 April 2009. http://www.motherjones.com/politics/2009/04/should-obama-control-internet
-
(2009)
Should Obama Control the Internet?
-
-
Aquino, S.1
-
18
-
-
85192421711
-
-
Georgia. 13 August 2008, via DefenseTech
-
Carroll W (2008) Cyber War 2.0-Russia v. Georgia. 13 August 2008. Available via DefenseTech. http://defensetech.org/2008/08/13/cyber-war-2-0-russia-v-georgia/xzz2PJhri1hS
-
(2008)
Cyber War 2.0-Russia V
-
-
Carroll, W.1
-
19
-
-
84962062205
-
Computer networks in South Korea are paralyzed in cyberattacks
-
23 March 2013
-
Choe S-H (2013) Computer networks in South Korea are paralyzed in cyberattacks. The New York Times 23 March 2013. https://www.nytimes.com/2013/03/21/world/asia/south-korea-computernetwork-crashes.html
-
(2013)
The New York Times
-
-
Choe, S.-H.1
-
23
-
-
85192424427
-
-
Crypt Newsletter (2009) http://www.soci.niu.edu/~crypt/other/harbor.htm
-
(2009)
-
-
Crypt Newsletter1
-
24
-
-
85192405979
-
Nation unprepared for cyber war, experts say December 17, 2001
-
Dean J (2001) Nation unprepared for cyber war, experts say December 17, 2001. Government Executive. http://www.govexec.com/defense/2001/12/nation-unprepared-for-cyber-war-experts-say/10725
-
(2001)
Government Executive
-
-
Dean, J.1
-
25
-
-
84937339440
-
Cyberterror and media-induced fears: The production of emergency culture
-
Debrix F (2001) Cyberterror and media-induced fears: the production of emergency culture. Strat J Theor Cult Polit 14(1):149-168
-
(2001)
Strat J Theor Cult Polit
, vol.14
, Issue.1
, pp. 149-168
-
-
Debrix, F.1
-
26
-
-
85032414967
-
Tracking the emerging arms race in cyberspace
-
Deibert R (2011) Tracking the emerging arms race in cyberspace. Bull Atom Scient 67:1
-
(2011)
Bull Atom Scient
, vol.67
, pp. 1
-
-
Deibert, R.1
-
28
-
-
85192409765
-
Fearing 'Cyber Katrina'
-
Business Week 18 February 2009
-
Epstein K (2009) Fearing 'Cyber Katrina', Obama candidate for Cyber Czar urges a "FEMA for the Internet". Business Week 18 February 2009. http://www.businessweek.com/the-thread/techbeat/archives/2009/02/fearing-cyber-k.html
-
(2009)
Obama Candidate for Cyber Czar Urges a "FEMA for the Internet"
-
-
Epstein, K.1
-
30
-
-
34247170624
-
Bangs for the buck: A cost-benefit analysis of cyberterrorism
-
Giacomello G (2004) Bangs for the buck: a cost-benefit analysis of cyberterrorism. Stud Conflict Terrorism 27:387-408
-
(2004)
Stud Conflict Terrorism
, vol.27
, pp. 387-408
-
-
Giacomello, G.1
-
31
-
-
85192404264
-
-
NewScientist 16 December 2010
-
Giles J (2010) Are states unleashing the dogs of cyber war? NewScientist 16 December 2010. http://www.intellectualtakeout.org/library/chart-graph/cyber-attack-country
-
(2010)
Are States Unleashing the Dogs of Cyber War?
-
-
Giles, J.1
-
33
-
-
84892166017
-
-
GReAT (Global Research & Analysis Team) (2012) Gauss abnormal distribution. http://www.securelist.com/en/analysis/204792238/Gauss-Abnormal-Distribution
-
(2012)
Gauss Abnormal Distribution
-
-
-
34
-
-
27944448233
-
-
Washington Monthly
-
Green J (2002). The myth of cyber terrorism. Washington Monthly. http://www.washingtonmonthly.com/features/2001/0211.green. html. Accessed 1 Feb. 2006
-
(2002)
The Myth of Cyber Terrorism
-
-
Green, J.1
-
35
-
-
84899950855
-
Cyber insecurity as a national threat: Overreaction from Germany, France and the UK?
-
Guitton C (2013) Cyber insecurity as a national threat: overreaction from Germany, France and the UK? Eur Secur 22(1):21-35
-
(2013)
Eur Secur
, vol.22
, Issue.1
, pp. 21-35
-
-
Guitton, C.1
-
36
-
-
71649085630
-
Digital disaster, cyber security, and the Copenhagen School
-
Hansen L, Nissenbuam H (2009) Digital disaster, cyber security, and the Copenhagen School. Int Stud Q 53:1155-1175
-
(2009)
Int Stud Q
, vol.53
, pp. 1155-1175
-
-
Hansen, L.1
Nissenbuam, H.2
-
37
-
-
85007146556
-
The spectrum of national responsibility for cyberattacks
-
Healey J (2011) The spectrum of national responsibility for cyberattacks. Brown J Int Aff 18(1):43-56
-
(2011)
Brown J Int Aff
, vol.18
, Issue.1
, pp. 43-56
-
-
Healey, J.1
-
38
-
-
80051989784
-
Cyberwar case study: Georgia 2008
-
Hollis, D (2011) Cyberwar case study: Georgia 2008. Small Wars J. http://smallwarsjournal.com/jrnl/art/cyberwar-case-study-georgia-2008
-
(2011)
Small Wars J
-
-
Hollis, D.1
-
44
-
-
84880943193
-
Cybersecurity and cyberwarfare
-
Washington DC
-
Lewis JA, Timlin K (2011) Cybersecurity and cyberwarfare. CSIS, UNIDIR, Washington DC
-
(2011)
CSIS, UNIDIR
-
-
Lewis, J.A.1
Timlin, K.2
-
45
-
-
79956266592
-
Defending a new domain: The Pentagon's cyberstrategy
-
Lynn III WJ (2010) Defending a new domain: the Pentagon's cyberstrategy. Foreign Affairs Sept/Oct. 2010. http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain
-
(2010)
Foreign Affairs Sept/Oct. 2010
-
-
Lynn, W.J.1
-
48
-
-
84865569445
-
Cyber security without cyber war
-
O'Connell ME (2012) Cyber security without cyber war. J Conflict Secur Law 17(2):187-209
-
(2012)
J Conflict Secur Law
, vol.17
, Issue.2
, pp. 187-209
-
-
O'Connell, M.E.1
-
49
-
-
84876359228
-
-
New York City U. S. Department of Defense Office of the Assistant Secretary of Defense Public Affairs. News Transcript 11 October 2012
-
Panetta L (2012) Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City U. S. Department of Defense Office of the Assistant Secretary of Defense (Public Affairs). News Transcript 11 October 2012. http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136
-
(2012)
Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security
-
-
Panetta, L.1
-
50
-
-
85192399505
-
Security firm discovers cyber-spy campaign
-
14 January 2013
-
Perlroth N (2013) Security firm discovers cyber-spy campaign. The New York Times 14 January 2013. http://bits.blogs.nytimes.com/2013/01/14/security-firm-discovers-global-spy-campaign
-
(2013)
The New York Times
-
-
Perlroth, N.1
-
51
-
-
84864166772
-
Denial-of-service: The Estonian Cyberwar and its implications for U. S. National Security
-
Richards J (2009) Denial-of-service: the Estonian Cyberwar and its implications for U. S. National Security. International Affairs Review 18:1. http://www.iar-gwu.org/node/65
-
(2009)
International Affairs Review
, vol.18
, pp. 1
-
-
Richards, J.1
-
52
-
-
84867650772
-
-
The New York Times 1 June 2012
-
Sanger DE (2012) Obama order sped up wave of cyberattacks against Iran. The New York Times 1 June 2012. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-ofcyberattacks-against-iran. html?pagewanted=all
-
(2012)
Obama Order Sped Up Wave of Cyberattacks Against Iran
-
-
Sanger, D.E.1
-
55
-
-
85192416305
-
-
chapter 2. 10 January 2002
-
Smith GC (2002) Compumetrically speaking, chapter 2. 10 January 2002. https://vmyths.com/column/2/2002/1/10
-
(2002)
Compumetrically Speaking
-
-
Smith, G.C.1
-
57
-
-
84859934099
-
A cyberwar of ideas? Deterrence and norms in cyberspace
-
Stevens T (2012) A cyberwar of ideas? Deterrence and norms in cyberspace. Contemp Secur Pol 33(1):148-170. http://dx.doi.org/10.1080/13523260.2012.659597
-
(2012)
Contemp Secur Pol
, vol.33
, Issue.1
, pp. 148-170
-
-
Stevens, T.1
-
59
-
-
47249141396
-
States, terrorism and state terrorism: The role of the superpowers
-
Slater R, Stohl M eds, Macmillan, London
-
Stohl M (1988) States, terrorism and state terrorism: the role of the superpowers. In: Slater R, Stohl M (eds) Current perspectives on international terrorism. Macmillan, London, pp 155-205
-
(1988)
Current Perspectives on International Terrorism
, pp. 155-205
-
-
Stohl, M.1
-
60
-
-
34247095107
-
Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games?
-
Stohl M (2006) Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Social Change 46:223-238
-
(2006)
Crime Law Social Change
, vol.46
, pp. 223-238
-
-
Stohl, M.1
-
61
-
-
85048941387
-
Al Qaeda and the Internet: The danger of "cyberplanning"
-
From Carlisle, Accessed 1 Feb. 2006
-
Thomas TL (2003) Al Qaeda and the Internet: the danger of "cyberplanning". Parameters 33(1):112-23, From Carlisle http://www.army.mil/usawc/Parameters/03spring/thomas.pdf. Accessed 1 Feb. 2006
-
(2003)
Parameters
, vol.33
, Issue.1
, pp. 112-123
-
-
Thomas, T.L.1
-
63
-
-
84867297056
-
Cybersecurity: A pre-history
-
Warner M (2012) Cybersecurity: a pre-history. Intell Natl Secur 27(5):781-799. http://dx.doi.org/10.1080/02684527.2012.708530
-
(2012)
Intell Natl Secur
, vol.27
, Issue.5
, pp. 781-799
-
-
Warner, M.1
-
65
-
-
85192428887
-
-
U. S. Army 639 War College, Carlisle Barracks, Pennsylvania, Accessed 1 March 2006
-
White CKC (1998) Cyber-terrorism: modem mayhem. U. S. Army 639 War College, Carlisle Barracks, Pennsylvania. http://stinet.dtic.mil/dticrev/a345705.pdf. Accessed 1 March 2006
-
(1998)
Cyber-terrorism: Modem Mayhem
-
-
White, C.K.C.1
|