R David Edelman. 2024. Rethinking Cyber Warfare. Rethinking Cyber Warfare.
Xuerong Li, Ping Zhang & Hongli Dong. (2024) A Robust Covert Attack Strategy for a Class of Uncertain Cyber-Physical Systems. IEEE Transactions on Automatic Control 69:3, pages 1983-1990.
Crossref
Sam Maesschalck. (2024) Gentlemen, you can't fight in here. Or can you?: How cyberspace operations impact international security. World Affairs 187:1, pages 24-36.
Crossref
Milos Vukelic. (2024) Characteristics of cyberspace as a distinct domain of conflict: A case study of U.S. strategic operations. Medjunarodni problemi International problems 76:1, pages 55-86.
Crossref
Jelena Vićić & Erik Gartzke. (2024) Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election. Journal of Peace Research 61:1, pages 10-27.
Crossref
Thomas Zeitzoff & Grace Gold. (2024) Cyber and contentious politics: Evidence from the US radical environmental movement. Journal of Peace Research 61:1, pages 134-149.
Crossref
Benjamin Jensen, Brandon Valeriano & Sam Whitt. (2024) How cyber operations can reduce escalation pressures: Evidence from an experimental wargame study. Journal of Peace Research 61:1, pages 119-133.
Crossref
Harry Oppenheimer. (2024) How the process of discovering cyberattacks biases our understanding of cybersecurity. Journal of Peace Research 61:1, pages 28-43.
Crossref
Jon R Lindsay. (2024) Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity. Journal of Peace Research 61:1, pages 87-102.
Crossref
Nadiya Kostyuk & Erik Gartzke. (2023) Fighting in Cyberspace: Internet Access and the Substitutability of Cyber and Military Operations. Journal of Conflict Resolution 68:1, pages 80-107.
Crossref
Sang Jin Oh, Sang Keun Cho & Yongseok Seo. (2024) Harnessing ICT-Enabled Warfare: A Comprehensive Review on South Korea’s Military Meta Power. IEEE Access 12, pages 46379-46400.
Crossref
Marko Pavićević & Mohammad Razaul Karim. 2024. Governance, Migration and Security in International Relations. Governance, Migration and Security in International Relations
89
102
.
Christopher Kinsey & Eyal Ben-Ari. 2024. Military Heroism in a Post-Heroic Era. Military Heroism in a Post-Heroic Era
251
267
.
Esma DİLEK, Özgür TALİH & Türksel BENSGHİR. (2023) Estonya 2007 Siber Saldırılarının İncelenmesi ve Ülkelerin Ulusal Siber Güvenlik Politikalarına EtkileriAn Examination of Estonia 2007 Cyber Attacks and the Effects on National Cyber Security Policies of Countries. Bilgi Yönetimi 6:2, pages 332-347.
Crossref
Srinidhi Madabhushi & Rinku Dewri. (2023) A survey of anomaly detection methods for power grids. International Journal of Information Security 22:6, pages 1799-1832.
Crossref
Kathryn Hedgecock & Lauren Sukin. (2023) Responding to Uncertainty: The Importance of Covertness in Support for Retaliation to Cyber and Kinetic Attacks. Journal of Conflict Resolution 67:10, pages 1873-1903.
Crossref
Khalid Majeed, Zaheer Masood, Muhammad Rizwan Ghori & Muhammad Asif Zahoor Raja. (2023) Design and analysis of cyber warfare model with intelligent predictive stochastic networks for attack–defend strategies on critical infrastructures. Applied Soft Computing 148, pages 110847.
Crossref
C. V. Suresh Babu & P. M. Akshara. 2023. Cyber Security Policies and Strategies of the World's Leading States. Cyber Security Policies and Strategies of the World's Leading States
49
68
.
João Marcos Barbosa Oliveira, Eduardo Stefani & Ivanir Costa. (2023) SILENT SKIRMISHES: CYBER WARFARE'S EROSION OF WESTPHALIAN PRINCIPLES IN THE PRELUDE TO THE 2022 RUSSIAN-UKRAINIAN WAR. Revista Contemporânea 3:9, pages 13420-13440.
Crossref
Michael P. Atkinson & Moshe Kress. (2023)
Resource allocation in
two‐layered cyber‐defense
. Naval Research Logistics (NRL) 70:6, pages 574-583.
Crossref
Siddhardha Kollabathini. 2023. Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations. Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations
96
104
.
Aykut ÇALIŞKAN. (2023) Siber Savaş: Bilgi Krizi Mi Yoksa Güvenliği Mi?Cyber Warfare: Information Crisis or Information Security?. SAVSAD Savunma ve Savaş Araştırmaları Dergisi 33:1, pages 1-32.
Crossref
Erica D. Lonergan, Margaret W. Smith & Grace B. Mueller. (2023)
Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine
*
.
Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine
*
.
Tahir Mahmood Azad, Muhammad Waqas Haider & Muhammad Sadiq. (2022) UNDERSTANDING GRAY ZONE WARFARE FROM MULTIPLE PERSPECTIVES. World Affairs 186:1, pages 81-104.
Crossref
Liudmyla Kormych & Yuliia Zavhorodnia. (2023) The concept of modern political confrontation in cyber space. Journal of Cybersecurity 9:1.
Crossref
Yong Xu, Zheng-Guang Wu & Jian Sun. (2023) Security-Based Passivity Analysis of Markov Jump Systems via Asynchronous Triggering Control. IEEE Transactions on Cybernetics 53:1, pages 151-160.
Crossref
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung
1
12
.
Joseph Rees & Christopher J. Rees. 2023. Applications for Artificial Intelligence and Digital Forensics in National Security. Applications for Artificial Intelligence and Digital Forensics in National Security
67
89
.
Pedro Ramón y Cajal Ramo, Claudia Castillo Arias, Jorge Carlos Manzanares Martínez & Jorge Maestre Vidal. 2023. Computer Security. ESORICS 2022 International Workshops. Computer Security. ESORICS 2022 International Workshops
431
448
.
Artur Gruszczak & Mateusz Kolaszyński. (2022) Understanding Contemporary Security: A Prolegomenon to the Interplay Between Technology, Innovation and Policy Responses. Politeja 19:4 (79).
Crossref
Pu Zhang, Qihe Shan, Tieshan Li & C. L. Philip Chen. (2022) Multi‐consensus recovery of multi‐agent system with cyber‐attack based on topology reconstruction controller. International Journal of Robust and Nonlinear Control 32:18, pages 9882-9901.
Crossref
Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis & David Hutchison. (2022) A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems. International Journal of Critical Infrastructure Protection 37, pages 100505.
Crossref
Joe Devanny, Luiz Rogério Franco Goldoni & Breno Pauli Medeiros. (2022) The rise of cyber power in Brazil. Revista Brasileira de Política Internacional 65:1.
Crossref
Xuerong Li, Ping Zhang & Hongli Dong. (2022) Robust Stealthy Covert Attacks on Cyber-Physical Systems. IFAC-PapersOnLine 55:6, pages 520-525.
Crossref
Sébastien‐Yves Laurent. 2021. Conflicts, Crimes and Regulations in Cyberspace. Conflicts, Crimes and Regulations in Cyberspace
1
42
.
Florian J Egloff & James Shires. (2022) Offensive Cyber Capabilities and State Violence: Three Logics of Integration. Journal of Global Security Studies 7:1.
Crossref
Joseph M. Brown & Tanisha M. Fazal. (2021) #SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations. European Journal of International Security 6:4, pages 401-417.
Crossref
Lianne J. M. Boer. 2021. International Law As We Know It. International Law As We Know It.
Florian J. Egloff & James Shires. (2021) The better angels of our digital nature? Offensive cyber capabilities and state violence. European Journal of International Security, pages 1-20.
Crossref
Julia Slupska. (2020) War, Health and Ecosystem: Generative Metaphors in Cybersecurity Governance. Philosophy & Technology 34:3, pages 463-482.
Crossref
Philipp M Lutscher. (2021) Digital Retaliation? Denial-of-Service Attacks after Sanction Events. Journal of Global Security Studies 6:4.
Crossref
Weiming Fu, Qichao Ma, Jiahu Qin & Yu Kang. (2020) Resilient consensus‐based distributed optimization under deception attacks. International Journal of Robust and Nonlinear Control 31:6, pages 1803-1816.
Crossref
Aaron F Brantly. (2021) Risk and uncertainty can be analyzed in cyberspace. Journal of Cybersecurity 7:1.
Crossref
Regner Sabillon. 2021. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
103
125
.
Stefan Soesanto & Max Smeets. 2021. NL ARMS Netherlands Annual Review of Military Studies 2020. NL ARMS Netherlands Annual Review of Military Studies 2020
385
400
.
Simon Butler. 2021. Socio-Technical Aspects in Security and Trust. Socio-Technical Aspects in Security and Trust
135
153
.
Ido Sivan-Sevilla & Shani Sharvit. 2021. Regulation in Israel. Regulation in Israel
173
193
.
Elizaveta Gaufman. 2021. The Palgrave Handbook of Digital Russia Studies. The Palgrave Handbook of Digital Russia Studies
115
134
.
Michael Adorjan. (2019) Review of Dyer-Witheford, N., & Matviyenko, S. (2019). Cyberwar and Revolution: Digital Subterfuge in Global Capitalism. Security Journal 33:4, pages 657-662.
Crossref
Agnieszka Warchoł. (2020) Cyberprzestrzeń w stanach nadzwyczajnych w Polsce - perspektywa porównawcza. Politeja 17:4(67), pages 110-127.
Crossref
Benjamin M Jensen, Christopher Whyte & Scott Cuomo. (2020) Algorithms at War: The Promise, Peril, and Limits of Artificial Intelligence. International Studies Review 22:3, pages 526-550.
Crossref
Daniel Lambach. (2020) The Territorialization of Cyberspace*. International Studies Review 22:3, pages 482-506.
Crossref
PAVEL VUK. (2020) CHALLENGES TO MILITARY STRATEGY IN THE 21ST CENTURY. CONTEMPORARY MILITARY CHALLENGES:Volume 2020, issue 22/1.
Crossref
. 2020. Encyclopedia of Public Administration and Public Policy, Third Edition. Encyclopedia of Public Administration and Public Policy, Third Edition
1
9
.
Karen Renaud, Craig Orgeron, Merrill Warkentin & P. Edward French. (2020) Cyber Security Responsibilization: An Evaluation of the Intervention Approaches Adopted by the Five Eyes Countries and China. Public Administration Review 80:4, pages 577-589.
Crossref
Weiming Fu, Jiahu Qin, Yang Shi, Wei Xing Zheng & Yu Kang. (2020) Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks. IEEE Transactions on Industrial Informatics 16:7, pages 4868-4877.
Crossref
Frédérick Douzet & Aude Géry. (2020) Le cyberespace, ça sert, d’abord, à faire la guerre. Prolifération, sécurité et stabilité du cyberespace. Hérodote N° 177-178:2, pages 329-350.
Crossref
Camille François & Herbert Lin. (2020) Cartographier un angle mort : la surprise stratégique des opérations informationnelles russes sur les réseaux sociaux en 2016. Hérodote N° 177-178:2, pages 33-57.
Crossref
Henning Lahmann. 2020. Unilateral Remedies to Cyber Operations. Unilateral Remedies to Cyber Operations.
Michael C. Horowitz. (2020) Do Emerging Military Technologies Matter for International Politics?. Annual Review of Political Science 23:1, pages 385-400.
Crossref
Matthias Schulze. (2020) Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations. Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations.
Jeffrey Kurebwa & Kundai Lillian Matenga. 2020. Cyber Warfare and Terrorism. Cyber Warfare and Terrorism
1485
1505
.
Christopher Whyte. (2020) Cyber conflict or democracy “hacked”? How cyber operations enhance information warfare. Journal of Cybersecurity 6:1.
Crossref
Sampsa Rauti. 2020. Security in Computing and Communications. Security in Computing and Communications
335
347
.
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung
1
11
.
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung
199
208
.
Ricky Wichum. 2020. Handbuch Virtualität. Handbuch Virtualität
669
680
.
Michael Andreas. 2020. Handbuch Virtualität. Handbuch Virtualität
217
230
.
Seiko Watanabe. 2020. Human-Centric Computing in a Data-Driven Society. Human-Centric Computing in a Data-Driven Society
222
232
.
Rodrigo Adeodato & Sina Pournouri. 2020. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
397
429
.
Julia Slupska & Mariarosaria Taddeo. 2020. The 2019 Yearbook of the Digital Ethics Lab. The 2019 Yearbook of the Digital Ethics Lab
11
30
.
Aaron Brantly & Max Smeets. 2020. Handbook of Military Sciences. Handbook of Military Sciences
1
16
.
Gyunghoon Park, Chanhwa Lee, Hyungbo Shim, Yongsoon Eun & Karl H. Johansson. (2019) Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack. IEEE Transactions on Automatic Control 64:12, pages 4907-4919.
Crossref
Donald Stoker. 2019. Why America Loses Wars. Why America Loses Wars.
Bryson R. Payne & Edward L. Mienie. (2019) The Impact of Cyber-Physical Warfare on Global Human Security. International Journal of Cyber Warfare and Terrorism 9:3, pages 36-50.
Crossref
Anthony Ween, Peter Dortmans, Nitin Thakur & Cayt Rowe. (2017) Framing cyber warfare: an analyst’s perspective. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 16:3, pages 335-345.
Crossref
Germán Alejandro Patiño Orozco. (2019) El sistema internacional cibernético: elementos de análisis. OASIS:30, pages 163-186.
Crossref
Yavuz Akdag. (2018) The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective. Journal of Chinese Political Science 24:2, pages 225-247.
Crossref
Henry E. Brady. (2019) The Challenge of Big Data and Data Science. Annual Review of Political Science 22:1, pages 297-323.
Crossref
Merve Erdem & Gürkan Özocak. (2019) Siber Güvenliğin Sağlanmasında Uluslararası Hukukun ve Türk Hukukunun Rolü. Ankara Üniversitesi Hukuk Fakültesi Dergisi, pages 127-212.
Crossref
Barry Cartwright, George R. S. Weir & Richard Frank. 2019. Security, Privacy, and Digital Forensics in the Cloud. Security, Privacy, and Digital Forensics in the Cloud
217
237
.
Erika A. Parn & David Edwards. (2019) Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management 26:2, pages 245-266.
Crossref
Peter Olsthoorn. (2019) Ethiek voor Cyberkrijg en Cyberkrijgers. Algemeen Nederlands Tijdschrift voor Wijsbegeerte 111:1, pages 95-109.
Crossref
Nadiya Kostyuk & Yuri M. Zhukov. (2017) Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?. Journal of Conflict Resolution 63:2, pages 317-347.
Crossref
Peter Dombrowski & Chris C. Demchak. 2019. National Security. National Security
44
59
.
Jeffrey Kurebwa & Kundai Lillian Matenga. 2019. Global Cyber Security Labor Shortage and International Business Risk. Global Cyber Security Labor Shortage and International Business Risk
381
401
.
. 2019. Géopolitique des données numériques. Géopolitique des données numériques
171
174
.
Sarah Kreps & Jacquelyn Schneider. (2019) Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics. Journal of Cybersecurity 5:1.
Crossref
Christian Reuter, Thea Riebe, Larissa Aldehoff, Marc-André Kaufhold & Thomas Reinhold. 2019. Cyberwar – die Digitalisierung der Kriegsführung. Cyberwar – die Digitalisierung der Kriegsführung
15
38
.
Christian Reuter, Larissa Aldehoff, Thea Riebe & Marc-André Kaufhold. 2019. Information Technology for Peace and Security. Information Technology for Peace and Security
11
37
.
Ricky Wichum. 2019. Handbuch Virtualität. Handbuch Virtualität
1
13
.
Michael Andreas. 2019. Handbuch Virtualität. Handbuch Virtualität
1
14
.
Adelaide Baronchelli. (2018) Conflict in Cyber-Space: The Network of Cyber Incidents, 2000–2014. Peace Economics, Peace Science and Public Policy 24:4.
Crossref
Frédérick Douzet & Alix Desforges. (2018) Du cyberespace à la datasphère. Le nouveau front pionnier de la géographieFrom cyberspace to the datasphere: the new frontier of geography. Netcom:32-1/2, pages 87-108.
Crossref
Ghita Mezzour, Kathleen M. Carley & L. Richard Carley. (2018) Remote assessment of countries’ cyber weapon capabilities. Social Network Analysis and Mining 8:1.
Crossref
Michael Poznansky & Evan Perkoski. (2018) Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution. Journal of Global Security Studies 3:4, pages 402-416.
Crossref
Christopher J. Finlay. (2018) Just War, Cyber War, and the Concept of Violence. Philosophy & Technology 31:3, pages 357-377.
Crossref
Marek Górka. (2018) Cybersecurity as a challenge for modern state and society. Zeszyty Naukowe Uniwersytetu Szczecińskiego. Acta Politica 44, pages 29-39.
Crossref
Hans-Georg Ehrhart. (2018) Kriege und Kriegführung der Staaten des Globalen Nordens im 21. JahrhundertWar and Warfare of the States in the Global North in the 21st Century. Zeitschrift für Außen- und Sicherheitspolitik 11:1, pages 65-81.
Crossref
Daniel P. Hughes. 2018. Cyber Weaponry. Cyber Weaponry
71
85
.
Armin KrishnanArmin Krishnan. 2018. Why Paramilitary Operations Fail. Why Paramilitary Operations Fail
229
248
.
Eugenio Cusumano & Marian Corbe. 2018. A Civil-Military Response to Hybrid Threats. A Civil-Military Response to Hybrid Threats
1
14
.
Simone Dossi. 2018. US Foreign Policy in a Challenging World. US Foreign Policy in a Challenging World
357
377
.
Stefan Hügel, Hans-Jörg Kreowski & Dietrich Meyer-Ebrecht. 2018. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
885
909
.
Daniel F. Baltrusaits. 2018. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
787
808
.
Amaël Cattaruzza. 2017. Guerre et Technique. Guerre et Technique
309
322
.
Siim Alatalu. (2017) One year after Warsaw: The growing need for a NATO cyber command. One year after Warsaw: The growing need for a NATO cyber command.
Marek Górka. (2017) Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa. Cywilizacja i Polityka 15:15, pages 295-315.
Crossref
PIKA ŠARF. (2017) LEGALITY OF LOW-INTENSITY CYBER OPERATIONS UNDER INTERNATIONAL LAW. CONTEMPORARY MILITARY CHALLENGES:VOLUME 2017 ISSUE 19/3, pages 81-93.
Crossref
Jozef ValuchTomáš GábrišOndrej Hamuľák. (2017) Cyber Attacks, Information Attacks, and Postmodern Warfare. Baltic Journal of Law & Politics 10:1, pages 63-89.
Crossref
Kubo Macak. (2017) From the vanishing point back to the core: The impact of the development of the cyber law of war on general international law. From the vanishing point back to the core: The impact of the development of the cyber law of war on general international law.
Brad Bigelow. (2017) Mission assurance: Shifting the focus of cyber defence. Mission assurance: Shifting the focus of cyber defence.
Shuang Wu, Ziyang Guo, Dawei Shi, Karl Henrik Johansson & Ling Shi. (2017) Optimal innovation-based deception attack on remote state estimation. Optimal innovation-based deception attack on remote state estimation.
Christopher J. Finlay. (2017) The concept of violence in international theory: a Double-Intent Account. International Theory 9:1, pages 67-100.
Crossref
Austin Long. (2017) A cyber SIOP? Operational considerations for strategic offensive cyber planning. Journal of Cybersecurity.
Crossref
Erik Gartzke & Jon R. Lindsay. (2017) Thermonuclear cyberwar. Journal of Cybersecurity.
Crossref
Éric Letonturier. 2017. Guerre, armées et communication. Guerre, armées et communication
7
38
.
Jan Kallberg & Thomas S. Cook. (2017) The Unfitness of Traditional Military Thinking in Cyber. IEEE Access 5, pages 8126-8130.
Crossref
Metodi Hadji-Janev & Mitko Bogdanoski. (2017) Swarming-based cyber defence under the framework of collective security. Security Journal 30:1, pages 39-59.
Crossref
Daniel Hughes & Andrew Colarik. 2017. Intelligence and Security Informatics. Intelligence and Security Informatics
15
33
.
Max-Otto Baumann & Wolf J. Schünemann. 2017. Privacy, Data Protection and Cybersecurity in Europe. Privacy, Data Protection and Cybersecurity in Europe
1
14
.
Jack McDonald. 2017. Ethics and Policies for Cyber Operations. Ethics and Policies for Cyber Operations
17
32
.
Stefan Hügel, Hans-Jörg Kreowski & Dietrich Meyer-Ebrecht. 2017. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
1
25
.
Daniel F. Baltrusaits. 2017. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
1
22
.
Elsa B. Kania. (2016) Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking. Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking.
Antonio Roque, Kevin B. Bush & Christopher Degni. (2016) Security is about control. Security is about control.
Mohsen Zamani, Alireza Khosravian & Brett Ninness. (2016) Compensation of attacks on consensus networks. Compensation of attacks on consensus networks.
Wade L. Huntley. (2016) Strategic Implications of Offense and Defense in Cyberwar. Strategic Implications of Offense and Defense in Cyberwar.
Bibi van den Berg. 2016. Data Protection on the Move. Data Protection on the Move
1
24
.
Jon R. Lindsay. (2015) Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, pages tyv003.
Crossref
Mohsen Zamani, Uwe Helmke & Brian D.O. Anderson. (2015) Zeros of networked systems with time-invariant interconnections. Automatica 61, pages 97-105.
Crossref
Muhammad Adeka, Simon Shepherd, Raed Abd-Alhameed & Nuredin A. S Ahmed. (2015) A Versatile and Ubiquitous Secret Sharing. A Versatile and Ubiquitous Secret Sharing.
Artur de Matos Alves. (2015) Between the “Battlefield” Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict. Canadian Journal of Communication 40:3, pages 389-406.
Crossref
Gila Albert, Erwin A. Blackstone, Simon Hakim & Yoram Shiftan. 2015. Securing Transportation Systems. Securing Transportation Systems
1
21
.
Barney Warf. (2015) Cyberwar: A new frontier for political geography. Political Geography 46, pages 89-90.
Crossref
Michael Robinson, Kevin Jones & Helge Janicke. (2015) Cyber warfare: Issues and challenges. Computers & Security 49, pages 70-94.
Crossref
. (2015) Secure Control Systems: A Quantitative Risk Management Approach. IEEE Control Systems 35:1, pages 24-45.
Crossref
Peter Dombrowski & Chris C. Demchak. 2015. Cybersecurity Policies and Strategies for Cyberwarfare Prevention. Cybersecurity Policies and Strategies for Cyberwarfare Prevention
367
382
.
Jon R. Lindsay. (2015) The Impact of China on Cybersecurity: Fiction and Friction. International Security 39:3, pages 7-47.
Crossref
W. James Jacob. 2015. Technology and Workplace Skills for the Twenty-First Century. Technology and Workplace Skills for the Twenty-First Century
25
36
.
Ryan C. Maness & Brandon ValerianoRyan C. Maness & Brandon Valeriano. 2015. Russia's Coercive Diplomacy. Russia's Coercive Diplomacy
85
107
.
Brian M. Mazanec & Bradley A. ThayerBrian M. Mazanec & Bradley A. Thayer. 2015. Deterring Cyber Warfare. Deterring Cyber Warfare
11
28
.
André Teixeira, Iman Shames, Henrik Sandberg & Karl Henrik Johansson. (2015) A secure control framework for resource-limited adversaries. Automatica 51, pages 135-148.
Crossref
André Teixeira, Friederich Kupzog, Henrik Sandberg & Karl H. Johansson. 2015. Smart Grid Security. Smart Grid Security
149
183
.
Emily Fekete. (2020) The Shifting Nature of Cyberwarfare in Middle Eastern States. CyberOrient 9:1, pages 32-56.
Crossref
Jeppe Teglskov Jacobsen. (2014) Clausewitz and the Utility of Cyberattacks in War. International Journal of Cyber Warfare and Terrorism 4:4, pages 1-16.
Crossref
David Ormrod. (2014) The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface. The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface.
Ulrik Franke & Joel Brynielsson. (2014) Cyber situational awareness – A systematic review of the literature. Computers & Security 46, pages 18-31.
Crossref
Stéphane Bernard Bazan, Sabrine Saad & Addis Tesfa. (2014) Infowar on the web. Infowar on the web.