69,336
Views
225
CrossRef citations to date
0
Altmetric
Original Articles

Cyber War Will Not Take Place

Pages 5-32 | Published online: 05 Oct 2011

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (51)

Yehonatan Abramson & Gil Baram. (2024) Saving face in the cyberspace: Responses to public cyber intrusions in the Gulf. Contemporary Security Policy 45:2, pages 210-238.
Read now
Max Smeets. (2023) The challenges of military adaptation to the cyber domain: a case study of the Netherlands. Small Wars & Insurgencies 34:7, pages 1343-1362.
Read now
Ryan Shandler & Miguel Alberto Gomez. (2023) The hidden threat of cyber-attacks – undermining public confidence in government. Journal of Information Technology & Politics 20:4, pages 359-374.
Read now
Syed Ahmed Pasha, Rijha Safdar & Syed Taha Ali. (2023) False data injection attacks on networked control systems. Journal of Control and Decision 0:0, pages 1-10.
Read now
. (2023) From the editors. Journal of Strategic Studies 46:3, pages 497-501.
Read now
Lennart Maschmeyer. (2023) A new and better quiet option? Strategies of subversion and cyber conflict. Journal of Strategic Studies 46:3, pages 570-594.
Read now
Erica D. Borghard & Shawn W. Lonergan. (2023) Deterrence by denial in cyberspace. Journal of Strategic Studies 46:3, pages 534-569.
Read now
Sarah Backman. (2023) Normal cyber accidents. Journal of Cyber Policy 8:1, pages 114-130.
Read now
Fredrik D. Hjorthen & James Pattison. (2023) Proportionality in cyberwar and just war theory. Ethics & Global Politics 16:1, pages 1-24.
Read now
Lokendra Sharma. (2023) No Shortcuts: Why States Struggle to Develop a Military Cyber-Force. Defence Studies 23:1, pages 150-152.
Read now
. (2022) From the editors. Journal of Strategic Studies 45:4, pages 507-510.
Read now
Richard J. Harknett & Max Smeets. (2022) Cyber campaigns and strategic outcomes. Journal of Strategic Studies 45:4, pages 534-567.
Read now
. (2022) From the editors. Journal of Strategic Studies 45:1, pages 1-4.
Read now
Christopher Whyte. (2021) Using Mini-Games to Teach Cyber Issues to Social Science Students. Journal of Political Science Education 17:sup1, pages 215-225.
Read now
Vladimir Rauta. (2021) A conceptual critique of remote warfare. Defence Studies 21:4, pages 545-572.
Read now
Murat Caliskan & Michel Liégeois. (2021) The concept of ‘hybrid warfare’ undermines NATO’s strategic thinking: insights from interviews with NATO officials. Small Wars & Insurgencies 32:2, pages 295-319.
Read now
Frédérick Douzet, Kévin Limonier, Selma Mihoubi & Elodie René. (2021) Mapping the spread of Russian and Chinese contents on the French-speaking African web. Journal of Cyber Policy 6:1, pages 50-67.
Read now
Lennart Maschmeyer, Ronald J. Deibert & Jon R. Lindsay. (2021) A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society. Journal of Information Technology & Politics 18:1, pages 1-20.
Read now
Miguel Alberto Gomez. (2021) Overcoming uncertainty in cyberspace: strategic culture and cognitive schemas. Defence Studies 21:1, pages 25-46.
Read now
Carlos Solar. (2020) Cybersecurity and cyber defence in the emerging democracies. Journal of Cyber Policy 5:3, pages 392-412.
Read now
Thomas Paterson & Lauren Hanley. (2020) Political warfare in the digital age: cyber subversion, information operations and ‘deep fakes’. Australian Journal of International Affairs 74:4, pages 439-454.
Read now
Christian Leuprecht, Joseph Szeman & David B. Skillicorn. (2019) The Damoclean sword of offensive cyber: Policy uncertainty and collective insecurity. Contemporary Security Policy 40:3, pages 382-407.
Read now
Stéphane Taillat. (2019) Disrupt and restraint: The evolution of cyber conflict and the implications for collective security. Contemporary Security Policy 40:3, pages 368-381.
Read now
Samuel Zilincik, Michael Myklin & Petr Kovanda. (2019) Cyber power and control: a perspective from strategic theory. Journal of Cyber Policy 4:2, pages 290-301.
Read now
Jan Almäng. (2019) War, vagueness and hybrid war. Defence Studies 19:2, pages 189-204.
Read now
Forrest B. Hare. (2019) Precision cyber weapon systems: An important component of a responsible national security strategy?. Contemporary Security Policy 40:2, pages 193-213.
Read now
Kersti Larsdotter. (2019) Military strategy in the 21st century. Journal of Strategic Studies 42:2, pages 155-170.
Read now
Alexander Claver. (2018) Governance of cyber warfare in the Netherlands: an exploratory investigation. The International Journal of Intelligence, Security, and Public Affairs 20:2, pages 155-180.
Read now
Eitan Shamir & Eyal Ben-Ari. (2018) The Rise of Special Operations Forces: Generalized Specialization, Boundary Spanning and Military Autonomy. Journal of Strategic Studies 41:3, pages 335-371.
Read now
Wyatt Hoffman & Tristan A. Volpe. (2018) Internet of nuclear things: Managing the proliferation risks of 3-D printing technology. Bulletin of the Atomic Scientists 74:2, pages 102-113.
Read now
Max Smeets. (2018) A matter of time: On the transitory nature of cyberweapons. Journal of Strategic Studies 41:1-2, pages 6-32.
Read now
Travis Sharp. (2017) Theorizing cyber coercion: The 2014 North Korean operation against Sony. Journal of Strategic Studies 40:7, pages 898-926.
Read now
André Barrinha & Thomas Renard. (2017) Cyber-diplomacy: the making of an international society in the digital age. Global Affairs 3:4-5, pages 353-364.
Read now
Dan Bousfield. (2017) Revisiting Cyber-Diplomacy: Canada–China Relations Online. Globalizations 14:6, pages 1045-1059.
Read now
Debora Halbert. (2016) Intellectual property theft and national security: Agendas and assumptions. The Information Society 32:4, pages 256-268.
Read now
David Ormrod & Benjamin Turnbull. (2016) The cyber conceptual framework for developing military doctrine. Defence Studies 16:3, pages 270-298.
Read now
Barney Warf & Emily Fekete. (2016) Relational geographies of cyberterrorism and cyberwar. Space and Polity 20:2, pages 143-157.
Read now
Joe Burton. (2015) NATO’s cyber defence: strategic challenges and institutional adaptation. Defence Studies 15:4, pages 297-319.
Read now
. (2015) From the Editors. Journal of Strategic Studies 38:1-2, pages 1-3.
Read now
George R. Lucas$suffix/text()$suffix/text(). (2014) Ethics and Cyber Conflict: A Response to JME 12:1 (2013). Journal of Military Ethics 13:1, pages 20-31.
Read now
Avner Levin & Paul Goodrick. (2013) From cybercrime to cyberwar? The international policy shift and its implications for Canada. Canadian Foreign Policy Journal 19:2, pages 127-143.
Read now
. (2013) From the Editors. Journal of Strategic Studies 36:1, pages 1-3.
Read now
John Stone. (2013) Cyber War Will Take Place!. Journal of Strategic Studies 36:1, pages 101-108.
Read now
Nate D. F. Allen & Matthew La Lime. New technology, old strategy: Cyberspace and the international politics of African agency. Journal of Strategic Studies 0:0, pages 1-26.
Read now

Articles from other publishers (174)

R David Edelman. 2024. Rethinking Cyber Warfare. Rethinking Cyber Warfare.
Xuerong Li, Ping Zhang & Hongli Dong. (2024) A Robust Covert Attack Strategy for a Class of Uncertain Cyber-Physical Systems. IEEE Transactions on Automatic Control 69:3, pages 1983-1990.
Crossref
Sam Maesschalck. (2024) Gentlemen, you can't fight in here. Or can you?: How cyberspace operations impact international security. World Affairs 187:1, pages 24-36.
Crossref
Milos Vukelic. (2024) Characteristics of cyberspace as a distinct domain of conflict: A case study of U.S. strategic operations. Medjunarodni problemi International problems 76:1, pages 55-86.
Crossref
Jelena Vićić & Erik Gartzke. (2024) Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election. Journal of Peace Research 61:1, pages 10-27.
Crossref
Thomas Zeitzoff & Grace Gold. (2024) Cyber and contentious politics: Evidence from the US radical environmental movement. Journal of Peace Research 61:1, pages 134-149.
Crossref
Benjamin Jensen, Brandon Valeriano & Sam Whitt. (2024) How cyber operations can reduce escalation pressures: Evidence from an experimental wargame study. Journal of Peace Research 61:1, pages 119-133.
Crossref
Harry Oppenheimer. (2024) How the process of discovering cyberattacks biases our understanding of cybersecurity. Journal of Peace Research 61:1, pages 28-43.
Crossref
Jon R Lindsay. (2024) Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity. Journal of Peace Research 61:1, pages 87-102.
Crossref
Nadiya Kostyuk & Erik Gartzke. (2023) Fighting in Cyberspace: Internet Access and the Substitutability of Cyber and Military Operations. Journal of Conflict Resolution 68:1, pages 80-107.
Crossref
Sang Jin Oh, Sang Keun Cho & Yongseok Seo. (2024) Harnessing ICT-Enabled Warfare: A Comprehensive Review on South Korea’s Military Meta Power. IEEE Access 12, pages 46379-46400.
Crossref
Marko Pavićević & Mohammad Razaul Karim. 2024. Governance, Migration and Security in International Relations. Governance, Migration and Security in International Relations 89 102 .
Christopher Kinsey & Eyal Ben-Ari. 2024. Military Heroism in a Post-Heroic Era. Military Heroism in a Post-Heroic Era 251 267 .
Esma DİLEK, Özgür TALİH & Türksel BENSGHİR. (2023) Estonya 2007 Siber Saldırılarının İncelenmesi ve Ülkelerin Ulusal Siber Güvenlik Politikalarına EtkileriAn Examination of Estonia 2007 Cyber Attacks and the Effects on National Cyber Security Policies of Countries. Bilgi Yönetimi 6:2, pages 332-347.
Crossref
Srinidhi Madabhushi & Rinku Dewri. (2023) A survey of anomaly detection methods for power grids. International Journal of Information Security 22:6, pages 1799-1832.
Crossref
Kathryn Hedgecock & Lauren Sukin. (2023) Responding to Uncertainty: The Importance of Covertness in Support for Retaliation to Cyber and Kinetic Attacks. Journal of Conflict Resolution 67:10, pages 1873-1903.
Crossref
Khalid Majeed, Zaheer Masood, Muhammad Rizwan Ghori & Muhammad Asif Zahoor Raja. (2023) Design and analysis of cyber warfare model with intelligent predictive stochastic networks for attack–defend strategies on critical infrastructures. Applied Soft Computing 148, pages 110847.
Crossref
C. V. Suresh Babu & P. M. Akshara. 2023. Cyber Security Policies and Strategies of the World's Leading States. Cyber Security Policies and Strategies of the World's Leading States 49 68 .
João Marcos Barbosa Oliveira, Eduardo Stefani & Ivanir Costa. (2023) SILENT SKIRMISHES: CYBER WARFARE'S EROSION OF WESTPHALIAN PRINCIPLES IN THE PRELUDE TO THE 2022 RUSSIAN-UKRAINIAN WAR. Revista Contemporânea 3:9, pages 13420-13440.
Crossref
Michael P. Atkinson & Moshe Kress. (2023) Resource allocation in two‐layered cyber‐defense . Naval Research Logistics (NRL) 70:6, pages 574-583.
Crossref
Siddhardha Kollabathini. 2023. Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations. Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations 96 104 .
Aykut ÇALIŞKAN. (2023) Siber Savaş: Bilgi Krizi Mi Yoksa Güvenliği Mi?Cyber Warfare: Information Crisis or Information Security?. SAVSAD Savunma ve Savaş Araştırmaları Dergisi 33:1, pages 1-32.
Crossref
Erica D. Lonergan, Margaret W. Smith & Grace B. Mueller. (2023) Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine * . Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine * .
Tahir Mahmood Azad, Muhammad Waqas Haider & Muhammad Sadiq. (2022) UNDERSTANDING GRAY ZONE WARFARE FROM MULTIPLE PERSPECTIVES. World Affairs 186:1, pages 81-104.
Crossref
Liudmyla Kormych & Yuliia Zavhorodnia. (2023) The concept of modern political confrontation in cyber space. Journal of Cybersecurity 9:1.
Crossref
Yong Xu, Zheng-Guang Wu & Jian Sun. (2023) Security-Based Passivity Analysis of Markov Jump Systems via Asynchronous Triggering Control. IEEE Transactions on Cybernetics 53:1, pages 151-160.
Crossref
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung 1 12 .
Joseph Rees & Christopher J. Rees. 2023. Applications for Artificial Intelligence and Digital Forensics in National Security. Applications for Artificial Intelligence and Digital Forensics in National Security 67 89 .
Pedro Ramón y Cajal Ramo, Claudia Castillo Arias, Jorge Carlos Manzanares Martínez & Jorge Maestre Vidal. 2023. Computer Security. ESORICS 2022 International Workshops. Computer Security. ESORICS 2022 International Workshops 431 448 .
Artur Gruszczak & Mateusz Kolaszyński. (2022) Understanding Contemporary Security: A Prolegomenon to the Interplay Between Technology, Innovation and Policy Responses. Politeja 19:4 (79).
Crossref
Pu Zhang, Qihe Shan, Tieshan Li & C. L. Philip Chen. (2022) Multi‐consensus recovery of multi‐agent system with cyber‐attack based on topology reconstruction controller. International Journal of Robust and Nonlinear Control 32:18, pages 9882-9901.
Crossref
Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis & David Hutchison. (2022) A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems. International Journal of Critical Infrastructure Protection 37, pages 100505.
Crossref
Joe Devanny, Luiz Rogério Franco Goldoni & Breno Pauli Medeiros. (2022) The rise of cyber power in Brazil. Revista Brasileira de Política Internacional 65:1.
Crossref
Xuerong Li, Ping Zhang & Hongli Dong. (2022) Robust Stealthy Covert Attacks on Cyber-Physical Systems. IFAC-PapersOnLine 55:6, pages 520-525.
Crossref
Sébastien‐Yves Laurent. 2021. Conflicts, Crimes and Regulations in Cyberspace. Conflicts, Crimes and Regulations in Cyberspace 1 42 .
Florian J Egloff & James Shires. (2022) Offensive Cyber Capabilities and State Violence: Three Logics of Integration. Journal of Global Security Studies 7:1.
Crossref
Joseph M. Brown & Tanisha M. Fazal. (2021) #SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations. European Journal of International Security 6:4, pages 401-417.
Crossref
Lianne J. M. Boer. 2021. International Law As We Know It. International Law As We Know It.
Florian J. Egloff & James Shires. (2021) The better angels of our digital nature? Offensive cyber capabilities and state violence. European Journal of International Security, pages 1-20.
Crossref
Julia Slupska. (2020) War, Health and Ecosystem: Generative Metaphors in Cybersecurity Governance. Philosophy & Technology 34:3, pages 463-482.
Crossref
Philipp M Lutscher. (2021) Digital Retaliation? Denial-of-Service Attacks after Sanction Events. Journal of Global Security Studies 6:4.
Crossref
Weiming Fu, Qichao Ma, Jiahu Qin & Yu Kang. (2020) Resilient consensus‐based distributed optimization under deception attacks. International Journal of Robust and Nonlinear Control 31:6, pages 1803-1816.
Crossref
Aaron F Brantly. (2021) Risk and uncertainty can be analyzed in cyberspace. Journal of Cybersecurity 7:1.
Crossref
Regner Sabillon. 2021. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM 103 125 .
Stefan Soesanto & Max Smeets. 2021. NL ARMS Netherlands Annual Review of Military Studies 2020. NL ARMS Netherlands Annual Review of Military Studies 2020 385 400 .
Simon Butler. 2021. Socio-Technical Aspects in Security and Trust. Socio-Technical Aspects in Security and Trust 135 153 .
Ido Sivan-Sevilla & Shani Sharvit. 2021. Regulation in Israel. Regulation in Israel 173 193 .
Elizaveta Gaufman. 2021. The Palgrave Handbook of Digital Russia Studies. The Palgrave Handbook of Digital Russia Studies 115 134 .
Michael Adorjan. (2019) Review of Dyer-Witheford, N., & Matviyenko, S. (2019). Cyberwar and Revolution: Digital Subterfuge in Global Capitalism. Security Journal 33:4, pages 657-662.
Crossref
Agnieszka Warchoł. (2020) Cyberprzestrzeń w stanach nadzwyczajnych w Polsce - perspektywa porównawcza. Politeja 17:4(67), pages 110-127.
Crossref
Benjamin M Jensen, Christopher Whyte & Scott Cuomo. (2020) Algorithms at War: The Promise, Peril, and Limits of Artificial Intelligence. International Studies Review 22:3, pages 526-550.
Crossref
Daniel Lambach. (2020) The Territorialization of Cyberspace*. International Studies Review 22:3, pages 482-506.
Crossref
PAVEL VUK. (2020) CHALLENGES TO MILITARY STRATEGY IN THE 21ST CENTURY. CONTEMPORARY MILITARY CHALLENGES:Volume 2020, issue 22/1.
Crossref
. 2020. Encyclopedia of Public Administration and Public Policy, Third Edition. Encyclopedia of Public Administration and Public Policy, Third Edition 1 9 .
Karen Renaud, Craig Orgeron, Merrill Warkentin & P. Edward French. (2020) Cyber Security Responsibilization: An Evaluation of the Intervention Approaches Adopted by the Five Eyes Countries and China. Public Administration Review 80:4, pages 577-589.
Crossref
Weiming Fu, Jiahu Qin, Yang Shi, Wei Xing Zheng & Yu Kang. (2020) Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks. IEEE Transactions on Industrial Informatics 16:7, pages 4868-4877.
Crossref
Frédérick Douzet & Aude Géry. (2020) Le cyberespace, ça sert, d’abord, à faire la guerre. Prolifération, sécurité et stabilité du cyberespace. Hérodote N° 177-178:2, pages 329-350.
Crossref
Camille François & Herbert Lin. (2020) Cartographier un angle mort : la surprise stratégique des opérations informationnelles russes sur les réseaux sociaux en 2016. Hérodote N° 177-178:2, pages 33-57.
Crossref
Henning Lahmann. 2020. Unilateral Remedies to Cyber Operations. Unilateral Remedies to Cyber Operations.
Michael C. Horowitz. (2020) Do Emerging Military Technologies Matter for International Politics?. Annual Review of Political Science 23:1, pages 385-400.
Crossref
Matthias Schulze. (2020) Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations. Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations.
Jeffrey Kurebwa & Kundai Lillian Matenga. 2020. Cyber Warfare and Terrorism. Cyber Warfare and Terrorism 1485 1505 .
Christopher Whyte. (2020) Cyber conflict or democracy “hacked”? How cyber operations enhance information warfare. Journal of Cybersecurity 6:1.
Crossref
Sampsa Rauti. 2020. Security in Computing and Communications. Security in Computing and Communications 335 347 .
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung 1 11 .
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung 199 208 .
Ricky Wichum. 2020. Handbuch Virtualität. Handbuch Virtualität 669 680 .
Michael Andreas. 2020. Handbuch Virtualität. Handbuch Virtualität 217 230 .
Seiko Watanabe. 2020. Human-Centric Computing in a Data-Driven Society. Human-Centric Computing in a Data-Driven Society 222 232 .
Rodrigo Adeodato & Sina Pournouri. 2020. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity 397 429 .
Julia Slupska & Mariarosaria Taddeo. 2020. The 2019 Yearbook of the Digital Ethics Lab. The 2019 Yearbook of the Digital Ethics Lab 11 30 .
Aaron Brantly & Max Smeets. 2020. Handbook of Military Sciences. Handbook of Military Sciences 1 16 .
Gyunghoon Park, Chanhwa Lee, Hyungbo Shim, Yongsoon Eun & Karl H. Johansson. (2019) Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack. IEEE Transactions on Automatic Control 64:12, pages 4907-4919.
Crossref
Donald Stoker. 2019. Why America Loses Wars. Why America Loses Wars.
Bryson R. Payne & Edward L. Mienie. (2019) The Impact of Cyber-Physical Warfare on Global Human Security. International Journal of Cyber Warfare and Terrorism 9:3, pages 36-50.
Crossref
Anthony Ween, Peter Dortmans, Nitin Thakur & Cayt Rowe. (2017) Framing cyber warfare: an analyst’s perspective. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 16:3, pages 335-345.
Crossref
Germán Alejandro Patiño Orozco. (2019) El sistema internacional cibernético: elementos de análisis. OASIS:30, pages 163-186.
Crossref
Yavuz Akdag. (2018) The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective. Journal of Chinese Political Science 24:2, pages 225-247.
Crossref
Henry E. Brady. (2019) The Challenge of Big Data and Data Science. Annual Review of Political Science 22:1, pages 297-323.
Crossref
Merve Erdem & Gürkan Özocak. (2019) Siber Güvenliğin Sağlanmasında Uluslararası Hukukun ve Türk Hukukunun Rolü. Ankara Üniversitesi Hukuk Fakültesi Dergisi, pages 127-212.
Crossref
Barry Cartwright, George R. S. Weir & Richard Frank. 2019. Security, Privacy, and Digital Forensics in the Cloud. Security, Privacy, and Digital Forensics in the Cloud 217 237 .
Erika A. Parn & David Edwards. (2019) Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management 26:2, pages 245-266.
Crossref
Peter Olsthoorn. (2019) Ethiek voor Cyberkrijg en Cyberkrijgers. Algemeen Nederlands Tijdschrift voor Wijsbegeerte 111:1, pages 95-109.
Crossref
Nadiya Kostyuk & Yuri M. Zhukov. (2017) Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?. Journal of Conflict Resolution 63:2, pages 317-347.
Crossref
Peter Dombrowski & Chris C. Demchak. 2019. National Security. National Security 44 59 .
Jeffrey Kurebwa & Kundai Lillian Matenga. 2019. Global Cyber Security Labor Shortage and International Business Risk. Global Cyber Security Labor Shortage and International Business Risk 381 401 .
. 2019. Géopolitique des données numériques. Géopolitique des données numériques 171 174 .
Sarah Kreps & Jacquelyn Schneider. (2019) Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics. Journal of Cybersecurity 5:1.
Crossref
Christian Reuter, Thea Riebe, Larissa Aldehoff, Marc-André Kaufhold & Thomas Reinhold. 2019. Cyberwar – die Digitalisierung der Kriegsführung. Cyberwar – die Digitalisierung der Kriegsführung 15 38 .
Christian Reuter, Larissa Aldehoff, Thea Riebe & Marc-André Kaufhold. 2019. Information Technology for Peace and Security. Information Technology for Peace and Security 11 37 .
Ricky Wichum. 2019. Handbuch Virtualität. Handbuch Virtualität 1 13 .
Michael Andreas. 2019. Handbuch Virtualität. Handbuch Virtualität 1 14 .
Adelaide Baronchelli. (2018) Conflict in Cyber-Space: The Network of Cyber Incidents, 2000–2014. Peace Economics, Peace Science and Public Policy 24:4.
Crossref
Frédérick Douzet & Alix Desforges. (2018) Du cyberespace à la datasphère. Le nouveau front pionnier de la géographieFrom cyberspace to the datasphere: the new frontier of geography. Netcom:32-1/2, pages 87-108.
Crossref
Ghita Mezzour, Kathleen M. Carley & L. Richard Carley. (2018) Remote assessment of countries’ cyber weapon capabilities. Social Network Analysis and Mining 8:1.
Crossref
Michael Poznansky & Evan Perkoski. (2018) Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution. Journal of Global Security Studies 3:4, pages 402-416.
Crossref
Christopher J. Finlay. (2018) Just War, Cyber War, and the Concept of Violence. Philosophy & Technology 31:3, pages 357-377.
Crossref
Marek Górka. (2018) Cybersecurity as a challenge for modern state and society. Zeszyty Naukowe Uniwersytetu Szczecińskiego. Acta Politica 44, pages 29-39.
Crossref
Hans-Georg Ehrhart. (2018) Kriege und Kriegführung der Staaten des Globalen Nordens im 21. JahrhundertWar and Warfare of the States in the Global North in the 21st Century. Zeitschrift für Außen- und Sicherheitspolitik 11:1, pages 65-81.
Crossref
Daniel P. Hughes. 2018. Cyber Weaponry. Cyber Weaponry 71 85 .
Armin KrishnanArmin Krishnan. 2018. Why Paramilitary Operations Fail. Why Paramilitary Operations Fail 229 248 .
Eugenio Cusumano & Marian Corbe. 2018. A Civil-Military Response to Hybrid Threats. A Civil-Military Response to Hybrid Threats 1 14 .
Simone Dossi. 2018. US Foreign Policy in a Challenging World. US Foreign Policy in a Challenging World 357 377 .
Stefan Hügel, Hans-Jörg Kreowski & Dietrich Meyer-Ebrecht. 2018. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense 885 909 .
Daniel F. Baltrusaits. 2018. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense 787 808 .
Amaël Cattaruzza. 2017. Guerre et Technique. Guerre et Technique 309 322 .
Siim Alatalu. (2017) One year after Warsaw: The growing need for a NATO cyber command. One year after Warsaw: The growing need for a NATO cyber command.
Marek Górka. (2017) Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa. Cywilizacja i Polityka 15:15, pages 295-315.
Crossref
PIKA ŠARF. (2017) LEGALITY OF LOW-INTENSITY CYBER OPERATIONS UNDER INTERNATIONAL LAW. CONTEMPORARY MILITARY CHALLENGES:VOLUME 2017 ISSUE 19/3, pages 81-93.
Crossref
Jozef ValuchTomáš GábrišOndrej Hamuľák. (2017) Cyber Attacks, Information Attacks, and Postmodern Warfare. Baltic Journal of Law & Politics 10:1, pages 63-89.
Crossref
Kubo Macak. (2017) From the vanishing point back to the core: The impact of the development of the cyber law of war on general international law. From the vanishing point back to the core: The impact of the development of the cyber law of war on general international law.
Brad Bigelow. (2017) Mission assurance: Shifting the focus of cyber defence. Mission assurance: Shifting the focus of cyber defence.
Shuang Wu, Ziyang Guo, Dawei Shi, Karl Henrik Johansson & Ling Shi. (2017) Optimal innovation-based deception attack on remote state estimation. Optimal innovation-based deception attack on remote state estimation.
Christopher J. Finlay. (2017) The concept of violence in international theory: a Double-Intent Account. International Theory 9:1, pages 67-100.
Crossref
Austin Long. (2017) A cyber SIOP? Operational considerations for strategic offensive cyber planning. Journal of Cybersecurity.
Crossref
Erik Gartzke & Jon R. Lindsay. (2017) Thermonuclear cyberwar. Journal of Cybersecurity.
Crossref
Éric Letonturier. 2017. Guerre, armées et communication. Guerre, armées et communication 7 38 .
Jan Kallberg & Thomas S. Cook. (2017) The Unfitness of Traditional Military Thinking in Cyber. IEEE Access 5, pages 8126-8130.
Crossref
Metodi Hadji-Janev & Mitko Bogdanoski. (2017) Swarming-based cyber defence under the framework of collective security. Security Journal 30:1, pages 39-59.
Crossref
Daniel Hughes & Andrew Colarik. 2017. Intelligence and Security Informatics. Intelligence and Security Informatics 15 33 .
Max-Otto Baumann & Wolf J. Schünemann. 2017. Privacy, Data Protection and Cybersecurity in Europe. Privacy, Data Protection and Cybersecurity in Europe 1 14 .
Jack McDonald. 2017. Ethics and Policies for Cyber Operations. Ethics and Policies for Cyber Operations 17 32 .
Stefan Hügel, Hans-Jörg Kreowski & Dietrich Meyer-Ebrecht. 2017. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense 1 25 .
Daniel F. Baltrusaits. 2017. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense 1 22 .
Elsa B. Kania. (2016) Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking. Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking.
Antonio Roque, Kevin B. Bush & Christopher Degni. (2016) Security is about control. Security is about control.
Mohsen Zamani, Alireza Khosravian & Brett Ninness. (2016) Compensation of attacks on consensus networks. Compensation of attacks on consensus networks.
Wade L. Huntley. (2016) Strategic Implications of Offense and Defense in Cyberwar. Strategic Implications of Offense and Defense in Cyberwar.
Bibi van den Berg. 2016. Data Protection on the Move. Data Protection on the Move 1 24 .
Jon R. Lindsay. (2015) Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, pages tyv003.
Crossref
Mohsen Zamani, Uwe Helmke & Brian D.O. Anderson. (2015) Zeros of networked systems with time-invariant interconnections. Automatica 61, pages 97-105.
Crossref
Muhammad Adeka, Simon Shepherd, Raed Abd-Alhameed & Nuredin A. S Ahmed. (2015) A Versatile and Ubiquitous Secret Sharing. A Versatile and Ubiquitous Secret Sharing.
Artur de Matos Alves. (2015) Between the “Battlefield” Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict. Canadian Journal of Communication 40:3, pages 389-406.
Crossref
Gila Albert, Erwin A. Blackstone, Simon Hakim & Yoram Shiftan. 2015. Securing Transportation Systems. Securing Transportation Systems 1 21 .
Barney Warf. (2015) Cyberwar: A new frontier for political geography. Political Geography 46, pages 89-90.
Crossref
Michael Robinson, Kevin Jones & Helge Janicke. (2015) Cyber warfare: Issues and challenges. Computers & Security 49, pages 70-94.
Crossref
. (2015) Secure Control Systems: A Quantitative Risk Management Approach. IEEE Control Systems 35:1, pages 24-45.
Crossref
Peter Dombrowski & Chris C. Demchak. 2015. Cybersecurity Policies and Strategies for Cyberwarfare Prevention. Cybersecurity Policies and Strategies for Cyberwarfare Prevention 367 382 .
Jon R. Lindsay. (2015) The Impact of China on Cybersecurity: Fiction and Friction. International Security 39:3, pages 7-47.
Crossref
W. James Jacob. 2015. Technology and Workplace Skills for the Twenty-First Century. Technology and Workplace Skills for the Twenty-First Century 25 36 .
Ryan C. Maness & Brandon ValerianoRyan C. Maness & Brandon Valeriano. 2015. Russia's Coercive Diplomacy. Russia's Coercive Diplomacy 85 107 .
Brian M. Mazanec & Bradley A. ThayerBrian M. Mazanec & Bradley A. Thayer. 2015. Deterring Cyber Warfare. Deterring Cyber Warfare 11 28 .
André Teixeira, Iman Shames, Henrik Sandberg & Karl Henrik Johansson. (2015) A secure control framework for resource-limited adversaries. Automatica 51, pages 135-148.
Crossref
André Teixeira, Friederich Kupzog, Henrik Sandberg & Karl H. Johansson. 2015. Smart Grid Security. Smart Grid Security 149 183 .
Emily Fekete. (2020) The Shifting Nature of Cyberwarfare in Middle Eastern States. CyberOrient 9:1, pages 32-56.
Crossref
Jeppe Teglskov Jacobsen. (2014) Clausewitz and the Utility of Cyberattacks in War. International Journal of Cyber Warfare and Terrorism 4:4, pages 1-16.
Crossref
David Ormrod. (2014) The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface. The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface.
Ulrik Franke & Joel Brynielsson. (2014) Cyber situational awareness – A systematic review of the literature. Computers & Security 46, pages 18-31.
Crossref
Stéphane Bernard Bazan, Sabrine Saad & Addis Tesfa. (2014) Infowar on the web. Infowar on the web.

Displaying 200 of 225 citing articles. Use the download link below to view the full list of citing articles.

Download full citations list

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.