Ori Swed, Sachith Dassanayaka & Dimitri Volchenkov. (2024) Keeping it authentic: the social footprint of the trolls’ network. Social Network Analysis and Mining 14:1.
Crossref
Nadiya Kostyuk & Erik Gartzke. (2023) Fighting in Cyberspace: Internet Access and the Substitutability of Cyber and Military Operations. Journal of Conflict Resolution 68:1, pages 80-107.
Crossref
Gil Baram. (2023) Public Secrets: The Dynamics of Publicity and Secrecy in Offensive Cyber Operations. Journal of Global Security Studies 8:3.
Crossref
Tianjiao Jiang. (2022) The Shift of China’s Strategic Thinking on Cyberwarfare Since the 1990s. Journal of Chinese Political Science 28:1, pages 127-149.
Crossref
Liudmyla Kormych & Yuliia Zavhorodnia. (2023) The concept of modern political confrontation in cyber space. Journal of Cybersecurity 9:1.
Crossref
Kerstin Zettl. (2021) Macht im Cyberspace: Eine Übersicht der bisherigen Forschung und künftiger Perspektiven anhand des Proxy-Konzepts“Power in cyberspace: a review of previous research and future perspectives using the proxy concept.”. Zeitschrift für Friedens- und Konfliktforschung 11:1, pages 65-90.
Crossref
Fabio Massacci & Silvia Vidor. (2022) Building Principles for Lawful Cyber Lethal Autonomous Weapons. IEEE Security & Privacy 20:2, pages 101-106.
Crossref
Miguel Alberto Gomez & Christopher Whyte. (2022) Unpacking strategic behavior in cyberspace: a schema-driven approach. Journal of Cybersecurity 8:1.
Crossref
Sugandha Sharma, Rakesh Kumar, Amit Jain, Bharat Agarwal & Sujay Kumar Suman. (2021) Intensifying Practical Based Learning of Penetration Testing using CTF. Intensifying Practical Based Learning of Penetration Testing using CTF.
Miguel Alberto Gomez & Christopher Whyte. (2021) Breaking the Myth of Cyber Doom: Securitization and Normalization of Novel Threats. International Studies Quarterly 65:4, pages 1137-1150.
Crossref
Joseph M. Brown & Tanisha M. Fazal. (2021) #SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations. European Journal of International Security 6:4, pages 401-417.
Crossref
Lucas Kello. (2021) Cyber legalism: why it fails and what to do about it. Journal of Cybersecurity 7:1.
Crossref
Stefan Soesanto & Max Smeets. 2021. NL ARMS Netherlands Annual Review of Military Studies 2020. NL ARMS Netherlands Annual Review of Military Studies 2020
385
400
.
Alexander L. Fretz, Jose J. Padilla & Erika F. Frydenlund. 2021. Social, Cultural, and Behavioral Modeling. Social, Cultural, and Behavioral Modeling
174
183
.
Ido Sivan-Sevilla & Shani Sharvit. 2021. Regulation in Israel. Regulation in Israel
173
193
.
PAVEL VUK. (2020) CHALLENGES TO MILITARY STRATEGY IN THE 21ST CENTURY. CONTEMPORARY MILITARY CHALLENGES:Volume 2020, issue 22/1.
Crossref
Christopher Whyte. (2020) Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online. European Journal of International Security 5:2, pages 195-214.
Crossref
Michael C. Horowitz. (2020) Do Emerging Military Technologies Matter for International Politics?. Annual Review of Political Science 23:1, pages 385-400.
Crossref
Christopher J. Coyne. 2020. Defense, Peace, and War Economics. Defense, Peace, and War Economics.
Florian J Egloff. (2020) Public attribution of cyber intrusions. Journal of Cybersecurity 6:1.
Crossref
Siim Alatalu. 2020. Redesigning Organizations. Redesigning Organizations
27
43
.
Germán Alejandro Patiño Orozco. (2019) El sistema internacional cibernético: elementos de análisis. OASIS:30, pages 163-186.
Crossref
Miguel Alberto N. Gomez. (2019) Sound the alarm! Updating beliefs and degradative cyber operations. European Journal of International Security 4:2, pages 190-208.
Crossref
Yavuz Akdag. (2018) The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective. Journal of Chinese Political Science 24:2, pages 225-247.
Crossref
Nadiya Kostyuk & Yuri M. Zhukov. (2017) Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?. Journal of Conflict Resolution 63:2, pages 317-347.
Crossref
Miguel Alberto Gomez. (2019) Past behavior and future judgements: seizing and freezing in response to cyber operations. Journal of Cybersecurity 5:1.
Crossref
Michael Poznansky & Evan Perkoski. (2018) Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution. Journal of Global Security Studies 3:4, pages 402-416.
Crossref
Christopher Whyte. (2018) Dissecting the Digital World: A Review of the Construction and Constitution of Cyber Conflict Research. International Studies Review 20:3, pages 520-532.
Crossref
Jon Randall Lindsay. (2017) Restrained by design: the political economy of cybersecurity. Digital Policy, Regulation and Governance 19:6, pages 493-514.
Crossref
Daniel Ventre. 2017. Guerre, armées et communication. Guerre, armées et communication
147
166
.
Rebecca Slayton. (2017) What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment. International Security 41:3, pages 72-109.
Crossref
Daniel Hughes & Andrew Colarik. 2017. Intelligence and Security Informatics. Intelligence and Security Informatics
15
33
.
Markus Christen & Endre Bangerter. 2017. The Nature of Peace and the Morality of Armed Conflict. The Nature of Peace and the Morality of Armed Conflict
243
263
.
Anthimos Alexandros TsirigotisAnthimos Alexandros Tsirigotis. 2017. Cybernetics, Warfare and Discourse. Cybernetics, Warfare and Discourse
11
44
.
Anthony Craig & Brandon Valeriano. (2016) Conceptualising cyber arms races. Conceptualising cyber arms races.
David Ormrod, Benjamin Turnbull & Kent O'Sullivan. (2015) System of systems cyber effects simulation ontology. System of systems cyber effects simulation ontology.
Jon R. Lindsay. (2015) Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, pages tyv003.
Crossref
Byoung Won Min. (2015) International Politics of Cyberattacks and Cyberdeterrence: A Study of Their Regulations and New Paradigms. National Strategy 21:3, pages 37-62.
Crossref
Barney Warf. (2015) Cyberwar: A new frontier for political geography. Political Geography 46, pages 89-90.
Crossref
Alan Chong. 2015. Cybersecurity Policies and Strategies for Cyberwarfare Prevention. Cybersecurity Policies and Strategies for Cyberwarfare Prevention
383
396
.
Jon R. Lindsay. (2015) The Impact of China on Cybersecurity: Fiction and Friction. International Security 39:3, pages 7-47.
Crossref
Brian M. Mazanec & Bradley A. ThayerBrian M. Mazanec & Bradley A. Thayer. 2015. Deterring Cyber Warfare. Deterring Cyber Warfare
11
28
.
Lior Tabansky & Isaac Ben IsraelLior Tabansky & Isaac Ben Israel. 2015. Cybersecurity in Israel. Cybersecurity in Israel
63
69
.
Jon R. LindsayLucas Kello. (2014) Correspondence: A Cyber Disagreement. International Security 39:2, pages 181-192.
Crossref
David Ormrod. (2014) The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface. The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface.
Amir Lupovici. (2014) The “Attribution Problem” and the Social Construction of “Violence”: Taking Cyber Deterrence Literature a Step Forward. International Studies Perspectives, pages n/a-n/a.
Crossref
David G. A. Ormrod. (2014) A ‘wicked problem’ — Predicting sos behaviour in tactical land combat with compromised C4ISR. A ‘wicked problem’ — Predicting sos behaviour in tactical land combat with compromised C4ISR.
Jeffrey S. Caso. (2014) The rules of engagement for cyber-warfare and the Tallinn Manual: A case study. The rules of engagement for cyber-warfare and the Tallinn Manual: A case study.
Nikitas Nikitakos & Panos Mavropoulos. 2014. Cyber-Development, Cyber-Democracy and Cyber-Defense. Cyber-Development, Cyber-Democracy and Cyber-Defense
259
277
.
Lucas Kello. (2013) The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security 38:2, pages 7-40.
Crossref
. (2013) Bibliography—Editors’ selection of current world literature. Current Orthopaedic Practice 24:2, pages i-iii.
Crossref
Gil Baram, Daniel Cohen, Zeev Shapira, Omree Wechsler, Nir Hight & Isaac Ben-Israel. (2018) Review: 2017 Strategic Trends in the Global Cyber Conflict. SSRN Electronic Journal.
Crossref
Michael Poznansky & Evan Perkoski. (2016) Clandestine or Covert? Rethinking Secrecy in Cyberspace. SSRN Electronic Journal.
Crossref
Trey Herr. (2013) PrEP: A Framework for Malware and Cyber Weapons. SSRN Electronic Journal.
Crossref