Citations (30)
Keep up to date with the latest research on this topic with citation updates for this article.
Read on this site (16)
Yehonatan Abramson & Gil Baram. (2024) Saving face in the cyberspace: Responses to public cyber intrusions in the Gulf. Contemporary Security Policy 45:2, pages 210-238.
Read now
Read now
Josephine Wolff. (2024) The role of insurers in shaping international cyber-security norms about cyber-war. Contemporary Security Policy 45:1, pages 141-170.
Read now
Read now
Shashank Yadav. (2024) Social automation and APT attributions in national cybersecurity. Journal of Cyber Security Technology 0:0, pages 1-26.
Read now
Read now
Max Smeets. (2023) The challenges of military adaptation to the cyber domain: a case study of the Netherlands. Small Wars & Insurgencies 34:7, pages 1343-1362.
Read now
Read now
Dov H. Levin. (2023) Is sunlight the best counterintelligence technique? the effectiveness of covert operation exposure in blunting the Russian intervention in the 2020 U.S. election. Intelligence and National Security 38:5, pages 816-834.
Read now
Read now
Heajune Lee. (2023) Public attribution in the US government: implications for diplomacy and norms in cyberspace. Policy Design and Practice 6:2, pages 198-216.
Read now
Read now
Ofek Riemer & Daniel Sobelman. (2023) Coercive disclosure: The weaponization of public intelligence revelation in international relations. Contemporary Security Policy 44:2, pages 276-307.
Read now
Read now
Gil Baram. (2022) A sliding scale of secrecy: toward a better understanding of the role of publicity in offensive cyber operations. Journal of Cyber Policy 7:3, pages 275-293.
Read now
Read now
Rose Gottemoeller, Kathryn Hedgecock, Justin Magula & Paul Poast. (2022) Engaging with emerged and emerging domains: cyber, space, and technology in the 2022 NATO strategic concept. Defence Studies 22:3, pages 516-524.
Read now
Read now
Sico van der Meer. (2022) Responding to large-scale cyberattacks: a toolbox for policymakers. Journal of Cyber Policy 7:2, pages 175-193.
Read now
Read now
Eugenio Cusumano & Christopher Kinsey. (2022) Concluding comments. Small Wars & Insurgencies 33:1-2, pages 294-312.
Read now
Read now
Antonio Calcara. (2022) Contractors or robots? Future warfare between privatization and automation. Small Wars & Insurgencies 33:1-2, pages 250-271.
Read now
Read now
Lance Y. Hunter, Craig D. Albert, Eric Garrett & Josh Rutland. (2022) Democracy and cyberconflict: how regime type affects state-sponsored cyberattacks. Journal of Cyber Policy 7:1, pages 72-94.
Read now
Read now
Joe Devanny, Ciaran Martin & Tim Stevens. (2021) On the strategic consequences of digital espionage. Journal of Cyber Policy 6:3, pages 429-450.
Read now
Read now
Jelena Vićić & Richard Harknett. Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace. Intelligence and National Security 0:0, pages 1-18.
Read now
Read now
Simin Kargar & Thomas Rid. Attributing Digital Covert Action: the curious case of WikiSaudileaks. Intelligence and National Security 0:0, pages 1-25.
Read now
Read now
Articles from other publishers (14)
Ehtsham Irshad & Abdul Basit Siddiqui. (2024) Context-aware cyber-threat attribution based on hybrid features. ICT Express.
Crossref
Crossref
Antonio Villalón-Huerta, Ismael Ripoll-Ripoll & Hector Marco-Gisbert. (2023) A survey and characterization of Close Access Cyberspace Operations. International Journal of Information Security 23:2, pages 963-980.
Crossref
Crossref
Milos Vukelic. (2024) Characteristics of cyberspace as a distinct domain of conflict: A case study of U.S. strategic operations. Medjunarodni problemi International problems 76:1, pages 55-86.
Crossref
Crossref
Kerstin Zettl-Schabath. 2023. Staatliche Cyberkonflikte. Staatliche Cyberkonflikte.
Fan Yang. 2023. Revolutionary Approach to International Law. Revolutionary Approach to International Law
281
300
.
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung
1
12
.
Ramachandran Puranam, Suneel Sharma & Suchismitha Das. (2022) Role of Behavioural Factors in Cyber Threat Intelligence. Role of Behavioural Factors in Cyber Threat Intelligence.
Lorena González-Manzano, José M. de Fuentes, Cristina Ramos, Ángel Sánchez & Florabel Quispe. (2022) Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model. Security and Communication Networks 2022, pages 1-11.
Crossref
Crossref
Miguel Alberto Gomez & Gregory Winger. (2022) Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations. Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations.
Nori Katagiri. (2022) Explaining Cyberspace Dynamics in the COVID Era. Global Studies Quarterly 2:3.
Crossref
Crossref
Kerstin Zettl. (2021) Macht im Cyberspace: Eine Übersicht der bisherigen Forschung und künftiger Perspektiven anhand des Proxy-Konzepts“Power in cyberspace: a review of previous research and future perspectives using the proxy concept.”. Zeitschrift für Friedens- und Konfliktforschung 11:1, pages 65-90.
Crossref
Crossref
Justin Key Canfil. (2022) The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay. Journal of Cybersecurity 8:1.
Crossref
Crossref
Sachin Kumar Sharma, Arjun Singh & Manoj Kumar Bohra. 2022. Cyber Warfare, Security and Space Research. Cyber Warfare, Security and Space Research
201
212
.
Florian J Egloff & James Shires. (2022) Offensive Cyber Capabilities and State Violence: Three Logics of Integration. Journal of Global Security Studies 7:1.
Crossref
Crossref