24,044
Views
30
CrossRef citations to date
0
Altmetric
Original Articles

Publicly attributing cyber attacks: a framework

ORCID Icon & ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (16)

Yehonatan Abramson & Gil Baram. (2024) Saving face in the cyberspace: Responses to public cyber intrusions in the Gulf. Contemporary Security Policy 45:2, pages 210-238.
Read now
Josephine Wolff. (2024) The role of insurers in shaping international cyber-security norms about cyber-war. Contemporary Security Policy 45:1, pages 141-170.
Read now
Shashank Yadav. (2024) Social automation and APT attributions in national cybersecurity. Journal of Cyber Security Technology 0:0, pages 1-26.
Read now
Max Smeets. (2023) The challenges of military adaptation to the cyber domain: a case study of the Netherlands. Small Wars & Insurgencies 34:7, pages 1343-1362.
Read now
Heajune Lee. (2023) Public attribution in the US government: implications for diplomacy and norms in cyberspace. Policy Design and Practice 6:2, pages 198-216.
Read now
Ofek Riemer & Daniel Sobelman. (2023) Coercive disclosure: The weaponization of public intelligence revelation in international relations. Contemporary Security Policy 44:2, pages 276-307.
Read now
Rose Gottemoeller, Kathryn Hedgecock, Justin Magula & Paul Poast. (2022) Engaging with emerged and emerging domains: cyber, space, and technology in the 2022 NATO strategic concept. Defence Studies 22:3, pages 516-524.
Read now
Sico van der Meer. (2022) Responding to large-scale cyberattacks: a toolbox for policymakers. Journal of Cyber Policy 7:2, pages 175-193.
Read now
Eugenio Cusumano & Christopher Kinsey. (2022) Concluding comments. Small Wars & Insurgencies 33:1-2, pages 294-312.
Read now
Antonio Calcara. (2022) Contractors or robots? Future warfare between privatization and automation. Small Wars & Insurgencies 33:1-2, pages 250-271.
Read now
Lance Y. Hunter, Craig D. Albert, Eric Garrett & Josh Rutland. (2022) Democracy and cyberconflict: how regime type affects state-sponsored cyberattacks. Journal of Cyber Policy 7:1, pages 72-94.
Read now
Joe Devanny, Ciaran Martin & Tim Stevens. (2021) On the strategic consequences of digital espionage. Journal of Cyber Policy 6:3, pages 429-450.
Read now
Jelena Vićić & Richard Harknett. Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace. Intelligence and National Security 0:0, pages 1-18.
Read now
Simin Kargar & Thomas Rid. Attributing Digital Covert Action: the curious case of WikiSaudileaks. Intelligence and National Security 0:0, pages 1-25.
Read now

Articles from other publishers (14)

Ehtsham Irshad & Abdul Basit Siddiqui. (2024) Context-aware cyber-threat attribution based on hybrid features. ICT Express.
Crossref
Antonio Villalón-Huerta, Ismael Ripoll-Ripoll & Hector Marco-Gisbert. (2023) A survey and characterization of Close Access Cyberspace Operations. International Journal of Information Security 23:2, pages 963-980.
Crossref
Milos Vukelic. (2024) Characteristics of cyberspace as a distinct domain of conflict: A case study of U.S. strategic operations. Medjunarodni problemi International problems 76:1, pages 55-86.
Crossref
Kerstin Zettl-Schabath. 2023. Staatliche Cyberkonflikte. Staatliche Cyberkonflikte.
Fan Yang. 2023. Revolutionary Approach to International Law. Revolutionary Approach to International Law 281 300 .
Wolf J. Schünemann. 2020. Handbuch Digitalisierung in Staat und Verwaltung. Handbuch Digitalisierung in Staat und Verwaltung 1 12 .
Ramachandran Puranam, Suneel Sharma & Suchismitha Das. (2022) Role of Behavioural Factors in Cyber Threat Intelligence. Role of Behavioural Factors in Cyber Threat Intelligence.
Lorena González-Manzano, José M. de Fuentes, Cristina Ramos, Ángel Sánchez & Florabel Quispe. (2022) Identifying Key Relationships between Nation-State Cyberattacks and Geopolitical and Economic Factors: A Model. Security and Communication Networks 2022, pages 1-11.
Crossref
Miguel Alberto Gomez & Gregory Winger. (2022) Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations. Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations.
Nori Katagiri. (2022) Explaining Cyberspace Dynamics in the COVID Era. Global Studies Quarterly 2:3.
Crossref
Kerstin Zettl. (2021) Macht im Cyberspace: Eine Übersicht der bisherigen Forschung und künftiger Perspektiven anhand des Proxy-Konzepts“Power in cyberspace: a review of previous research and future perspectives using the proxy concept.”. Zeitschrift für Friedens- und Konfliktforschung 11:1, pages 65-90.
Crossref
Justin Key Canfil. (2022) The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay. Journal of Cybersecurity 8:1.
Crossref
Sachin Kumar Sharma, Arjun Singh & Manoj Kumar Bohra. 2022. Cyber Warfare, Security and Space Research. Cyber Warfare, Security and Space Research 201 212 .
Florian J Egloff & James Shires. (2022) Offensive Cyber Capabilities and State Violence: Three Logics of Integration. Journal of Global Security Studies 7:1.
Crossref