Citations (19)
Keep up to date with the latest research on this topic with citation updates for this article.
Read on this site (6)
Andrew C. Dwyer, Andreas Langenohl & Philipp Lottholz. (2023) Topologies of security: inquiring in/security across postcolonial and postsocialist scenes. Critical Studies on Security 11:1, pages 1-13.
Read now
Read now
Lars Gjesvik & Kacper Szulecki. (2023) Interpreting cyber-energy-security events: experts, social imaginaries, and policy discourses around the 2016 Ukraine blackout. European Security 32:1, pages 104-124.
Read now
Read now
Louise Marie Hurel. (2022) Interrogating the Cybersecurity Development Agenda: A Critical Reflection. The International Spectator 57:3, pages 66-84.
Read now
Read now
Eugenio Lilli. (2021) Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence. Contemporary Security Policy 42:2, pages 163-188.
Read now
Read now
Myriam Dunn Cavelty & Andreas Wenger. (2020) Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy 41:1, pages 5-32.
Read now
Read now
Florian J. Egloff. (2020) Contested public attributions of cyber incidents and the role of academia. Contemporary Security Policy 41:1, pages 55-81.
Read now
Read now
Articles from other publishers (13)
Mobayode O. Akinsolu. (2023) Applied Artificial Intelligence in Manufacturing and Industrial Production Systems: PEST Considerations for Engineering Managers. IEEE Engineering Management Review 51:1, pages 52-62.
Crossref
Crossref
Xian Guo, Ying Xue, Tao Feng, Yongbo Jiang & Yan Yan. (2023) Simulation Implementation and Verification of a Security Framework for ICS Based on SPD. Automatic Control and Computer Sciences 57:1, pages 37-47.
Crossref
Crossref
Kristen Csenkey & Nina Bindel. (2023) Post-quantum cryptographic assemblages and the governance of the quantum threat. Journal of Cybersecurity 9:1.
Crossref
Crossref
Ethem Ilbiz & Christian KaunertEthem Ilbiz & Christian Kaunert. 2023. The Sharing Economy for Tackling Cybercrime. The Sharing Economy for Tackling Cybercrime
43
54
.
Kyoung Ho Kim, Kyounggon Kim & Huy Kang Kim. (2022) STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery. ETRI Journal 44:6, pages 991-1003.
Crossref
Crossref
Ola Michalec, Sveta Milyaeva & Awais Rashid. (2021) Reconfiguring governance: How cyber security regulations are reconfiguring water governance. Regulation & Governance 16:4, pages 1325-1342.
Crossref
Crossref
Noran Shafik Fouad. (2021) The non-anthropocentric informational agents: Codes, software, and the logic of emergence in cybersecurity. Review of International Studies 48:4, pages 766-785.
Crossref
Crossref
Jeffrey Whyte. (2022) Cybersecurity, race, and the politics of truth. Security Dialogue 53:4, pages 342-362.
Crossref
Crossref
Andrew C Dwyer, Clare Stevens, Lilly Pijnenburg Muller, Myriam Dunn Cavelty, Lizzie Coles-Kemp & Pip Thornton. (2022) What Can a Critical Cybersecurity Do?. International Political Sociology 16:3.
Crossref
Crossref
Xu Yao, Gang Wang, Pei-zhi Yan, Li-fang Zhang & Ye Sun. 2022. Web Services – ICWS 2021. Web Services – ICWS 2021
77
89
.
Jing Lin & Kaiqi Xiong. (2021) Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation. Computers & Security 108, pages 102326.
Crossref
Crossref
Florian J Egloff & Myriam Dunn Cavelty. (2021) Attribution and Knowledge Creation Assemblages in Cybersecurity Politics. Journal of Cybersecurity 7:1.
Crossref
Crossref
Mrinal Kaushik, Monica Malik & Bhawna Narwal. (2020) Developing Malware and Analyzing it Afore & After Steganography with OSINTs. Developing Malware and Analyzing it Afore & After Steganography with OSINTs.