9,333
Views
19
CrossRef citations to date
0
Altmetric
Articles

Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet

ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Andrew C. Dwyer, Andreas Langenohl & Philipp Lottholz. (2023) Topologies of security: inquiring in/security across postcolonial and postsocialist scenes. Critical Studies on Security 11:1, pages 1-13.
Read now
Louise Marie Hurel. (2022) Interrogating the Cybersecurity Development Agenda: A Critical Reflection. The International Spectator 57:3, pages 66-84.
Read now
Myriam Dunn Cavelty & Andreas Wenger. (2020) Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy 41:1, pages 5-32.
Read now
Florian J. Egloff. (2020) Contested public attributions of cyber incidents and the role of academia. Contemporary Security Policy 41:1, pages 55-81.
Read now

Articles from other publishers (13)

Mobayode O. Akinsolu. (2023) Applied Artificial Intelligence in Manufacturing and Industrial Production Systems: PEST Considerations for Engineering Managers. IEEE Engineering Management Review 51:1, pages 52-62.
Crossref
Xian Guo, Ying Xue, Tao Feng, Yongbo Jiang & Yan Yan. (2023) Simulation Implementation and Verification of a Security Framework for ICS Based on SPD. Automatic Control and Computer Sciences 57:1, pages 37-47.
Crossref
Kristen Csenkey & Nina Bindel. (2023) Post-quantum cryptographic assemblages and the governance of the quantum threat. Journal of Cybersecurity 9:1.
Crossref
Ethem Ilbiz & Christian KaunertEthem Ilbiz & Christian Kaunert. 2023. The Sharing Economy for Tackling Cybercrime. The Sharing Economy for Tackling Cybercrime 43 54 .
Kyoung Ho Kim, Kyounggon Kim & Huy Kang Kim. (2022) STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery. ETRI Journal 44:6, pages 991-1003.
Crossref
Ola Michalec, Sveta Milyaeva & Awais Rashid. (2021) Reconfiguring governance: How cyber security regulations are reconfiguring water governance. Regulation & Governance 16:4, pages 1325-1342.
Crossref
Noran Shafik Fouad. (2021) The non-anthropocentric informational agents: Codes, software, and the logic of emergence in cybersecurity. Review of International Studies 48:4, pages 766-785.
Crossref
Jeffrey Whyte. (2022) Cybersecurity, race, and the politics of truth. Security Dialogue 53:4, pages 342-362.
Crossref
Andrew C Dwyer, Clare Stevens, Lilly Pijnenburg Muller, Myriam Dunn Cavelty, Lizzie Coles-Kemp & Pip Thornton. (2022) What Can a Critical Cybersecurity Do?. International Political Sociology 16:3.
Crossref
Xu Yao, Gang Wang, Pei-zhi Yan, Li-fang Zhang & Ye Sun. 2022. Web Services – ICWS 2021. Web Services – ICWS 2021 77 89 .
Jing Lin & Kaiqi Xiong. (2021) Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation. Computers & Security 108, pages 102326.
Crossref
Florian J Egloff & Myriam Dunn Cavelty. (2021) Attribution and Knowledge Creation Assemblages in Cybersecurity Politics. Journal of Cybersecurity 7:1.
Crossref
Mrinal Kaushik, Monica Malik & Bhawna Narwal. (2020) Developing Malware and Analyzing it Afore & After Steganography with OSINTs. Developing Malware and Analyzing it Afore & After Steganography with OSINTs.