Bibliography
- Atwood, Chandler and Jeffrey White. ‘Syrian air-defense capabilities and the threat to potential U.S. air operations’, The Washington Institute, 23 May 2014. https://www.washingtoninstitute.org/policy-analysis/view/syrian-air-defense-capabilities-and-the-threat-to-potential-u.s.-air-operat
- Batey, Angus, ‘F-35 logistics system may be vulnerable to cyberattack’, Aviation Week, 3 Mar. 2016. https://aviationweek.com/defense/f-35-logistics-system-may-be-vulnerable-cyberattack
- Bergeron, Louis, France Under Napoleon (Princeton: Princeton University Press 1981).
- Bertaud, Jean-Paulm, The Army of the French Revolution (Princeton: Princeton University Press 1988).
- Brantly, Aaron, The Decision to Attack: Military and Intelligence Cyber Decision-Making (Athens: University of Georgia Press 2015).
- Broers, Michael, ‘The Concept of Total War in the Revolutionary-Napoleonic Period’, War in History 15 (2008), 250–75. doi:10.1177/0968344508091323.
- Bunker, Robert J., Five-Dimensional (Cyber) Warfighting: Can the Army after Next Be Defeated through Complex Concepts and Technologies? (Carlisle: U.S. Army War College Strategic Studies Institute 1998).
- Cares, Jeff, Distributed Networked Operations: The Foundations of Network Centric Warfare (Newport: Alidade Press 2005).
- Carey, Bill, ‘GAO questions deployability, redundancy, of F-35 ALIS system’, AIN Online, 21 Apr. 2016. https://www.ainonline.com/aviation-news/defense/2016-04-21/gao-questions-deployability-redundancy-f-35-alis-system
- Caroll, Ward, ‘Israel’s Cyber Shot at Syria’, Defensetech.org, Nov. 26, 2007. https://www.military.com/defensetech/2007/11/26/israels-cyber-shot-at-syria.
- Cebrowski, Arthur K. and John J. Garstka, ‘Network-Centric Warfare: Its Origin and Future’, US Naval Institute Proceedings 124/1 (1998), 28–35.
- Cimbala, Stephen, First Strike Stability: Deterrence after Containment (New York: Greenwood 1990).
- Cohen, Eliot A, ‘A Revolution in Warfare’, Foreign Affairs (1996), 37–54. doi:10.2307/20047487.
- Cohen, Eliot A, ‘Change and Transformation in Military Affairs’’, Journal of Strategic Studies 27/3 (2004), 395–407. doi:10.1080/1362369042000283958.
- Colgan, Jeff D., ‘Oil and Revolutionary Governments: Fuel for International Conflict’, International Organization 64/4 (2010), 661–94. doi:10.1017/S002081831000024X.
- Colgan, Jeff D., ‘Oil, Domestic Politics, and International Conflict’, Energy Research & Social Science 1 (2014), 198–205. doi:10.1016/j.erss.2014.03.005.
- Dahl, Erik, ‘Network Centric Warfare and Operational Art’, Defence Studies 2/1 ( Spring 2002), 17–34. doi:10.1080/14702430212331391888.
- Danzig, Richard, ‘Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies’, Center for a New American Security, July 21, 2014. https://www.cnas.org/publications/reports/surviving-on-a-diet-of-poisoned-fruit-reducing-the-national-security-risks-of-americas-cyber-dependencies.
- Demchak, Chris C., Wars of Disruption and Resilience (Athens: University of Georgia Press 2011).
- Department of the Army, Field Manual 100-5: Operations (1976), 2–26.
- Dick, Jimmy, ‘The Gunpowder Shortage’, Journal of the American Revolution (9 Sep. 2013). https://allthingsliberty.com/2013/09/the-gunpowder-shortage/.
- DoD Operational Test and Evaluation, FY2014 Annual Report. http://www.dote.osd.mil/pub/reports/fy2014/pdf/other/2014DOTEAnnualReport.pdf.
- Feaver, Peter and Christopher Gelpi, Choosing Your Battles: American Civil-Military Relations and the Use of Force (Princeton: Princeton University Press 2011).
- Garfinkel, Ben and Allan Dafoe, ‘How Does the Offense-Defense Balance Scale?’, Journal of Strategic Studies (2019).
- Gartzke, Erik, ‘The Myth of Cyberwar: Bringing War in Cyberspace Back down to Earth’, International Security 38/2 (2013), 41–73. doi:10.1162/ISEC_a_00136.
- Gartzke, Erik, ‘Blood and Robots: How Remotely Piloted Vehicles and Related Technologies Affect the Politics of Violence’, Journal of Strategic Studies (forthcoming).
- Gilpin, Robert, War and Change in World Politics (Cambridge: Cambridge University Press 1983).
- Glaser, Charles, ‘The Security Dilemma Revisited’, World Politics 50 (1997), 171–201. doi:10.1017/S0043887100014763.
- Glaser, Charles, ‘How Oil Influences National Security’, International Security 38/2 (2013), 107–41. doi:10.1162/ISEC_a_00137.
- Glaser, Charles and Chairn Kaufmann, ‘What Is the Offense-Defense Balance and How Can We Measure It?;, International Security 22/4 (1998), 44–82.
- Gompert, David C. and Martin Libicki, ‘Cyber Warfare and Sino-American Crisis Instability’, Survival 56/4 (2014), 7–22. doi:10.1080/00396338.2014.941543.
- Gray, Colin S, Strategy for Chaos: Revolutions in Military Affairs and the Evidence of History (London: Frank Cass 2002).
- Halpin, Edward F., Cyberwar, Netwar, and the Revolution in Military Affairs (New York: Palgrave Macmillan 2006).
- Haycock, Ronald and Keith Neilson, Men, Machines & War (New York: Wilfrid Laurier Univ. Press 1988).
- Herz, John, ‘Idealist Internationalism and the Security Dilemma’, World Politics 2/2 (1950), 157–80. doi:10.2307/2009187.
- Horowitz, Michael C, ‘When Speed Kills: Autonomous Weapons Systems, Deterrence, and Stability’, Journal of Strategic Studies (2019).
- Hughes, Llewelyn and Austin Long, ‘Is There an Oil Weapon? Security Implications of Changes in the Structure of the International Oil Market’, International Security 39/3 (2015), 152–89. doi:10.1162/ISEC_a_00188.
- Huntington, Samuel P., The Soldier and the State: The Theory and Politics of Civil-Military Relations (Cambridge: Harvard University Press 1957).
- Insinna, Valerie, ‘Troubled Logistics System Critical to F-35s Future’, National Defense Magazine, Apr. 2015. http://www.nationaldefensemagazine.org/articles/2015/4/1/2015april-troubled-logistics-system-critical-to-f35s-future.
- Jervis, Robert, ‘Cooperation under the Security Dilemma’, World Politics 30/2 (1978), 167–214. doi:10.2307/2009958.
- Jervis, Robert, The Meaning of Nuclear Revolution (Ithaca: Cornell University Press 1989).
- Jervis, Robert, ‘Was the Cold War a Security Dilemma?’, Journal of Cold War Studies 3/1 (2001), 36–60. doi:10.1162/15203970151032146.
- Kelanic, Rosemary, ‘‘The Petroleum Paradox: Oil, Coercive Vulnerability, and Great Power Behavior’, Security Studies 25/2 (2016), 181–2013. doi:10.1080/09636412.2016.1171966.
- Kelly, Jack, Gunpowder: Alchemy, Bombards, and Pyrotechnics: The History of the Explosive that Changed the World (New York: Basic Books 2004).
- Keohane, Robert and Joseph S. Nye Jr., ‘Power and Interdependence in the Information Age’, Foreign Affairs 77/5 (1998), 81–94. doi:10.2307/20049052.
- Kier, Elizabeth, ‘Culture and Military Doctrine: France between the Wars’, International Security 19/4 (1995), 65–93. doi:10.2307/2539120.
- Knox, Macgregor and Williamson Murray, The Dynamics of Military Revolution (Cambridge: Cambridge University Press 2001), 1300–2050
- Kotzanikolaou, Panayiotis, Marianthi Theoharidou, and Dimitris Gritzalis, 'Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects', in S. Bologna, B. Hämmerli, D. Gritzalis, and S. Wolthusen (eds.), Critical Information Infrastructure Security. CRITIS 2011. Lecture Notes in Computer Science, Vol. 6983 (Berlin, Heidelberg: Springer 2013). https://doi.org/10.1007/978-3-642-41476-3_9.
- Krepinevich, Andrew, ‘Cavalry to Computer: The Pattern of Military Revolutions’, National Interest 37 (fall 1994), 29–40.
- Lieber, Keir A., ‘Grasping the Technological Peace: The Offense-Defense Balance and International Security’, International Security 25/1 (2000), 71–104. doi:10.1162/016228800560390.
- Lindsay, Jon, ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22/3 (2013), 365–404. doi:10.1080/09636412.2013.816122.
- Lonsdale, David, The Nature of War in the Information Age (London: Frank Cass 2004).
- Lynn, William J., ‘Defending a New Domain: The Pentagon’s Cyber Strategy;, Foreign Affairs 89/5 (2010), 97–110.
- Lynn-Jones, Sean M., ‘Offense-Defense Theory and Its Critics’, Security Studies 4/4 (1995), 660–91. doi:10.1080/09636419509347600.
- Mazarr, Michael J., The Revolution in Military Affairs: A Framework for Defense Planning (Carlisle Barracks: Army War College Strategic Studies Institute 1994).
- McNeill, William, The Pursuit of Power: Technology, Armed Force, and Society since A.D. 1000 (Chicago: University of Chicago Press 1982).
- Mearsheimer, John J., The Tragedy of Great Power Politics (New York: WW Norton & Company 2001).
- Metz, Steven, Armed Conflict in the 21st Century: The Information Revolution and Post-Modern Warfare (Carlisle: Strategic Studies Institute 2000).
- Metz, Steven and James Kievit, Strategy and the Revolution in Military Affairs: From Theory to Policy (Carlisle: Strategic Studies Institute 1995).
- Millett, Allan R. and Williamson Murray (eds.), Military Effectiveness: Volume 2, The Interwar Period (Cambridge: Cambridge University Press 2010).
- Mortimer, John, ‘Tactics, Strategy, and Battlefield Formation during the Hundred Years War: The Role of the Longbow in the ‘Infantry Revolution’, Masters Thesis, Indiana University of Pennsylvania August 2013.
- Murray, Williamson and Allan R. Millett, Military Innovation in the Interwar Period (Cambridge: Cambridge University Press 1998).
- Nye, Joseph, Jr. and William A. Owens, ‘America’s Information Edge’, Foreign Affairs 75/2 (1996), 20–36. doi:10.2307/20047486.
- O’ Hanlon, Michael, Technological Change and the Future of Warfare (Washington, D.C.: Brookings Institute Press 2000).
- ‘Oil and gas industry increasingly hit by cyber-attacks’, Security Week News, 14 Jan. 2016. https://www.securityweek.com/oil-and-gas-industry-increasingly-hit-cyber-attacks-report
- Owen, Taylor, Disruptive Power (Oxford: Oxford University Press 2015).
- Owens, William A. and Ed Offley, Lifting the Fog of War (Baltimore: Johns Hopkins University Press 2001).
- Paganini, Pierluigi ‘Modern railroad systems are vulnerable to cyber attacks’, Securityaffairs.co, 2 Jan. 2016. https://securityaffairs.co/wordpress/43196/hacking/railroad-systems-vulnerabilities.html
- Panetta, Leon and Barack Obama. Sustaining US Global Leadership: Priorities for 21st Century Defense (Washington, DC: US Department of Defense 2012).
- Parker, Geoffrey, The Military Revolution: Military Innovation and the Rise of the West 1500–1800 (Cambridge: Cambridge University Press 1996).
- Pearson, Ivan L., In the Name of Oil: Anglo-American Relations in the Middle East, 1950–1958 (Eastbourne, UK: Sussex Academic Press 2010).
- Perlroth, Nicole, ‘In cyberattack on Saudi firm, U.S. sees Iran firing back’, The New York Times, 23 Oct. 2012. https://www.csis.org/news/cyberattack-saudi-firm-us-sees-iran-firing-back
- Posen, Barry, The Sources of Military Doctrine (Ithaca: Cornell University Press 1986).
- Posen, Barry, Inadvertent Escalation: Conventional War and Nuclear Risk (Ithaca: Cornell University Press 1991).
- Posen, Barry, ‘Nationalism, the Mass Army, and Military Power’, International Security 18/2 ( Fall 1993), 80–124. doi:10.2307/2539098.
- Quester, George, Offense Defense in the International System (New York: John Wiley Publishers 1977).
- Rid, Thomas, Cyber War Will Not Take Place (New York: Oxford University Press 2013).
- Risch, Erna, Supplying Washington’s Army (Washington, DC: Center for Army History 1981).
- Rodriguez, Joe Fitzgerald, ‘You hacked appears at Muni stations as fare payment system crashes’, San Francisco Examiner, 26 Nov. 2016. https://www.sfexaminer.com/news/you-hacked-appears-at-muni-stations-as-fare-payment-system-crashes/
- Rosen, Stephen, Winning the Next War: Innovation and the Modern Military (Ithaca: Cornell University Press 1994).
- Salay, David L., ‘The Production of Gunpowder in Pennsylvania during the American Revolution’, The Pennsylvania Magazine of History and Biography 99/4 (Oct. 1975), 422–24.
- Schneider, Jacquelyn, ‘Digitally-enabled warfare: The capability-vulnerability paradox’, Center for a New American Security, 29 Aug. 2016. https://www.cnas.org/publications/reports/digitally-enabled-warfare-the-capability-vulnerability-paradox
- Schneider, Jacquelyn, ‘Cyber and crisis escalation: Insights from wargaming,’ Presented at USASOC Futures Forum, 2017. http://pacs.einaudi.cornell.edu/sites/pacs/files/Schneider.Cyber%20and%20Crisis%20Escalation%20Insights%20from%20Wargaming%20Schneider%20for%20Cornell.10-12-17.pdf
- Schneider, Jacquelyn, ‘JEDI: Outlook for stability uncertain as pentagon migrates to the cloud’, Bulletin of Atomic Scientists, 21 June 2018. https://thebulletin.org/2018/06/jedi-outlook-for-stability-uncertain-as-pentagon-migrates-to-the-cloud/
- Sechser, Todd S., Neil Narang, and Caitlin Talmadge, ‘Emerging Technologies and Strategic Stability in Peacetime, Crisis, and War’, Journal of Strategic Studies (2019).
- Smit, Wim and John Grin, Military Technological Innovation and Stability in a Changing World: Politically Assessing and Influencing Weapon Innovation and Military Research and Development (Charlotte: Virginia University Press 1992).
- Snyder, Jack, ‘Civil-Military Relations and the Cult of the Offensive, 1914 and 1984’, International Security 9/1 (1984), 108–46. doi:10.2307/2538637.
- Stephenson, Orlando W., ‘The Supply of Gunpowder in 1776’, The American Historical Review 30/2 (Jan 1925). doi:10.2307/1836657.
- Talmadge, Caitlin, ‘The Puzzle of Personalist Performance: Iraqi Battlefield Effectiveness in the Iran-Iraq War’, Security Studies 22/2 (2013), 180–221. doi:10.1080/09636412.2013.786911.
- Talmadge, Caitlin, The Dictator’s Army: Battlefield Effectiveness in Authoritarian Regimes (Cornell: Cornell University Press 2016).
- Talmadge, Caitlin, ‘Emerging Technology and Intra-War Escalation Risks: Evidence from the Cold War, Implications for Today’, Journal of Strategic Studies (2019).
- U.S. Department of Defense, Joint Operational Access Concept (17 Jan. 2012).
- Valeriano, Brandon, Benjamin Jensen, and Ryan Maness, Cyber Strategy: The Changing Character of Cyber Power and Coercion (Oxford: Oxford University Press 2018).
- Valeriano, Brandon and Ryan C. Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System (Oxford: Oxford University Press 2015).
- Van Evera, Stephen, ‘The Cult of the Offensive and the Origins of the First World War’, International Security 9/1 (1984), 58–107. doi:10.2307/2538636.
- Van Evera, Stephen, Causes of War: Power and the Roots of Conflict (Ithaca: Cornell University Press 1999).
- Volpe, Tristan, ‘Duel-Use Distinguishability: How 3d-Printing Shapes the Security Dilemma for Nuclear Programs’, Journal of Strategic Studies (2019).
- Waltz, Kenneth, Theory of International Politics (New York: McGraw Hill 1979).
- Williams, Heather, ‘Asymmetric Arms Control and Strategic Stability: Scenarios for Limiting Hypersonic Glide Vehicles’, Journal of Strategic Studies (2019).
- Woloch, Isser, ‘Napoleonic Conscription: State Power and Civil Society’’, Past & Present 111 (May 1986), 101–29. doi:10.1093/past/111.1.101.
- Work, Bob, ‘The Third U.S. Offset Strategy and Its Implications for Partners and Allies’, 28 Jan. 2015. https://dod.defense.gov/News/Speeches/Speech-View/Article/606641/the-third-us-offset-strategy-and-its-implications-for-partners-and-allies/