Works matching DE "CYBERWEAPONS"
Results: 54
Tanks in Cyberspace.
- Published in:
- International Policy Digest, 2014, v. 1, n. 4, p. 79
- By:
- Publication type:
- Article
BEYOND SKYNET: RECONCILING INCREASED AUTONOMY IN COMPUTER-BASED WEAPONS SYSTEMS WITH THE LAWS OF WAR.
- Published in:
- Air Force Law Review, 2014, v. 71, p. 231
- By:
- Publication type:
- Article
Is Cyber Strategy Possible?
- Published in:
- Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
- By:
- Publication type:
- Article
BUSINESS WARFARE.
- Published in:
- Boston College Law Review, 2022, v. 63, n. 1, p. 1
- By:
- Publication type:
- Article
Similarity learning; Siamese networks; MCESTA; triplet loss; similarity metrics.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1402
- By:
- Publication type:
- Article
THE REUSABLE BOMB: EXPLORING HOW THE LAW OF ARMED CONFLICT APPLIES IN CYBERSPACE.
- Published in:
- Journal of Science & Technology Law, 2017, v. 23, n. 2, p. 481
- By:
- Publication type:
- Article
War of the Cyber World: The Law of Cyber Warfare.
- Published in:
- International Lawyer, 2013, v. 47, n. 2, p. 299
- By:
- Publication type:
- Article
Learning from Automation in Targeting to Better Regulate Autonomous Weapon Systems: Target Lists, the Electronic Battlefield and Automation in Mines.
- Published in:
- Journal of Conflict & Security Law, 2023, v. 28, n. 1, p. 135, doi. 10.1093/jcsl/krac030
- By:
- Publication type:
- Article
State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks.
- Published in:
- IT Professional, 2013, v. 15, n. 3, p. 32, doi. 10.1109/MITP.2013.20
- By:
- Publication type:
- Article
Cybersecurity: Aligning priorities.
- Published in:
- Chemical Engineering, 2015, v. 122, n. 4, p. 5
- By:
- Publication type:
- Article
Ensuring US Dominance in Cyberspace in a World of Significant Peer and Near-Peer Competition.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 51, doi. 10.1353/gia.2018.0007
- By:
- Publication type:
- Article
Cyberwar and Its Strategic Context.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 147, doi. 10.1353/gia.2017.0047
- By:
- Publication type:
- Article
Safety & Security: Cyberpeacekeeping.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 138, doi. 10.1353/gia.2017.0046
- By:
- Publication type:
- Article
Campaign Planning with Cyber Operations.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 131, doi. 10.1353/gia.2017.0045
- By:
- Publication type:
- Article
Military Matters: Who's in Control.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 120, doi. 10.1353/gia.2017.0044
- By:
- Publication type:
- Article
The Elusive Ethics of Leaking.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 112, doi. 10.1353/gia.2017.0043
- By:
- Publication type:
- Article
Iranian‐Israeli Confrontation: The Cyber Domain.
- Published in:
- Middle East Policy, 2020, v. 27, n. 3, p. 115, doi. 10.1111/mepo.12516
- By:
- Publication type:
- Article
CYBER SECURITY AS A GLOBAL CHALLENGE TODAY.
- Published in:
- Singidunum Journal of Applied Sciences, 2014, p. 687, doi. 10.15308/SInteZa-2014-687-692
- By:
- Publication type:
- Article
The Cyberterrorism Threat: Findings from a Survey of Researchers.
- Published in:
- Studies in Conflict & Terrorism, 2014, v. 37, n. 1, p. 68, doi. 10.1080/1057610X.2014.853603
- By:
- Publication type:
- Article
WHEN CYBERWEAPONS END UP ON PRIVATE NETWORKS: THIRD AMENDMENT IMPLICATIONS FOR CYBERSECURITY POLICY.
- Published in:
- American University Law Review, 2013, v. 62, n. 5, p. 1203
- By:
- Publication type:
- Article
First Strike.
- Published in:
- World Affairs, 2013, v. 175, n. 5, p. 33
- By:
- Publication type:
- Article
ARMS CONTROL 2.0: UPDATING THE CYBERWEAPON ARMS CONTROL FRAMEWORK.
- Published in:
- Michigan Technology Law Review, 2021, v. 28, n. 1, p. 175, doi. 10.36645/mtlr.28.1.arms
- By:
- Publication type:
- Article
Stuxnet: What Has Changed?
- Published in:
- Future Internet, 2012, v. 4, n. 3, p. 672, doi. 10.3390/fi4030672
- By:
- Publication type:
- Article
CYBERZAGROŻENIA NA POCZĄTKU XXI WIEKU.
- Published in:
- Przegląd Zachodni, 2012, n. 4, p. 205
- By:
- Publication type:
- Article
WHY THE HURRY TO REGULATE AUTONOMOUS WEAPON SYSTEMS-BUT NOT CYBER-WEAPONS?
- Published in:
- Temple International & Comparative Law Journal, 2016, v. 30, n. 1, p. 17
- By:
- Publication type:
- Article
US Policy on Active Cyber Defense.
- Published in:
- Journal of Homeland Security & Emergency Management, 2014, v. 11, n. 2, p. 289, doi. 10.1515/jhsem-2014-0021
- By:
- Publication type:
- Article
Attribution in cyberspace: techniques and legal implications.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2886, doi. 10.1002/sec.1485
- By:
- Publication type:
- Article
Enhancing malware detection for Android systems using a system call filtering and abstraction process.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 7, p. 1179, doi. 10.1002/sec.1073
- By:
- Publication type:
- Article
Prescient Warnings for a Post-Stuxnet World.
- Published in:
- SAIS Review of International Affairs, 2021, v. 41, n. 2, p. 143, doi. 10.1353/sais.2021.0023
- By:
- Publication type:
- Article
Incorporating Offensive Cyber Operations into Conventional Deterrence Strategies.
- Published in:
- Survival (0039-6338), 2017, v. 59, n. 1, p. 103, doi. 10.1080/00396338.2017.1282679
- By:
- Publication type:
- Article
Proliferation of Offensive Cyber Weapons. Strategic Implications and Non-Proliferation Assumptions.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2016, v. 15, n. 1, p. 61, doi. 10.32565/aarms.2016.1.6
- By:
- Publication type:
- Article
Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems.
- Published in:
- Homeland Security Affairs, 2014, p. 1
- By:
- Publication type:
- Article
Cyberweapons: Leveling the International Playing Field.
- Published in:
- Parameters: U.S. Army War College, 2011, v. 41, n. 3, p. 32, doi. 10.55540/0031-1723.2599
- By:
- Publication type:
- Article
Assessing the Intentions and Timing of Malware.
- Published in:
- Technology Innovation Management Review, 2014, p. 34, doi. 10.22215/timreview848
- By:
- Publication type:
- Article
Power and Predation in Cyberspace.
- Published in:
- Strategic Studies Quarterly, 2015, v. 9, n. 1, p. 100
- By:
- Publication type:
- Article
Impact of Network Structure on Malware Propagation: A Growth Curve Perspective.
- Published in:
- Journal of Management Information Systems, 2016, v. 33, n. 1, p. 296, doi. 10.1080/07421222.2016.1172440
- By:
- Publication type:
- Article
Cybersecurity: A Pre-history.
- Published in:
- Intelligence & National Security, 2012, v. 27, n. 5, p. 781, doi. 10.1080/02684527.2012.708530
- By:
- Publication type:
- Article
Out of sight, out of reach: Moral issues in the globalization of the battlefield.
- Published in:
- International Review of the Red Cross, 2015, v. 97, n. 900, p. 1065, doi. 10.1017/S1816383116000461
- By:
- Publication type:
- Article
100 years hence….
- Published in:
- Journal of Military Ethics, 2014, v. 13, n. 2, p. 117, doi. 10.1080/15027570.2014.946795
- By:
- Publication type:
- Article
IS STUXNET PHYSICAL? DOES IT MATTER?
- Published in:
- Journal of Military Ethics, 2013, v. 12, n. 1, p. 68, doi. 10.1080/15027570.2013.782640
- By:
- Publication type:
- Article
A matter of time: On the transitory nature of cyberweapons.
- Published in:
- Journal of Strategic Studies, 2018, v. 41, n. 1/2, p. 6, doi. 10.1080/01402390.2017.1288107
- By:
- Publication type:
- Article
Offensive Cyber Weapons: Construction, Development, and Employment.
- Published in:
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 120, doi. 10.1080/01402390.2012.742014
- By:
- Publication type:
- Article
Cyber War is Inevitable (Unless We Build Security In).
- Published in:
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 109, doi. 10.1080/01402390.2012.742013
- By:
- Publication type:
- Article
How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate.
- Published in:
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 125, doi. 10.1080/01402390.2012.739561
- By:
- Publication type:
- Article
The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux: Liff Responds to Junio.
- Published in:
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 134, doi. 10.1080/01402390.2012.733312
- By:
- Publication type:
- Article
Coming next in military tech.
- Published in:
- Bulletin of the Atomic Scientists, 2014, v. 70, n. 1, p. 54, doi. 10.1177/0096340213516743
- By:
- Publication type:
- Article
The misunderstood acronym: Why cyber weapons aren’t WMD.
- Published in:
- Bulletin of the Atomic Scientists, 2013, v. 69, n. 5, p. 32, doi. 10.1177/0096340213501373
- By:
- Publication type:
- Article
From bombs to bytes: Can our nuclear history inform our cyber future?
- Published in:
- 2013
- By:
- Publication type:
- Essay
Lost in cyberspace: Harnessing the Internet, international relations, and global security.
- Published in:
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 2, p. 70, doi. 10.1177/0096340212438696
- By:
- Publication type:
- Article
21<sup>st</sup> Century Cyber Warfare.
- Published in:
- Information & Security, 2020, v. 44, p. 53, doi. 10.11610/isij.4405
- By:
- Publication type:
- Article