Works matching DE "CYBERWEAPONS"


Results: 59
    1

    Is Cyber Strategy Possible?

    Published in:
    Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
    By:
    • Hoffman, Wyatt
    Publication type:
    Article
    2
    3

    Coming next in military tech.

    Published in:
    Bulletin of the Atomic Scientists, 2014, v. 70, n. 1, p. 54, doi. 10.1177/0096340213516743
    By:
    • Horowitz, Michael C.
    Publication type:
    Article
    4
    5
    6
    7
    8
    9
    10
    11
    12

    Cybersecurity: A Pre-history.

    Published in:
    Intelligence & National Security, 2012, v. 27, n. 5, p. 781, doi. 10.1080/02684527.2012.708530
    By:
    • Warner, Michael
    Publication type:
    Article
    13

    Tanks in Cyberspace.

    Published in:
    International Policy Digest, 2014, v. 1, n. 4, p. 79
    By:
    • Wingfield, Thomas C.;
    • Sharp, Robert
    Publication type:
    Article
    14
    15
    16
    17
    18
    19
    20
    21
    22

    Cyberwar and Its Strategic Context.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 147, doi. 10.1353/gia.2017.0047
    By:
    • Bracken, Paul
    Publication type:
    Article
    23

    Safety & Security: Cyberpeacekeeping.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 138, doi. 10.1353/gia.2017.0046
    By:
    • Dorn, Walter
    Publication type:
    Article
    24

    Campaign Planning with Cyber Operations.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 131, doi. 10.1353/gia.2017.0045
    By:
    • Sulmeyer, Michael
    Publication type:
    Article
    25

    Military Matters: Who's in Control.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 120, doi. 10.1353/gia.2017.0044
    By:
    • Healey, Jason
    Publication type:
    Article
    26

    The Elusive Ethics of Leaking.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 112, doi. 10.1353/gia.2017.0043
    By:
    • Fenster, Mark
    Publication type:
    Article
    27
    28
    29
    30
    31

    US Policy on Active Cyber Defense.

    Published in:
    Journal of Homeland Security & Emergency Management, 2014, v. 11, n. 2, p. 289, doi. 10.1515/jhsem-2014-0021
    By:
    • Flowers, Angelyn;
    • Zeadally, Sherali
    Publication type:
    Article
    32
    33
    34

    Stuxnet: What Has Changed?

    Published in:
    Future Internet, 2012, v. 4, n. 3, p. 672, doi. 10.3390/fi4030672
    By:
    • Denning, Dorothy E.
    Publication type:
    Article
    35
    36
    37
    38
    39
    40

    First Strike.

    Published in:
    World Affairs, 2013, v. 175, n. 5, p. 33
    By:
    • Gjelten, Tom
    Publication type:
    Article
    41
    42
    43
    44
    45

    BUSINESS WARFARE.

    Published in:
    Boston College Law Review, 2022, v. 63, n. 1, p. 1
    By:
    • LIN, TOM C. W.
    Publication type:
    Article
    46
    47
    48
    49

    Establishing Cyber Warfare Doctrine.

    Published in:
    Journal of Strategic Security, 2012, v. 5, n. 1, p. 31, doi. 10.5038/1944-0472.5.1.3
    By:
    • Colarik, Andrew;
    • Janczewski, Lech
    Publication type:
    Article
    50