Works matching Stuxnet
Results: 131
Analysing The Effects of Cyber Security on National Security From A Realist Perspective: "Stuxnet" Example.
- Published in:
- Turkish Journal of Security Studies / Güvenlik Calışmalari Dergisi, 2024, v. 26, n. 1, p. 38, doi. 10.54627/gcd.1443278
- By:
- Publication type:
- Article
Dynamic Analysis of a Suspected Stuxnet Malicious Code.
- Published in:
- Research & Exploration in Laboratory, 2014, v. 33, n. 8, p. 119
- By:
- Publication type:
- Article
Inevitabilidade Digital: O Poder dos Laços Fracos, Convergência e Curiosidade na Disseminação do Stuxnet.
- Published in:
- Observatorio (OBS*), 2014, v. 8, n. 1, p. 95, doi. 10.15847/obsobs812014755
- By:
- Publication type:
- Article
Stuxnet and the Limits of Cyber Warfare.
- Published in:
- Security Studies, 2013, v. 22, n. 3, p. 365, doi. 10.1080/09636412.2013.816122
- By:
- Publication type:
- Article
STUXNET AND ITS HIDDEN LESSONS ON THE ETHICS OF CYBERWEAPONS.
- Published in:
- Case Western Reserve Journal of International Law, 2015, v. 47, n. 3, p. 79
- By:
- Publication type:
- Article
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things.
- Published in:
- University of Miami Law Review, 2018, v. 72, n. 3, p. 761
- By:
- Publication type:
- Article
CYBER FORENSICS IN A POST STUXNET WORLD.
- Published in:
- ITNOW, 2015, v. 57, n. 4, p. 32, doi. 10.1093/itnow/bwv100
- By:
- Publication type:
- Article
Stuxnet - the world's first cyber-weapon.
- Published in:
- Nuclear Future, 2016, v. 12, n. 5, p. 23
- Publication type:
- Article
National Security and International Policy Challenges in a Post Stuxnet World.
- Published in:
- Lithuanian Annual Strategic Review, 2013, v. 12, n. 1, p. 11, doi. 10.2478/lasr-2014-0001
- By:
- Publication type:
- Article
A STUXNET ÉS AMI MÖGÖTTE VAN II.: CÉLOK ÉS TEENDŐK.
- Published in:
- Military Engineer / Hadmérnök, 2011, v. 5, n. 1, p. 222
- By:
- Publication type:
- Article
亚洲玉米螟中 stuxnet 基因的 时空表达与功能分析.
- Published in:
- Chinese Journal of Applied Entomology, 2021, v. 58, n. 4, p. 931, doi. 10.7679/j.issn.2095-1353.2021.091
- By:
- Publication type:
- Article
IS STUXNET PHYSICAL? DOES IT MATTER?
- Published in:
- Journal of Military Ethics, 2013, v. 12, n. 1, p. 68, doi. 10.1080/15027570.2013.782640
- By:
- Publication type:
- Article
Design of backpropagated neurocomputing paradigm for Stuxnet virus dynamics in control infrastructure.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 7, p. 5771, doi. 10.1007/s00521-021-06721-0
- By:
- Publication type:
- Article
Fractional Dynamics of Stuxnet Virus Propagation in Industrial Control Systems.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 17, p. 2160, doi. 10.3390/math9172160
- By:
- Publication type:
- Article
The Future of Cyber-Resilience in an Age of Global Complexity.
- Published in:
- Politics, 2013, v. 33, n. 4, p. 299, doi. 10.1111/1467-9256.12035
- By:
- Publication type:
- Article
Operation "Olympic Games." Cyber-sabotage as a tool of American intelligence aimed at counteracting the development of Iran's nuclear programme.
- Published in:
- Security & Defence Quarterly, 2020, v. 29, p. 63, doi. 10.35467/sdq/121974
- By:
- Publication type:
- Article
Mapping the Known Unknowns of Cybersecurity Education: A Review of Syllabi on Cyber Conflict and Security.
- Published in:
- Journal of Political Science Education, 2021, v. 17, n. 1, p. 503, doi. 10.1080/15512169.2020.1729166
- By:
- Publication type:
- Article
The misunderstood acronym: Why cyber weapons aren’t WMD.
- Published in:
- Bulletin of the Atomic Scientists, 2013, v. 69, n. 5, p. 32, doi. 10.1177/0096340213501373
- By:
- Publication type:
- Article
A matter of time: On the transitory nature of cyberweapons.
- Published in:
- Journal of Strategic Studies, 2018, v. 41, n. 1/2, p. 6, doi. 10.1080/01402390.2017.1288107
- By:
- Publication type:
- Article
The Cousins of Stuxnet: Duqu, Flame, and Gauss.
- Published in:
- Future Internet, 2012, v. 4, n. 4, p. 971, doi. 10.3390/fi4040971
- By:
- Publication type:
- Article
Stuxnet: What Has Changed?
- Published in:
- Future Internet, 2012, v. 4, n. 3, p. 672, doi. 10.3390/fi4030672
- By:
- Publication type:
- Article
The Remarkable 10<sup>th</sup> Anniversary of Stuxnet: Analytical Summary of the SolarStorm Cyber Espionage Campaign.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2020, v. 19, n. 3, p. 85, doi. 10.32565/aarms.2020.3.6
- By:
- Publication type:
- Article
Stuxnet targets uranium enrichment plants.
- Published in:
- TCE: The Chemical Engineer, 2010, n. 834, p. 10
- Publication type:
- Article
Easier Said Than Done: Legal Reviews of Cyber Weapons.
- Published in:
- Journal of National Security Law & Policy, 2014, v. 7, n. 1, p. 115
- By:
- Publication type:
- Article
Stuxnet and the Future of Cyber War.
- Published in:
- Survival (0039-6338), 2011, v. 53, n. 1, p. 23, doi. 10.1080/00396338.2011.555586
- By:
- Publication type:
- Article
Prescient Warnings for a Post-Stuxnet World.
- Published in:
- SAIS Review of International Affairs, 2021, v. 41, n. 2, p. 143, doi. 10.1353/sais.2021.0023
- By:
- Publication type:
- Article
The Stuxnet Worm and Potential Prosecution by the International Criminal Court Under the Newly Defined Crime of Aggression.
- Published in:
- Tulane Journal of International & Comparative Law, 2011, v. 20, n. 1, p. 303
- By:
- Publication type:
- Article
CYBERWAR & CYBERTERRORISM HEADING TOWARDS A CYBER-WATERLOO.
- Published in:
- Annals of University of Oradea, Series: International Relations & European Studies, 2015, n. 7, p. 49
- By:
- Publication type:
- Article
'Cry Stuxnet and Let Slip the Dogs of War?' The Potentially Deadly Viruses of Cyber Warfare.
- Published in:
- 2010
- By:
- Publication type:
- Book Review
Deconstru Stuxnet: The Beast Is Loose.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 3, p. 8
- By:
- Publication type:
- Article
The Human Shield.
- Published in:
- TCE: The Chemical Engineer, 2016, n. 896, p. 22
- By:
- Publication type:
- Article
Siemens blocks Stuxnet attacks.
- Published in:
- TCE: The Chemical Engineer, 2012, n. 855, p. 8
- Publication type:
- Article
Stuxnet successor surfaces.
- Published in:
- TCE: The Chemical Engineer, 2011, n. 845, p. 8
- Publication type:
- Article
APT--the New Cyberforce?
- Published in:
- Polish Quarterly of International Affairs, 2015, v. 24, n. 3, p. 7
- By:
- Publication type:
- Article
The Degrees of Force Exercised in the Cyber Battlespace.
- Published in:
- Connections (18121098), 2013, v. 12, n. 4, p. 1, doi. 10.11610/Connections.rus.12.4.01
- By:
- Publication type:
- Article
What Does Iran's Cyber Capability Mean For Future Conflict?
- Published in:
- Journal of Diplomacy & International Relations, 2013, v. 14, n. 1, p. 49
- By:
- Publication type:
- Article
HACKING BACK: REEVALUATING THE LEGALITY OF RETALIATORY CYBERATTACKS.
- Published in:
- George Washington International Law Review, 2014, v. 46, n. 1, p. 199
- By:
- Publication type:
- Article
Estados Unidos, poder cibernético e a "guerra cibernética": Do Worm Stuxnet ao Malware Flame/Skywiper -- e além.
- Published in:
- Meridiano 47 - Boletim de Análise de Conjuntura em Relações Internacionais, 2012, v. 13, n. 131, p. 43
- By:
- Publication type:
- Article
De la crisis de Qom al impacto del Stuxnet El programa nuclear iraní en medio de presiones políticas, sanciones económicas y acciones encubiertas.
- Published in:
- Humania del Sur: Revista de Estudios Latinoamericanos, Africanos y Asiáticos, 2011, v. 6, n. 10, p. 55
- By:
- Publication type:
- Article
A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems.
- Published in:
- Automatisierungstechnik, 2019, v. 67, n. 5, p. 417, doi. 10.1515/auto-2019-0017
- By:
- Publication type:
- Article
One Target Among Many: Not Your Average Malware.
- Published in:
- IEEE Internet Computing, 2015, v. 19, n. 3, p. 72, doi. 10.1109/MIC.2015.64
- By:
- Publication type:
- Article
Detecting Stuxnet‐like data integrity attacks.
- Published in:
- Security & Privacy, 2020, v. 3, n. 5, p. 1, doi. 10.1002/spy2.107
- By:
- Publication type:
- Article
Stuxnet detected, Pc breaks down.
- Published in:
- SCIENCE CHINA Life Sciences, 2016, v. 59, n. 11, p. 1202, doi. 10.1007/s11427-016-5108-4
- By:
- Publication type:
- Article
Epigenetic regulator Stuxnet modulates octopamine effect on sleep through a Stuxnet‐Polycomb‐Octβ2R cascade.
- Published in:
- EMBO Reports, 2021, v. 22, n. 2, p. 1, doi. 10.15252/embr.201947910
- By:
- Publication type:
- Article
International Perspectives of Cyber Warfare.
- Published in:
- International Journal of Cyber Warfare & Terrorism, 2015, v. 5, n. 4, p. 59, doi. 10.4018/IJCWT.2015100103
- By:
- Publication type:
- Article
IT Security for SCADA: A Position Paper.
- Published in:
- International Journal of Cyber Warfare & Terrorism, 2015, v. 5, n. 3, p. 19, doi. 10.4018/IJCWT.2015070102
- By:
- Publication type:
- Article
The Significance of Cyberspace in Canadian Security Policy.
- Published in:
- Central European Journal of International & Security Studies, 2013, v. 7, n. 2, p. 62
- By:
- Publication type:
- Article
A virtual necessity: Some modest steps toward greater cybersecurity.
- Published in:
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 5, p. 75, doi. 10.1177/0096340212459039
- By:
- Publication type:
- Article
Ronald Deibert: Tracking the emerging arms race in cyberspace.
- Published in:
- Bulletin of the Atomic Scientists, 2011, v. 67, n. 1, p. 1, doi. 10.1177/0096340210393703
- Publication type:
- Article
A preliminary engagement with the spatiality of power in cyberwar.
- Published in:
- GeoJournal, 2023, v. 88, n. 5, p. 5555, doi. 10.1007/s10708-023-10929-z
- By:
- Publication type:
- Article