Works matching DE "CYBERWEAPONS"
1
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 51, doi. 10.1353/gia.2018.0007
- Alexander, Keith B.;
- Jaffer, Jamil N.
- Article
2
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 147, doi. 10.1353/gia.2017.0047
- Article
3
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 138, doi. 10.1353/gia.2017.0046
- Article
4
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 131, doi. 10.1353/gia.2017.0045
- Article
5
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 120, doi. 10.1353/gia.2017.0044
- Article
6
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 112, doi. 10.1353/gia.2017.0043
- Article
7
- World Affairs, 2013, v. 175, n. 5, p. 33
- Article
8
- Contemporary Security Policy, 2019, v. 40, n. 2, p. 193, doi. 10.1080/13523260.2018.1529369
- Article
9
- Journal of Military Ethics, 2014, v. 13, n. 2, p. 117, doi. 10.1080/15027570.2014.946795
- Syse, Henrik;
- Cook, Martin L.
- Article
10
- Journal of Military Ethics, 2013, v. 12, n. 1, p. 68, doi. 10.1080/15027570.2013.782640
- Article
11
- Journal of Conflict & Security Law, 2023, v. 28, n. 1, p. 135, doi. 10.1093/jcsl/krac030
- Article
12
- Michigan Technology Law Review, 2021, v. 28, n. 1, p. 175, doi. 10.36645/mtlr.28.1.arms
- Article
13
- Studies in Conflict & Terrorism, 2014, v. 37, n. 1, p. 68, doi. 10.1080/1057610X.2014.853603
- Jarvis, Lee;
- Macdonald, Stuart;
- Nouri, Lella
- Article
14
- International Lawyer, 2013, v. 47, n. 2, p. 299
- Article
15
- Journal of Management Information Systems, 2016, v. 33, n. 1, p. 296, doi. 10.1080/07421222.2016.1172440
- Guo, Hong;
- Cheng, Hsing Kenneth;
- Kelley, Ken
- Article
16
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 120, doi. 10.1080/01402390.2012.742014
- Article
17
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 109, doi. 10.1080/01402390.2012.742013
- Article
18
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 125, doi. 10.1080/01402390.2012.739561
- Article
19
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 134, doi. 10.1080/01402390.2012.733312
- Article
20
- Comparative Strategy, 2016, v. 35, n. 2, p. 103, doi. 10.1080/01495933.2016.1176456
- Article
21
- Comparative Strategy, 2016, v. 35, n. 2, p. 93, doi. 10.1080/01495933.2016.1176453
- Article
22
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1402
- Debas, Elhaam;
- Alhumam, Norah;
- Riad, Khaled
- Article
23
- Strategic Studies Quarterly, 2015, v. 9, n. 1, p. 100
- Article
24
- International Review of the Red Cross, 2015, v. 97, n. 900, p. 1065, doi. 10.1017/S1816383116000461
- Article
25
- Journal of Homeland Security & Emergency Management, 2014, v. 11, n. 2, p. 289, doi. 10.1515/jhsem-2014-0021
- Flowers, Angelyn;
- Zeadally, Sherali
- Article
26
- Defense & Security Analysis, 2020, v. 36, n. 3, p. 352, doi. 10.1080/14751798.2020.1790811
- Article
27
- Journal of Strategic Security, 2020, v. 14, n. 2, p. 1, doi. 10.5038/1944-0472.14.2.1958
- Article
28
- Journal of Strategic Security, 2018, v. 11, n. 1, p. 43, doi. 10.5038/1944-0472.11.1.1657
- Article
29
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 39, doi. 10.5038/1944-0472.8.4.1439
- Article
30
- Journal of Strategic Security, 2012, v. 5, n. 1, p. 31, doi. 10.5038/1944-0472.5.1.3
- Colarik, Andrew;
- Janczewski, Lech
- Article
31
- Temple International & Comparative Law Journal, 2016, v. 30, n. 1, p. 17
- Article
32
- Chemical Engineering, 2015, v. 122, n. 4, p. 5
- Article
33
- International Policy Digest, 2014, v. 1, n. 4, p. 79
- Wingfield, Thomas C.;
- Sharp, Robert
- Article
34
- Technology Innovation Management Review, 2014, p. 34, doi. 10.22215/timreview848
- Article
35
- Singidunum Journal of Applied Sciences, 2014, p. 687, doi. 10.15308/SInteZa-2014-687-692
- Article
36
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2886, doi. 10.1002/sec.1485
- Shamsi, Jawwad A.;
- Zeadally, Sherali;
- Sheikh, Fareha;
- Flowers, Angelyn
- Article
37
- Security & Communication Networks, 2015, v. 8, n. 7, p. 1179, doi. 10.1002/sec.1073
- Amamra, Abdelfattah;
- Robert, Jean-Marc;
- Talhi, Chamseddine
- Article
38
- Homeland Security Affairs, 2014, p. 1
- Ramuhalli, Pradeep;
- Halappanavar, Mahantesh;
- Coble, Jamie;
- Dixit, Mukul
- Article
39
- Parameters: U.S. Army War College, 2011, v. 41, n. 3, p. 32, doi. 10.55540/0031-1723.2599
- Article
40
- Boston College Law Review, 2022, v. 63, n. 1, p. 1
- Article
41
- Intelligence & National Security, 2012, v. 27, n. 5, p. 781, doi. 10.1080/02684527.2012.708530
- Article
42
- Information & Security, 2020, v. 44, p. 53, doi. 10.11610/isij.4405
- Article
43
- Journal of Science & Technology Law, 2017, v. 23, n. 2, p. 481
- Article
44
- IT Professional, 2013, v. 15, n. 3, p. 32, doi. 10.1109/MITP.2013.20
- Kallberg, Jan;
- Thuraisingham, Bhavani
- Article
45
- Chinese Journal of International Law, 2025, v. 24, n. 1, p. 1, doi. 10.1093/chinesejil/jmaf005
- Article
46
- Bulletin of the Atomic Scientists, 2014, v. 70, n. 1, p. 54, doi. 10.1177/0096340213516743
- Article
47
- Bulletin of the Atomic Scientists, 2013, v. 69, n. 5, p. 32, doi. 10.1177/0096340213501373
- Article
49
- Survival (0039-6338), 2017, v. 59, n. 1, p. 103, doi. 10.1080/00396338.2017.1282679
- Article
50
- Middle East Policy, 2020, v. 27, n. 3, p. 115, doi. 10.1111/mepo.12516
- Article