Works matching Cyberweapon
1
- Journal of Strategic Studies, 2018, v. 41, n. 1/2, p. 6, doi. 10.1080/01402390.2017.1288107
- Article
2
- Michigan Technology Law Review, 2021, v. 28, n. 1, p. 175, doi. 10.36645/mtlr.28.1.arms
- Article
3
- American University Law Review, 2013, v. 62, n. 5, p. 1203
- Article
4
- Parameters: U.S. Army War College, 2011, v. 41, n. 3, p. 32, doi. 10.55540/0031-1723.2599
- Article
5
- International Journal of Cyber Warfare & Terrorism, 2021, v. 11, n. 3, p. 1, doi. 10.4018/IJCWT.2021070104
- Pinto, C. Ariel;
- Zurasky, Matthew;
- Elakramine, Fatine;
- El Amrani, Safae;
- Jaradat, Raed M.;
- Kerr, Chad;
- Dayarathna, Vidanelage L.
- Article
6
- International Policy Digest, 2014, v. 1, n. 4, p. 79
- Wingfield, Thomas C.;
- Sharp, Robert
- Article
7
- Air Force Law Review, 2014, v. 71, p. 231
- Article
8
- SAIS Review of International Affairs, 2021, v. 41, n. 2, p. 143, doi. 10.1353/sais.2021.0023
- Article
9
- Boston College Law Review, 2022, v. 63, n. 1, p. 1
- Article
10
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2886, doi. 10.1002/sec.1485
- Shamsi, Jawwad A.;
- Zeadally, Sherali;
- Sheikh, Fareha;
- Flowers, Angelyn
- Article
11
- IT Professional, 2013, v. 15, n. 3, p. 32, doi. 10.1109/MITP.2013.20
- Kallberg, Jan;
- Thuraisingham, Bhavani
- Article
12
- Social & Legal Studios / Socìalʹno-Pravovì Studìï, 2023, v. 6, n. 4, p. 192, doi. 10.32518/sals4.2023.192
- Semenenko, Oleh;
- Dobrovolskyi, Uzef;
- Sliusarenko, Maryna;
- Levchenko, Ihor;
- Mytchenko, Serhii
- Article
13
- Defense & Security Analysis, 2020, v. 36, n. 3, p. 352, doi. 10.1080/14751798.2020.1790811
- Article
14
- Singidunum Journal of Applied Sciences, 2014, p. 687, doi. 10.15308/SInteZa-2014-687-692
- Article
15
- Case Western Reserve Journal of International Law, 2015, v. 47, n. 3, p. 79
- Article
16
- Comparative Strategy, 2016, v. 35, n. 2, p. 103, doi. 10.1080/01495933.2016.1176456
- Article
17
- Comparative Strategy, 2016, v. 35, n. 2, p. 93, doi. 10.1080/01495933.2016.1176453
- Article
18
- Journal of Conflict & Security Law, 2023, v. 28, n. 1, p. 135, doi. 10.1093/jcsl/krac030
- Article
19
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1402
- Debas, Elhaam;
- Alhumam, Norah;
- Riad, Khaled
- Article
20
- Chemical Engineering, 2015, v. 122, n. 4, p. 5
- Article
21
- CounterPunch, 2021, p. 1
- Article
22
- World Affairs, 2013, v. 175, n. 5, p. 33
- Article
23
- AARMS: Academic & Applied Research in Military & Public Management Science, 2016, v. 15, n. 1, p. 61, doi. 10.32565/aarms.2016.1.6
- Article
24
- Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
- Article
25
- Journal of Homeland Security & Emergency Management, 2014, v. 11, n. 2, p. 289, doi. 10.1515/jhsem-2014-0021
- Flowers, Angelyn;
- Zeadally, Sherali
- Article
26
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 120, doi. 10.1080/01402390.2012.742014
- Article
27
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 109, doi. 10.1080/01402390.2012.742013
- Article
28
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 125, doi. 10.1080/01402390.2012.739561
- Article
29
- Journal of Strategic Studies, 2013, v. 36, n. 1, p. 134, doi. 10.1080/01402390.2012.733312
- Article
30
- International Journal of Technoethics, 2010, v. 1, n. 1, p. 20, doi. 10.4018/jte.2010081002
- Article
31
- Journal of Military Ethics, 2014, v. 13, n. 2, p. 117, doi. 10.1080/15027570.2014.946795
- Syse, Henrik;
- Cook, Martin L.
- Article
32
- Journal of Military Ethics, 2013, v. 12, n. 1, p. 68, doi. 10.1080/15027570.2013.782640
- Article
33
- Studies in Conflict & Terrorism, 2014, v. 37, n. 1, p. 68, doi. 10.1080/1057610X.2014.853603
- Jarvis, Lee;
- Macdonald, Stuart;
- Nouri, Lella
- Article
34
- Bulletin of the Atomic Scientists, 2014, v. 70, n. 1, p. 54, doi. 10.1177/0096340213516743
- Article
35
- Bulletin of the Atomic Scientists, 2013, v. 69, n. 5, p. 32, doi. 10.1177/0096340213501373
- Article
37
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 2, p. 70, doi. 10.1177/0096340212438696
- Choucri, Nazli;
- Goldsmith, Daniel
- Article
38
- Journal of Science & Technology Law, 2017, v. 23, n. 2, p. 481
- Article
39
- Przegląd Zachodni, 2012, n. 4, p. 205
- Article
40
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 51, doi. 10.1353/gia.2018.0007
- Alexander, Keith B.;
- Jaffer, Jamil N.
- Article
41
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 147, doi. 10.1353/gia.2017.0047
- Article
42
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 138, doi. 10.1353/gia.2017.0046
- Article
43
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 131, doi. 10.1353/gia.2017.0045
- Article
44
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 120, doi. 10.1353/gia.2017.0044
- Article
45
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 112, doi. 10.1353/gia.2017.0043
- Article
46
- Law, Technology & Humans, 2022, v. 4, n. 2, p. 230, doi. 10.5204/lthj.2658
- Article
47
- Intelligence & National Security, 2012, v. 27, n. 5, p. 781, doi. 10.1080/02684527.2012.708530
- Article
48
- Strategic Studies Quarterly, 2015, v. 9, n. 1, p. 100
- Article
49
- Temple International & Comparative Law Journal, 2016, v. 30, n. 1, p. 17
- Article
50
- Journal of Management Information Systems, 2016, v. 33, n. 1, p. 296, doi. 10.1080/07421222.2016.1172440
- Guo, Hong;
- Cheng, Hsing Kenneth;
- Kelley, Ken
- Article