Works matching Cyberweapon


Results: 78
    1
    2
    3
    4
    5
    6

    Tanks in Cyberspace.

    Published in:
    International Policy Digest, 2014, v. 1, n. 4, p. 79
    By:
    • Wingfield, Thomas C.;
    • Sharp, Robert
    Publication type:
    Article
    7
    8
    9

    BUSINESS WARFARE.

    Published in:
    Boston College Law Review, 2022, v. 63, n. 1, p. 1
    By:
    • LIN, TOM C. W.
    Publication type:
    Article
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22

    First Strike.

    Published in:
    World Affairs, 2013, v. 175, n. 5, p. 33
    By:
    • Gjelten, Tom
    Publication type:
    Article
    23
    24

    Is Cyber Strategy Possible?

    Published in:
    Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
    By:
    • Hoffman, Wyatt
    Publication type:
    Article
    25

    US Policy on Active Cyber Defense.

    Published in:
    Journal of Homeland Security & Emergency Management, 2014, v. 11, n. 2, p. 289, doi. 10.1515/jhsem-2014-0021
    By:
    • Flowers, Angelyn;
    • Zeadally, Sherali
    Publication type:
    Article
    26
    27
    28
    29
    30
    31

    100 years hence….

    Published in:
    Journal of Military Ethics, 2014, v. 13, n. 2, p. 117, doi. 10.1080/15027570.2014.946795
    By:
    • Syse, Henrik;
    • Cook, Martin L.
    Publication type:
    Article
    32
    33
    34

    Coming next in military tech.

    Published in:
    Bulletin of the Atomic Scientists, 2014, v. 70, n. 1, p. 54, doi. 10.1177/0096340213516743
    By:
    • Horowitz, Michael C.
    Publication type:
    Article
    35
    36
    37
    38
    39
    40
    41

    Cyberwar and Its Strategic Context.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 147, doi. 10.1353/gia.2017.0047
    By:
    • Bracken, Paul
    Publication type:
    Article
    42

    Safety & Security: Cyberpeacekeeping.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 138, doi. 10.1353/gia.2017.0046
    By:
    • Dorn, Walter
    Publication type:
    Article
    43

    Campaign Planning with Cyber Operations.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 131, doi. 10.1353/gia.2017.0045
    By:
    • Sulmeyer, Michael
    Publication type:
    Article
    44

    Military Matters: Who's in Control.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 120, doi. 10.1353/gia.2017.0044
    By:
    • Healey, Jason
    Publication type:
    Article
    45

    The Elusive Ethics of Leaking.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 112, doi. 10.1353/gia.2017.0043
    By:
    • Fenster, Mark
    Publication type:
    Article
    46
    47

    Cybersecurity: A Pre-history.

    Published in:
    Intelligence & National Security, 2012, v. 27, n. 5, p. 781, doi. 10.1080/02684527.2012.708530
    By:
    • Warner, Michael
    Publication type:
    Article
    48
    49
    50