Lessons from the Cold War: A Critical Examination of the Central Intelligence Agency, the Military, and the U.S. Foreign Policy with Melvin Goodman.Published in:2013By:Kapur, NeenaPublication type:Interview
Cybersecurity bills advance in House, Senate.Published in:Issues in Science & Technology, 2012, v. 28, n. 4, p. 23Publication type:Article
CYBER!Published in:Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109By:Matwyshyn, Andrea M.Publication type:Article
A Tale of Two Dystopias: Order and Chaos on the Electronic Frontier.Published in:2016By:Bankston, KevinPublication type:Speech
THE RED STORM IN UNCHARTED WATERS: CHINA AND INTERNATIONAL CYBER SECURITY.Published in:UMKC Law Review, 2014, v. 82, n. 4, p. 951By:Jyh-An LeePublication type:Article
CYBERSECURITY SUPPORT OF INSIDER THREAT OPERATIONS: DOD REGULATION AND CONSTITUTIONAL COMPLIANCE.Published in:George Mason University Civil Rights Law Journal, 2019, v. 30, n. 1, p. 1By:Ali, SalahudinPublication type:Article