Works matching DE "CYBERWEAPONS"


Results: 59
    1
    2
    3
    4
    5
    6
    7

    Is Cyber Strategy Possible?

    Published in:
    Washington Quarterly, 2019, v. 42, n. 1, p. 131, doi. 10.1080/0163660X.2019.1593665
    By:
    • Hoffman, Wyatt
    Publication type:
    Article
    8

    First Strike.

    Published in:
    World Affairs, 2013, v. 175, n. 5, p. 33
    By:
    • Gjelten, Tom
    Publication type:
    Article
    9
    10
    11

    Coming next in military tech.

    Published in:
    Bulletin of the Atomic Scientists, 2014, v. 70, n. 1, p. 54, doi. 10.1177/0096340213516743
    By:
    • Horowitz, Michael C.
    Publication type:
    Article
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25

    Cybersecurity: A Pre-history.

    Published in:
    Intelligence & National Security, 2012, v. 27, n. 5, p. 781, doi. 10.1080/02684527.2012.708530
    By:
    • Warner, Michael
    Publication type:
    Article
    26
    27
    28
    29
    30

    Establishing Cyber Warfare Doctrine.

    Published in:
    Journal of Strategic Security, 2012, v. 5, n. 1, p. 31, doi. 10.5038/1944-0472.5.1.3
    By:
    • Colarik, Andrew;
    • Janczewski, Lech
    Publication type:
    Article
    31

    BUSINESS WARFARE.

    Published in:
    Boston College Law Review, 2022, v. 63, n. 1, p. 1
    By:
    • LIN, TOM C. W.
    Publication type:
    Article
    32

    100 years hence….

    Published in:
    Journal of Military Ethics, 2014, v. 13, n. 2, p. 117, doi. 10.1080/15027570.2014.946795
    By:
    • Syse, Henrik;
    • Cook, Martin L.
    Publication type:
    Article
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42

    Cyberwar and Its Strategic Context.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 147, doi. 10.1353/gia.2017.0047
    By:
    • Bracken, Paul
    Publication type:
    Article
    43

    Safety & Security: Cyberpeacekeeping.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 138, doi. 10.1353/gia.2017.0046
    By:
    • Dorn, Walter
    Publication type:
    Article
    44

    Campaign Planning with Cyber Operations.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 131, doi. 10.1353/gia.2017.0045
    By:
    • Sulmeyer, Michael
    Publication type:
    Article
    45

    Military Matters: Who's in Control.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 120, doi. 10.1353/gia.2017.0044
    By:
    • Healey, Jason
    Publication type:
    Article
    46

    The Elusive Ethics of Leaking.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 112, doi. 10.1353/gia.2017.0043
    By:
    • Fenster, Mark
    Publication type:
    Article
    47
    48
    49
    50