Works matching DE "CYBERWEAPONS"


Results: 59
    1
    2

    Cyberwar and Its Strategic Context.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 147, doi. 10.1353/gia.2017.0047
    By:
    • Bracken, Paul
    Publication type:
    Article
    3

    Safety & Security: Cyberpeacekeeping.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 138, doi. 10.1353/gia.2017.0046
    By:
    • Dorn, Walter
    Publication type:
    Article
    4

    Campaign Planning with Cyber Operations.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 131, doi. 10.1353/gia.2017.0045
    By:
    • Sulmeyer, Michael
    Publication type:
    Article
    5

    Military Matters: Who's in Control.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 120, doi. 10.1353/gia.2017.0044
    By:
    • Healey, Jason
    Publication type:
    Article
    6

    The Elusive Ethics of Leaking.

    Published in:
    Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 112, doi. 10.1353/gia.2017.0043
    By:
    • Fenster, Mark
    Publication type:
    Article
    7

    First Strike.

    Published in:
    World Affairs, 2013, v. 175, n. 5, p. 33
    By:
    • Gjelten, Tom
    Publication type:
    Article
    8
    9

    100 years hence….

    Published in:
    Journal of Military Ethics, 2014, v. 13, n. 2, p. 117, doi. 10.1080/15027570.2014.946795
    By:
    • Syse, Henrik;
    • Cook, Martin L.
    Publication type:
    Article
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25

    US Policy on Active Cyber Defense.

    Published in:
    Journal of Homeland Security & Emergency Management, 2014, v. 11, n. 2, p. 289, doi. 10.1515/jhsem-2014-0021
    By:
    • Flowers, Angelyn;
    • Zeadally, Sherali
    Publication type:
    Article
    26
    27
    28
    29
    30

    Establishing Cyber Warfare Doctrine.

    Published in:
    Journal of Strategic Security, 2012, v. 5, n. 1, p. 31, doi. 10.5038/1944-0472.5.1.3
    By:
    • Colarik, Andrew;
    • Janczewski, Lech
    Publication type:
    Article
    31
    32
    33

    Tanks in Cyberspace.

    Published in:
    International Policy Digest, 2014, v. 1, n. 4, p. 79
    By:
    • Wingfield, Thomas C.;
    • Sharp, Robert
    Publication type:
    Article
    34
    35
    36
    37
    38
    39
    40

    BUSINESS WARFARE.

    Published in:
    Boston College Law Review, 2022, v. 63, n. 1, p. 1
    By:
    • LIN, TOM C. W.
    Publication type:
    Article
    41

    Cybersecurity: A Pre-history.

    Published in:
    Intelligence & National Security, 2012, v. 27, n. 5, p. 781, doi. 10.1080/02684527.2012.708530
    By:
    • Warner, Michael
    Publication type:
    Article
    42
    43
    44
    45
    46

    Coming next in military tech.

    Published in:
    Bulletin of the Atomic Scientists, 2014, v. 70, n. 1, p. 54, doi. 10.1177/0096340213516743
    By:
    • Horowitz, Michael C.
    Publication type:
    Article
    47
    48
    49
    50