Works matching DE "STUXNET (Computer worm)"
Results: 23
A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems.
- Published in:
- Automatisierungstechnik, 2019, v. 67, n. 5, p. 417, doi. 10.1515/auto-2019-0017
- By:
- Publication type:
- Article
CYBERWAR & CYBERTERRORISM HEADING TOWARDS A CYBER-WATERLOO.
- Published in:
- Annals of University of Oradea, Series: International Relations & European Studies, 2015, n. 7, p. 49
- By:
- Publication type:
- Article
HACKING BACK: REEVALUATING THE LEGALITY OF RETALIATORY CYBERATTACKS.
- Published in:
- George Washington International Law Review, 2014, v. 46, n. 1, p. 199
- By:
- Publication type:
- Article
Dynamic Analysis of a Suspected Stuxnet Malicious Code.
- Published in:
- Research & Exploration in Laboratory, 2014, v. 33, n. 8, p. 119
- By:
- Publication type:
- Article
STUXNET AND ITS HIDDEN LESSONS ON THE ETHICS OF CYBERWEAPONS.
- Published in:
- Case Western Reserve Journal of International Law, 2015, v. 47, n. 3, p. 79
- By:
- Publication type:
- Article
Stuxnet and the Limits of Cyber Warfare.
- Published in:
- Security Studies, 2013, v. 22, n. 3, p. 365, doi. 10.1080/09636412.2013.816122
- By:
- Publication type:
- Article
Analysing The Effects of Cyber Security on National Security From A Realist Perspective: "Stuxnet" Example.
- Published in:
- Turkish Journal of Security Studies / Güvenlik Calışmalari Dergisi, 2024, v. 26, n. 1, p. 38, doi. 10.54627/gcd.1443278
- By:
- Publication type:
- Article
The Human Shield.
- Published in:
- TCE: The Chemical Engineer, 2016, n. 896, p. 22
- By:
- Publication type:
- Article
CYBER FORENSICS IN A POST STUXNET WORLD.
- Published in:
- ITNOW, 2015, v. 57, n. 4, p. 32, doi. 10.1093/itnow/bwv100
- By:
- Publication type:
- Article
Inevitabilidade Digital: O Poder dos Laços Fracos, Convergência e Curiosidade na Disseminação do Stuxnet.
- Published in:
- Observatorio (OBS*), 2014, v. 8, n. 1, p. 95, doi. 10.15847/obsobs812014755
- By:
- Publication type:
- Article
One Target Among Many: Not Your Average Malware.
- Published in:
- IEEE Internet Computing, 2015, v. 19, n. 3, p. 72, doi. 10.1109/MIC.2015.64
- By:
- Publication type:
- Article
APT--the New Cyberforce?
- Published in:
- Polish Quarterly of International Affairs, 2015, v. 24, n. 3, p. 7
- By:
- Publication type:
- Article
Operation "Olympic Games." Cyber-sabotage as a tool of American intelligence aimed at counteracting the development of Iran's nuclear programme.
- Published in:
- Security & Defence Quarterly, 2020, v. 29, p. 63, doi. 10.35467/sdq/121974
- By:
- Publication type:
- Article
Easier Said Than Done: Legal Reviews of Cyber Weapons.
- Published in:
- Journal of National Security Law & Policy, 2014, v. 7, n. 1, p. 115
- By:
- Publication type:
- Article
Mapping the Known Unknowns of Cybersecurity Education: A Review of Syllabi on Cyber Conflict and Security.
- Published in:
- Journal of Political Science Education, 2021, v. 17, n. 1, p. 503, doi. 10.1080/15512169.2020.1729166
- By:
- Publication type:
- Article
National Security and International Policy Challenges in a Post Stuxnet World.
- Published in:
- Lithuanian Annual Strategic Review, 2013, v. 12, n. 1, p. 11, doi. 10.2478/lasr-2014-0001
- By:
- Publication type:
- Article
The Future of Cyber-Resilience in an Age of Global Complexity.
- Published in:
- Politics, 2013, v. 33, n. 4, p. 299, doi. 10.1111/1467-9256.12035
- By:
- Publication type:
- Article
The Degrees of Force Exercised in the Cyber Battlespace.
- Published in:
- Connections (18121098), 2013, v. 12, n. 4, p. 1, doi. 10.11610/Connections.rus.12.4.01
- By:
- Publication type:
- Article
What Does Iran's Cyber Capability Mean For Future Conflict?
- Published in:
- Journal of Diplomacy & International Relations, 2013, v. 14, n. 1, p. 49
- By:
- Publication type:
- Article
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things.
- Published in:
- University of Miami Law Review, 2018, v. 72, n. 3, p. 761
- By:
- Publication type:
- Article
A matter of time: On the transitory nature of cyberweapons.
- Published in:
- Journal of Strategic Studies, 2018, v. 41, n. 1/2, p. 6, doi. 10.1080/01402390.2017.1288107
- By:
- Publication type:
- Article
The misunderstood acronym: Why cyber weapons aren’t WMD.
- Published in:
- Bulletin of the Atomic Scientists, 2013, v. 69, n. 5, p. 32, doi. 10.1177/0096340213501373
- By:
- Publication type:
- Article
Stuxnet - the world's first cyber-weapon.
- Published in:
- Nuclear Future, 2016, v. 12, n. 5, p. 23
- Publication type:
- Article