Works matching Stuxnet (Computer worm)
1
- International Journal of Intelligence & Counterintelligence, 2014, v. 27, n. 3, p. 465, doi. 10.1080/08850607.2014.900291
- Article
2
- Security Studies, 2013, v. 22, n. 3, p. 365, doi. 10.1080/09636412.2013.816122
- Article
3
- George Washington International Law Review, 2014, v. 46, n. 1, p. 199
- Article
4
- Journal of Diplomacy & International Relations, 2013, v. 14, n. 1, p. 49
- Farwell, James P.;
- Arakelian, Darby
- Article
5
- Turkish Journal of Security Studies / Güvenlik Calışmalari Dergisi, 2024, v. 26, n. 1, p. 38, doi. 10.54627/gcd.1443278
- Çetinkaya, Şeref;
- Terzi, Sami
- Article
6
- Bulletin of the Atomic Scientists, 2013, v. 69, n. 5, p. 32, doi. 10.1177/0096340213501373
- Article
7
- IEEE Internet Computing, 2015, v. 19, n. 3, p. 72, doi. 10.1109/MIC.2015.64
- Article
8
- Lithuanian Annual Strategic Review, 2013, v. 12, n. 1, p. 11, doi. 10.2478/lasr-2014-0001
- Article
9
- Security & Defence Quarterly, 2020, v. 29, p. 63, doi. 10.35467/sdq/121974
- Article
10
- Case Western Reserve Journal of International Law, 2015, v. 47, n. 3, p. 79
- Article
11
- Annals of University of Oradea, Series: International Relations & European Studies, 2015, n. 7, p. 49
- Article
12
- Politics, 2013, v. 33, n. 4, p. 299, doi. 10.1111/1467-9256.12035
- Herrington, Lewis;
- Aldrich, Richard
- Article
13
- Research & Exploration in Laboratory, 2014, v. 33, n. 8, p. 119
- WANG Guang-wei;
- PAN Hong;
- FAN Ming-yu
- Article
14
- Connections (18121098), 2013, v. 12, n. 4, p. 1, doi. 10.11610/Connections.rus.12.4.01
- Article
15
- University of Miami Law Review, 2018, v. 72, n. 3, p. 761
- TRAUTMAN, LAWRENCE J.;
- ORMEROD, PETER C.
- Article
16
- Automatisierungstechnik, 2019, v. 67, n. 5, p. 417, doi. 10.1515/auto-2019-0017
- Genge, Béla;
- Haller, Piroska;
- Duka, Adrian-Vasile;
- Sándor, Hunor
- Article
17
- TCE: The Chemical Engineer, 2016, n. 896, p. 22
- Article
18
- Journal of Political Science Education, 2021, v. 17, n. 1, p. 503, doi. 10.1080/15512169.2020.1729166
- Herr, Trey;
- Laudrain, Arthur P. B.;
- Smeets, Max
- Article
19
- Polish Quarterly of International Affairs, 2015, v. 24, n. 3, p. 7
- CASENOVE, MATTEO;
- KOWALCZEWSKA, KAJA
- Article
20
- Observatorio (OBS*), 2014, v. 8, n. 1, p. 95, doi. 10.15847/obsobs812014755
- Article
21
- Journal of National Security Law & Policy, 2014, v. 7, n. 1, p. 115
- Brown, Gary D.;
- Metcalf, Andrew O.
- Article
22
- Journal of Strategic Studies, 2018, v. 41, n. 1/2, p. 6, doi. 10.1080/01402390.2017.1288107
- Article
23
- Nuclear Future, 2016, v. 12, n. 5, p. 23
- Article
24
- ITNOW, 2015, v. 57, n. 4, p. 32, doi. 10.1093/itnow/bwv100
- Article
25
- Bulletin of the Atomic Scientists, 2012, v. 68, n. 5, p. 75, doi. 10.1177/0096340212459039
- Article
26
- Bulletin of the Atomic Scientists, 2011, v. 67, n. 1, p. 1, doi. 10.1177/0096340210393703
- Article
27
- Strategic Studies Quarterly, 2012, v. 6, n. 3, p. 88
- Article
28
- Central European Journal of International & Security Studies, 2013, v. 7, n. 2, p. 62
- Article
29
- TCE: The Chemical Engineer, 2011, n. 845, p. 8
- Article
30
- TCE: The Chemical Engineer, 2010, n. 834, p. 10
- Article
31
- World Affairs, 2013, v. 175, n. 5, p. 33
- Article
32
- Tulane Journal of International & Comparative Law, 2011, v. 20, n. 1, p. 303
- Article
33
- Middle East Quarterly, 2017, v. 24, n. 1, p. 1
- Article
34
- Journal of Counterterrorism & Homeland Security International, 2017, v. 23, n. 1, p. 8
- Article
35
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 3, p. 8
- Article