Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The impacts of ocean acidification on marine ecosystems and reliant human communities
Racism. Sexism. Heterosexism. Gender binarism. Together, they comprise intimately
harmful, distinct, and entangled societal systems of self-serving domination and privilege …
harmful, distinct, and entangled societal systems of self-serving domination and privilege …
Machine learning for social science: An agnostic approach
Social scientists are now in an era of data abundance, and machine learning tools are
increasingly used to extract meaning from data sets both massive and small. We explain …
increasingly used to extract meaning from data sets both massive and small. We explain …
Cyber security meets security politics: Complex technology, fragmented politics, and networked science
M Dunn Cavelty, A Wenger - Contemporary Security Policy, 2020 - Taylor & Francis
In the last decade, cyber incidents have become more expensive, more disruptive, and in
many cases more political, with a new body of theoretically informed research emerging in …
many cases more political, with a new body of theoretically informed research emerging in …
Stuxnet and the limits of cyber warfare
JR Lindsay - Security studies, 2013 - Taylor & Francis
Stuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first
instance of a computer network attack known to cause physical damage across international …
instance of a computer network attack known to cause physical damage across international …
Cyber campaigns and strategic outcomes
RJ Harknett, M Smeets - Journal of Strategic Studies, 2022 - Taylor & Francis
While much focus has remained on the concept of cyberwar, what we have been observing
in actual cyber behaviour are campaigns comprised of linked cyber operations, with the …
in actual cyber behaviour are campaigns comprised of linked cyber operations, with the …
The meaning of the cyber revolution: Perils to theory and statecraft
L Kello - International Security, 2013 - direct.mit.edu
While decisionmakers warn about the cyber threat constantly, there is little systematic
analysis of the issue from an international security studies perspective. Some scholars …
analysis of the issue from an international security studies perspective. Some scholars …
Publicly attributing cyber attacks: a framework
When should states publicly attribute cyber intrusions? Whilst this is a question governments
increasingly grapple with, academia has hardly helped in providing answers. This article …
increasingly grapple with, academia has hardly helped in providing answers. This article …
Tip** the scales: the attribution problem and the feasibility of deterrence against cyberattack
JR Lindsay - Journal of Cybersecurity, 2015 - academic.oup.com
Cyber attackers rely on deception to exploit vulnerabilities and obfuscate their identity, which
makes many pessimistic about cyber deterrence. The attribution problem appears to make …
makes many pessimistic about cyber deterrence. The attribution problem appears to make …
Invisible digital front: Can cyber attacks shape battlefield events?
Recent years have seen growing concern over the use of cyber attacks in wartime, but little
evidence that these new tools of coercion can change battlefield events. We present the first …
evidence that these new tools of coercion can change battlefield events. We present the first …