[LIBRO][B] The virtual weapon and international order

L Kello - 2017 - books.google.com
An urgently needed examination of the current cyber revolution that draws on case studies
to develop conceptual frameworks for understanding its effects on international order The …

Attributing cyber attacks

T Rid, B Buchanan - Journal of strategic studies, 2015 - Taylor & Francis
Who did it? Attribution is fundamental. Human lives and the security of the state may depend
on ascribing agency to an agent. In the context of computer network intrusions, attribution is …

Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems

F Pasqualetti, F Dorfler, F Bullo - IEEE Control Systems …, 2015 - ieeexplore.ieee.org
Cyberphysical systems integrate physical processes, computational resources, and
communication capabilities. Cyberphysical systems have permeated modern society …

Invisible digital front: Can cyber attacks shape battlefield events?

N Kostyuk, YM Zhukov - Journal of Conflict Resolution, 2019 - journals.sagepub.com
Recent years have seen growing concern over the use of cyber attacks in wartime, but little
evidence that these new tools of coercion can change battlefield events. We present the first …

The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public

N Kostyuk, C Wayne - Journal of Global Security Studies, 2021 - academic.oup.com
Cybersecurity represents a unique national security challenge for states: data breaches with
the potential for national, macro-level consequences are most likely to occur at the micro …

A matter of time: On the transitory nature of cyberweapons

M Smeets - Journal of Strategic Studies, 2018 - Taylor & Francis
This article examines the transitory nature of cyberweapons. Shedding light on this highly
understudied facet is important both for gras** how cyberspace affects international …

[LIBRO][B] Cyberspace in peace and war

M Libicki - 2016 - books.google.com
This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and
strategy, developed for a one-or two-semester class for students of public policy (including …

Riskteller: Predicting the risk of cyber incidents

L Bilge, Y Han, M Dell'Amico - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
The current evolution of the cyber-threat ecosystem shows that no system can be considered
invulnerable. It is therefore important to quantify the risk level within a system and devise risk …

[PDF][PDF] Cyber wargaming: finding, designing, and playing wargames for cyber security education

A Haggman - 2019 - core.ac.uk
This thesis investigates, and contributes to, the use of wargaming in cyber security
education. Wargaming has a rich history of pedagogic use, but little work exists that …

Breaking the myth of cyber doom: Securitization and normalization of novel threats

MA Gomez, C Whyte - International Studies Quarterly, 2021 - academic.oup.com
Physical damage resulting from cyber operations continues to reinforce the “cyber doom”
narrative across societies dependent on information and communication technology. This is …