The better angels of our digital nature? Offensive cyber capabilities and state violence |
Scientific & Technology Responses |
Cyber-IR, Conflict & War |
2021 |
Ethics of AI and Cybersecurity When Sovereignty is at Stake |
System State, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2019 |
What Would Really Happen If Russia Attacked Undersea Internet Cables |
Scientific & Technology Responses |
Conflict & War |
2018 |
Cyber Security without Cyber War |
System State |
Cyber-IR, Governance & Institutions, Conflict & War |
2012 |
Lessons from Russia's Cyber-War in Ukraine |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2022 |
Building a Regional, Right of Boom Cyber Defense Network |
System State |
Conflict & War |
|
Preventing Cyber Escalation in Ukraine and After |
System Problems |
Conflict & War |
|
Europe Steps up Cybersecurity Efforts in Response to the War in Ukraine |
System Problems |
Cyber-IR, Conflict & War |
|
ASSESS RUSSIA’S CYBER PERFORMANCE WITHOUT REPEATING ITS PAST MISTAKES |
System State, Scientific & Technology Responses |
Conflict & War |
2022 |
How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid |
System State |
Conflict & War |
2017 |
The Cyber Dimension of the Russia–Ukraine War |
System State |
Conflict & War |
2022 |
When Satellites Attack: Satellite-to-Satellite Cyber Attack, Defense and Resilience |
Scientific & Technology Responses |
Conflict & War |
2020 |
The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space |
Scientific & Technology Responses |
Conflict & War |
2019 |
Entering Year Four, Space Force Focusing on Cyber Capabilities |
Socio-economic & Political Responses |
Conflict & War |
2022 |
LockBit 3.0 Ransomware: Inside the Cyberthreat That's Costing Millions |
System State |
Conflict & War |
2023 |
FakeCalls Vishing Malware Targets South Korean Users via Popular Financial Apps |
System State |
Conflict & War |
2023 |
Evaluating the International Support to Ukrainian Cyber Defense |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
China Security Report 2023: China's Quest for Control of the Cognitive Domain and Gray Zone Situations |
Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2023 |
The UN Cyber Norms: How Do They Guide the Responsible Development and Use of Offensive Cyber Capabilities? |
System State |
Cyber-IR, Conflict & War |
2022 |
Ethical Assessment of Russian Election Interference: Using the Framework of Just Information Warfare |
System State |
Cyber-IR, Conflict & War |
2022 |
Cyber-Physical Coordinated Attacks: The Emerging Complexity of Crisis Management |
System Problems, Scientific & Technology Responses |
Conflict & War, Cybersecurity & Sustainability |
2022 |
Innovation Power: Why Technology Will Define the Future of Geopolitics |
Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2023 |
FACT SHEET: Ongoing Public U.S. Efforts to Counter Ransomware |
System State, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War |
2021 |
Under false flag: using technical artifacts for cyberattack attribution |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2020 |
Cyber Security without Cyber War |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War |
2012 |
Cybersecurity in healthcare: A systematic review of modern threats and trends |
System Problems |
Conflict & War |
2017 |
Cyber security meets security politics: Complex technology, fragmented politics, and networked science |
System State |
Governance & Institutions, Conflict & War |
2019 |
The Growing Threat of Cyberattacks |
Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2021 |
Congress's Role in Cyber Warfare |
System State |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2010 |
Confidence-building and international agreement in cybersecurity |
System State, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2013 |
Cyberattacks, cyber threats, and attitudes toward cybersecurity policies |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War |
2021 |
Comprehensive Security Framework for Global Threats Analysis |
System State, System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2009 |
Combatant Status and Computer Network Attack |
System State, System Problems |
Conflict & War, Cybersecurity & Sustainability |
2010 |
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents |
System State, System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2015 |
Classification of Cyber Conflict |
System State |
Conflict & War |
2012 |
China's Electronic Strategies |
System State |
Conflict & War |
2001 |
Information Operations |
Scientific & Technology Responses |
Governance & Institutions, Conflict & War |
2012 |
Human Swarms, a real-time method for collective intelligence |
Scientific & Technology Responses |
Governance & Institutions, Conflict & War |
2015 |
Expert Group Meeting on the Virtual Against Cybercrime, Final Draft Prepared for the UN Experts meeting in Seoul June 28-30, 2006, Cybercrime Update: Trends and Developments |
System State, Scientific & Technology Responses |
Conflict & War, Cybersecurity & Sustainability |
2006 |
Emerging Cyber Threats Report for 2009: Data, Mobility and Questions of Responsibility will Drive Cyber Threats in 2009 and Beyond |
System State |
Conflict & War, Cybersecurity & Sustainability |
2008 |
Cyber Deterrence or How We Learned to Stop Worrying and Love the Signal |
System Problems |
Conflict & War, Cybersecurity & Sustainability |
2019 |
Measuring Military Cyber Power |
System State |
Governance & Institutions, Conflict & War |
2017 |
The Dark Web Has Its Own People's Court |
System State, System Problems |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2021 |
"The Future of Cybersecurity in 2021 and Beyond" |
System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Conflict & War, Cybersecurity & Sustainability |
2021 |
Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses |
System State, System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2015 |
Cyber terrorism: A homogenized taxonomy and definition |
System Problems |
Cyber-IR, Conflict & War |
2020 |
Interaction between Information Law and Competition Law in Japan |
System State, System Problems, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2021 |
THE OFFENSE/DEFENSE BALANCE IN CYBERSPACE |
System Problems |
Conflict & War |
2013 |
What is Pegasus spyware and how does it hack phones? |
System State |
Conflict & War |
2021 |
Suspected Iranian hack hits Israeli LGBT site; users fear leak of personal info |
System State |
Conflict & War |
2021 |