Thermonuclear cyberwar
暂无分享,去创建一个
[1] David E. Hoffman,et al. The dead hand : the untold story of the Cold War arms race and its dangerous legacy , 2009 .
[2] A. Long. Deterrence From Cold War to Long War: Lessons from Six Decades of RAND Research , 2008 .
[3] T. Schelling,et al. The Strategy of Conflict. , 1961 .
[4] James Sullivan,et al. Cross-domain deterrence: strategy in an era of complexity , 2019, International Affairs.
[5] William G. Hyland,et al. Managing Nuclear Operations , 1987 .
[6] Glenn Herald Snyder,et al. Deterrence and defense : toward a theory of national security , 1962 .
[7] Benjamin B. Fischer. CANOPY WING: The U.S. War Plan That Gave the East Germans Goose Bumps , 2014 .
[8] Stephen J. Cimbala. Nuclear cyberwar and crisis management , 2016 .
[9] Janice Gross Stein,et al. Psychology and Deterrence , 1986 .
[10] Lucas Kello. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft , 2013, International Security.
[11] Trey Herr,et al. Combating Complexity: Offensive Cyber Capabilities and Integrated Warfighting , 2016 .
[12] J. Lindsay,et al. Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace , 2015 .
[13] Lawrence Freedman. Perception and Misperception in International Politics , 1978 .
[14] Andrea Berger,et al. Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety , 2014 .
[15] Erik Gartzke,et al. The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth , 2013, International Security.
[16] R. K. Betts,et al. Is Strategy an Illusion? , 2000, International Security.
[17] Branislav L. Slantchev. Feigning Weakness , 2010, International Organization.
[18] Jon R. Lindsay,et al. The Impact of China on Cybersecurity: Fiction and Friction , 2015, International Security.
[19] Stephen J. Cimbala. Nuclear Deterrence and Cyber: The Quest for Concept , 2014 .
[20] Martin C. Libicki,et al. Cyber Warfare and Sino-American Crisis Instability , 2014 .
[21] Joel Brenner. America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare , 2011 .
[22] James R. Holmes,et al. Strategy in the Second Nuclear Age: Power, Ambition, and the Ultimate Weapon , 2012 .
[23] Albert Wohlstetter. The Delicate Balance of Terror , 1959 .
[24] Dale Peterson,et al. Offensive Cyber Weapons: Construction, Development, and Employment , 2013 .
[25] Philip E. Tetlock,et al. Psychology and International Relations Theory , 2003 .
[26] Gerald Sperrazzo. Psychology and international relations , 1965 .
[27] James J. Wirtz. Nuclear weapons in the information age , 2018 .
[28] Shaun Gregory,et al. The Hidden Cost of Deterrence: Nuclear Weapons Accidents 1950-88 , 1989 .
[29] Keren Yarhi-Milo,et al. Covert Communication: The Intelligibility and Credibility of Signaling in Secret , 2017 .
[30] P. Baran,et al. On Distributed Communications Networks , 1964 .
[31] Jon R. Lindsay,et al. Stuxnet and the Limits of Cyber Warfare , 2013 .
[32] Shiping Tang,et al. The Security Dilemma: A Conceptual Analysis , 2009 .
[33] Dan Reiter. Exploring the Bargaining Model of War , 2003, Perspectives on Politics.
[34] J. Fearon. Rationalist explanations for war , 1995, International Organization.
[35] R. Powell. War as a Commitment Problem , 2004, International Organization.
[36] Raymond L. Garthoff,et al. The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon. , 1990 .
[37] Herbert S. Lin,et al. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities , 2009 .
[38] Bruce G. Blair,et al. Strategic command and control , 1985 .
[39] Barry R. Posen. Inadvertent Escalation: Conventional War and Nuclear Risks , 1991 .
[40] Avery E. Goldstein,et al. First Things First: The Pressing Danger of Crisis Instability in U.S.-China Relations , 2013, International Security.
[41] D. Benson,et al. Why the Internet Is Not Increasing Terrorism , 2014 .
[42] Scott Borg. Economically Complex Cyberattacks , 2005, IEEE Secur. Priv..
[43] A. Long,et al. Stalking the Secure Second Strike: Intelligence, Counterforce, and Nuclear Strategy , 2015 .
[44] Paul Bracken,et al. The political command and control of nuclear forces , 1986 .
[45] Robert Powell,et al. Nuclear Brinkmanship with Two-Sided Incomplete Information , 1988, American Political Science Review.
[46] Erik Gartzke,et al. War Is in the Error Term , 1999, International Organization.
[47] Vincenzo A. Sainato,et al. Cyber War Will Not Take Place , 2012 .
[48] Jon R. Lindsay,et al. Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack , 2015, J. Cybersecur..
[49] S. V. Evera,et al. Causes of War , 2019 .
[50] Roftiel Constantine. Man without a Face: The Autobiography of Communism's Greatest Spymaster , 2008 .
[51] Erik Gartzke,et al. Nukes with Numbers: Empirical Research on the Consequences of Nuclear Weapons for International Conflict , 2016 .
[52] Ashok Kumar Saini. Profit-Function of Two- Similar Cold Standby Nuclear Missiles System subject to failure due to engineering or failure shuts down Squadron of Nuclear Missiles , 2015 .
[53] Richard A. Clarke,et al. Cyber War: The Next Threat to National Security and What to Do About It , 2010 .
[54] Stephanie Ricker Schulte,et al. “The WarGames Scenario” , 2008 .
[55] R. Harrison Wagner. War and the State: The Theory of International Politics , 2007 .
[56] Bernard Brodie,et al. The Absolute Weapon: Atomic Power and World Order. , 1946 .
[57] Marc Trachtenberg,et al. History and Strategy , 2020 .
[58] Herman Kahn. On Thermonuclear War , 1960 .
[59] Scott D. Sagan,et al. The spread of nuclear weapons : an enduring debate : with new chapters on Iran, Iraq, and North Korea, and on the prospects for global nuclear disarmament , 2013 .
[60] R. Powell. Nuclear Brinkmanship, Limited War, and Military Power , 2015, International Organization.
[61] Campbell Craig. Nuclear Statecraft: History and Strategy in America's Atomic Age , 2015 .
[62] Amitai Etzioni,et al. Conflict and Defense: A General Theory. , 1963 .
[63] J. Abbate,et al. Inventing the Internet , 1999 .
[64] Scott D. Sagan. The Limits of Safety: Organizations, Accidents, and Nuclear Weapons , 1993 .
[65] Austin Long,et al. Signaling with Secrets , 2019, Cross-Domain Deterrence.
[66] John E. Gudgel. Cyber War versus Cyber Realities: Cyber Conflict in the International System , 2016 .
[67] Erik Gartzke,et al. Coercion through Cyberspace : The Stability-Instability Paradox Revisited , 2015 .
[68] Robert Jervis,et al. The Illogic of American Nuclear Strategy , 1985 .
[69] Caitlin Talmadge,et al. Would China Go Nuclear? Assessing the Risk of Chinese Nuclear Escalation in a Conventional War with the United States , 2017, International Security.
[70] Frank C. Zagare,et al. Rationality and Deterrence , 1990, World Politics.
[71] Myriam Dunn Cavelty. Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate , 2008 .
[72] B. Buchanan,et al. Attributing Cyber Attacks , 2015 .
[73] Sean Lawson,et al. Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats , 2013 .
[74] Ben Buchanan. The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations , 2016 .
[75] Michael Warner,et al. Cybersecurity: A Pre-history , 2012 .
[76] R. Powell,et al. Nuclear Deterrence Theory: The Search for Credibility , 1990 .