The Limits of Deterrence Theory in Cyberspace
暂无分享,去创建一个
[1] M. Taddeo. Deterrence by Norms to Stop Interstate Cyber Attacks , 2017, Minds and Machines.
[2] M. Taddeo. Cyber Conflicts and Political Power in Information Societies , 2017, Minds and Machines.
[3] B. Schneier. Why the NSA Makes Us More Vulnerable to Cyberattacks , 2017 .
[4] George E. Tita,et al. National Security Strategy , 2017 .
[5] N. J. Ryan,et al. Five Kinds of Cyber Deterrence , 2017, Philosophy & Technology.
[6] L. Floridi,et al. Artificial Intelligence and the ‘Good Society’: the US, EU, and UK approach , 2016, Science and Engineering Ethics.
[7] Mariarosaria Taddeo,et al. On the Risks of Relying on Analogies to Understand Cyber Conflicts , 2016, Minds and Machines.
[8] R. Dipert. THE ESSENTIAL FEATURES OF AN ONTOLOGY FOR CYBERWARFARE , 2016 .
[9] L. Floridi. The Ethics of Information Warfare , 2014 .
[10] Emilio Iasiello,et al. Is Cyber Deterrence an Illusory Course of Action , 2014 .
[11] M. Taddeo. Cyber Security and Individual Rights, Striking the Right Balance , 2013, Philosophy & Technology.
[12] M. Martellini. Cyber Security: Deterrence and IT Protection for Critical Infrastructures , 2013 .
[13] Daniel S. Nagin,et al. Deterrence in the Twenty-First Century , 2013, Crime and Justice.
[14] T. Stevens,et al. Analogical reasoning and cyber security , 2013, Security Dialogue.
[15] Tim Stevens,et al. A Cyberwar of Ideas? Deterrence and Norms in Cyberspace , 2012 .
[16] Bernard Brodie,et al. The Development of Nuclear Strategy , 2011 .
[17] M. Taddeo. Information Warfare: A Philosophical Perspective , 2011, Philosophy & Technology.
[18] Duncan B. Hollis,et al. An e-SOS for Cyberspace , 2010 .
[19] Eric Talbot Jensen,et al. Cyber Warfare and Precautions Against the Effects of Attacks , 2010 .
[20] Herbert S. Lin,et al. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities , 2009 .
[21] Luciano Floridi,et al. The Method of Levels of Abstraction , 2008, Minds and Machines.
[22] Martin C. Libicki. Defending Cyberspace and Other Metaphors , 2002 .
[23] M. Curran,et al. The Ethics of Information , 1991, The Journal of nursing administration.
[24] R. Powell,et al. Nuclear Deterrence Theory: The Search for Credibility , 1990 .
[25] Robert Jervis,et al. Realism, Game Theory, and Cooperation , 1988, World Politics.
[26] Stephan Haggard,et al. Theories of international regimes , 1987, International Organization.
[27] Scott L. Feld,et al. Deterrence , 1978 .
[28] T. Schelling. ARMS AND INFLUENCE , 1967, Sam Nunn.
[29] T. Schelling,et al. The Strategy of Conflict. , 1961 .
[30] S. T. Possony. Atomic Power and World Order , 1946, The Review of Politics.
[31] H. V. Hentig. Limits of Deterrence , 1938 .
[32] M. Taddeo,et al. Ethics and Policies for Cyber Operations , 2017 .
[33] Annegret Bendiek,et al. Deterrence theory in the cyber-century , 2015, GI-Jahrestagung.
[34] S. Bologna,et al. From Fortress to Resilience , 2013 .
[35] Oona A. Hathaway,et al. The Law of Cyber-Attack , 2012 .
[36] Eric R. Sterner. Retaliatory Deterrence in Cyberspace , 2011 .
[37] Kenneth Geers,et al. Sun Tzu and Cyber War , 2011 .
[38] J. Nye. Nuclear Lessons for Cyber Security , 2011 .
[39] M. Crosston. World Gone Cyber MAD How “ Mutually Assured Debilitation ” Is the Best Hope for Cyber Deterrence , 2011 .
[40] W. Goodman. Cyber Deterrence: Tougher in Theory than in Practice? , 2010 .
[41] D. Clark. Untangling Attribution , 2010 .
[42] Joshua E. Kastenberg. Changing the Paradigm of Internet Access from Government Information Systems: A Solution to the Need for the DOD to Take Time-Sensitive Action on the Niprnet , 2009 .
[43] M. Bunn. Can Deterrence Be Tailored? Strategic Forum, Number 225, January 2007 , 2007 .
[44] B. Elliott,et al. Deterrence Theory Revisited , 2003 .
[45] Patrick M. Morgan,et al. Deterrence Now: CAMBRIDGE STUDIES IN INTERNATIONAL RELATIONS , 2003 .
[46] D. Marc Kilgour,et al. Perfect Deterrence , 2000 .