Attribution: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Schmitt, Michael N. (2002) [[Wired Warfare]] | Schmitt, Michael N. (2002) [[Wired Warfare]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 32: | Line 31: | ||
|- | |- | ||
|Sklerov, Matthew J.|| ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||Law Review||Moderate:Law; Low:Technology||[http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf ''Pdf''] | |Sklerov, Matthew J.|| ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||Law Review||Moderate:Law; Low:Technology||[http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf ''Pdf''] | ||
|- | |||
|Todd, Graham H.|| ||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf''] | |||
|} | |} | ||
Revision as of 12:06, 11 August 2010
Schmitt, Michael N. (2002) Wired Warfare
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Epstein, Richard A. | Brown, Thomas P. | 2008 | Cybersecurity in the Payment Card Industry | Law Review Article | Low:Law; Low:Economics | |
Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | Low/None:Technology | ||
Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | ||
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law |
- Subcategories: None