Attribution
| Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
|---|---|---|---|---|---|---|
| Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
| Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
| Epstein, Richard A. | Brown, Thomas P. | 2008 | Cybersecurity in the Payment Card Industry | Law Review Article | Low:Law; Low:Economics | |
| Institute for Information Infrastructure Protection | 2003 | Cyber Security Research and Development Agenda | Independent Reports | Low/None:Technology | ||
| Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
| Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
| National Research Council | 2007 | Toward a Safer and More Secure Cyberspace | Independent Reports | Low:Research Processes; Low:Technology | ||
| Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
| Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
| Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
| Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law |
- Subcategories: None