Difference between revisions of "Attribution"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 17: Line 17:
 
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
 
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
 
|-
 
|-
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Reports||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
+
|Institute for Information Infrastructure Protection||||2003||[[Cyber Security Research and Development Agenda]]||Independent Report||Low/None:Technology||[http://www.cyber.st.dhs.gov/docs/I3P%20Research%20Agenda%202003.pdf ''Pdf'']
 
|-
 
|-
 
|Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Journal Article||Low:International Warfare||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf'']
 
|Korns, Stephen W.|| ||2009||[[Cyber Operations]]||Journal Article||Low:International Warfare||[http://www.carlisle.army.mil/DIME/documents/Cyber%20Operations%20-%20The%20New%20Balance%20-%20Korns.pdf ''Pdf'']
Line 23: Line 23:
 
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
 
|Kramer, Franklin D., et. al||||2009||[[Cyberpower and National Security]]||Book||None||N/A
 
|-
 
|-
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
+
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Report||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
 
|-
 
|-
 
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf'']
 
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf'']

Revision as of 20:45, 20 August 2010

TOC-> Issues->Attribution

Author 1 Author 2 Year Title Source Expertise Full Text
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Epstein, Richard A. Brown, Thomas P. 2008 Cybersecurity in the Payment Card Industry Law Review Low:Law; Low:Economics Pdf
Institute for Information Infrastructure Protection 2003 Cyber Security Research and Development Agenda Independent Report Low/None:Technology Pdf
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Report Low:Research Processes; Low:Technology Pdf
Schmitt, Michael N. 2002 Wired Warfare Journal Article Moderate:Law Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf
  • Subcategories: None

Jump to Table of Contents