Attribution

From Cybersecurity Wiki
Jump to navigation Jump to search

TOC-> Issues->Attribution

Author 1 Author 2 Year Title Source Expertise Full Text
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Department of Homeland Security 2009 A Roadmap for Cybersecurity Research Government Report Low:Technology Pdf
Epstein, Richard A. Brown, Thomas P. 2008 Cybersecurity in the Payment Card Industry Law Review Article Low:Law; Low:Economics Pdf
Institute for Information Infrastructure Protection 2003 Cyber Security Research and Development Agenda Independent Reports Low/None:Technology Pdf
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
Kramer, Franklin D., et. al 2009 Cyberpower and National Security Book None N/A
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Reports Low:Research Processes; Low:Technology Pdf
Schmitt, Michael N. 2002 Wired Warfare Journal Article Moderate:Law Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf
  • Subcategories: None

Jump to Table of Contents