Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Manjikian, Mary McEvoy
2010.
From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik.
International Studies Quarterly,
Vol. 54,
Issue. 2,
p.
381.
Yannakogeorgos, Panayotis A.
2010.
Global Norms, American Sponsorship and the Emerging Patterns of World Politics.
p.
147.
Hansel, Mischa
2011.
Handbuch Kriegstheorien.
p.
564.
Caelli, W. J.
Raghavan, S. V.
Bhaskar, S. M.
and
Georgiades, J.
2011.
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks.
p.
41.
Rowe, Neil C.
Garfinkel, Simson L.
Beverly, Robert
and
Yannakogeorgos, Panayotis
2011.
Challenges in Monitoring Cyberarms Compliance.
International Journal of Cyber Warfare and Terrorism,
Vol. 1,
Issue. 2,
p.
35.
Haas, Michael W.
Mills, Robert F.
and
Grimaila, Michael R.
2011.
Human-in-the-Loop Simulations.
p.
175.
Jäger, Thomas
and
Hansel, Mischa
2011.
Transformation der Sicherheitspolitik.
p.
295.
Miller, James L.
Mills, Robert F.
Grimaila, Michael R.
and
Haas, Michael W.
2011.
A scalable architecture for improving the timeliness and relevance of cyber incident notifications.
p.
76.
Hansel, Mischa
2011.
Handbuch Kriegstheorien.
p.
298.
Chong, Alan
2012.
Cyber Conflict.
p.
223.
Samaan, Jean-Loup
2012.
The RAND Corporation (1989–2009).
p.
79.
MacKay, Brad
and
Munro, Iain
2012.
Information Warfare and New Organizational Landscapes: An Inquiry into the ExxonMobil–Greenpeace Dispute over Climate Change.
Organization Studies,
Vol. 33,
Issue. 11,
p.
1507.
Rowe, Neil C.
2012.
Ethical Impact of Technological Advancements and Applications in Society.
p.
195.
Radu, Roxana Georgiana
2012.
Power in the 21st Century.
p.
137.
Reich, Pauline C.
Weinstein, Stuart
Wild, Charles
and
Cabanlong, Allan S.
2012.
Law, Policy, and Technology.
p.
170.
Betz, David
2012.
Cyberpower in Strategic Affairs: Neither Unthinkable nor Blessed.
Journal of Strategic Studies,
Vol. 35,
Issue. 5,
p.
689.
2013.
Information Warfare.
p.
293.
Betz, David J.
and
Stevens, Tim
2013.
Analogical reasoning and cyber security.
Security Dialogue,
Vol. 44,
Issue. 2,
p.
147.
Vidalis, Stilianos
and
Angelopoulou, Olga
2013.
Deception and Maneuver Warfare Utilizing Cloud Resources.
Information Security Journal: A Global Perspective,
Vol. 22,
Issue. 4,
p.
151.
Stevens, Tim
2013.
Information Warfare: A Response to Taddeo.
Philosophy & Technology,
Vol. 26,
Issue. 2,
p.
221.