Researching Cyber Weapons: An Enumerative Bibliography

作者: Lori Fossum

DOI: 10.1007/978-3-319-74107-9_14

关键词:

摘要: Scholarly literature about cyber weapons can be found in a number of sources, especially college and university libraries. Articles published the subject areas computer science, engineering, export controls, law military studies are also among best sources current analysis assuming they peer-reviewed substantiated with research sources. Patent applications, blog posts, government documents may provide researchers valuable information at various stages development deployment processes. Bibliographies, whether analytic or enumerative, offer short cut to relevant material on topic. This chapter presents an enumerative bibliography overview other methods useful locating scholarly papers updating ones already found.

参考文章(78)
Randy V. Sabett, Shane McGee, Anand Shah, Adequate Attribution: A Framework for Developing a National Policy for Private Sector Use of Active Defense Journal of Business and Technology Law. ,vol. 8, pp. 1- ,(2013)
Juan Cayón Peña, Luis Armando Garcia-Segura, The Critical Role of Education in Every Cyber Defense Strategy Social Science Research Network. ,(2014)
Ross M. Rustici, Cyberweapons: Leveling the International Playing Field Parameters. ,vol. 41, pp. 12- ,(2011)
Paul Belkin, NATO's Wales Summit: Expected Outcomes and Key Challenges Library of Congress. Congressional Research Service.. ,(2014)
Anders Henriksen, Lawful State Responses to Low-Level Cyber-Attacks Nordic Journal of International Law. ,vol. 84, pp. 323- 351 ,(2015) , 10.1163/15718107-08402008
Emilio Iasiello, Hacking Back: Not the right Solution Parameters. ,vol. 44, pp. 105- ,(2014)