Academic literature on the topic 'Cyber deterrence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber deterrence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber deterrence"

1

Turunen, Maija, and Martti Kari. "Cumulative Cyber Deterrence." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 433–39. http://dx.doi.org/10.34190/iccws.17.1.55.

Full text
Abstract:
The cumulative cyber deterrence can be seen as a concept in which increasing the weight of different means and their use increases the deterrent effect on a common level or on selected adversaries. Cumulative cyber deterrence may include all traditional options of deterrence, and can be active or passive. Active deterrence can be characterized as targeting specific threats and actors, as a deterrent consisting of several different methods, while passive deterrence is a form of deterrence commonly targeted at all the potential adversaries. The cumulative cyber deterrence can be an independent t
APA, Harvard, Vancouver, ISO, and other styles
2

Keinonen, Maria, and Kimmo Halunen. "Options for Signalling Cyber Deterrence Using Cyber Capabilities." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 463–71. http://dx.doi.org/10.34190/iccws.19.1.2061.

Full text
Abstract:
The possibility of demonstrating power in cyberspace to create deterrence is a controversial topic. The desire of states to hide their true cyber capabilities leads to a reluctance to reveal their existing cyber power. However, the core idea of deterrence involves demonstrating power and signalling the will to use it so that the potential aggressor would find it less tempting to carry out aggression. Several studies attempt to solve the challenges related to cyber deterrence with a holistic approach, where deterrence in cyberspace is produced as part of a comprehensive deterrence using all ins
APA, Harvard, Vancouver, ISO, and other styles
3

Keinonen, Maria. "Using Military Cyber Operations as a Deterrent." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 489–96. http://dx.doi.org/10.34190/iccws.18.1.1025.

Full text
Abstract:
The Deterrence theory was formed after the World War II to describe the tensions between nuclear-armed states. Because of its origins, deterrence is mainly researched from the point of view of powerful states. However, deterrence nowadays is essential for any state to include in their strategies. The ever-increasing dependence on technology forces states to protect their sovereignty in cyberspace as well as in other domains. Cyber operations should be considered not just as a means to protect the cyber domain, but as means of deterrence. Cross domain deterrence (CDD) is a theory that includes
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Jim. "A New Interpretation of Integrated Deterrence: Physical and Virtual Strategies." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 116–23. http://dx.doi.org/10.34190/eccws.22.1.1314.

Full text
Abstract:
The integrated deterrence strategy, backstopped by nuclear deterrent, calls for seamless collaboration in deterrence across warfighting domains, using all instruments of national power, and with allies and partners. Being a warfighting domain and being closely related to the information instrument of national power, the cyber domain should certainly be included, and cyber deterrence should play a significant role in the integrated deterrence strategy. Nevertheless, as cyber deterrence seems not to be as effective as it is expected at least currently, some scholars and practitioners doubt its m
APA, Harvard, Vancouver, ISO, and other styles
5

Shahid, Nida, and Ahmad Khan. "ADDRESSING CYBER VULNERABILITIES THROUGH DETERRENCE." Journal of Contemporary Studies 11, no. 1 (2022): 50–68. http://dx.doi.org/10.54690/jcs.v11i1.212.

Full text
Abstract:
The study analyses the possible responses to cyber-attacks through cyberspace deterrence. The inundated cyber-attacks have prompted major powers to establish cyber deterrence. However, in the absence of a model of punishment, as it is empirically found in the nuclear domain, the efficacy of cyber deterrence is limited. The model of punishment against cyber-attacks is based on the traditional nuclear deterrence model, which is either deterrence by denial or deterrence by punishment. Cyber deterrence may not be a replica of traditional deterrence and give similar response measures in a cyber-att
APA, Harvard, Vancouver, ISO, and other styles
6

Senol, Mustafa, and Ertugrul Karacuha. "Creating and Implementing an Effective and Deterrent National Cyber Security Strategy." Journal of Engineering 2020 (June 1, 2020): 1–19. http://dx.doi.org/10.1155/2020/5267564.

Full text
Abstract:
This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. With the aim of responding to and ensuring cyber security effectively, studies on which pathways should be followed and what methods should be used to develop, create, and implement a NCSS are being conducted in Turkey, as in all countries. In this context, by explaining the importance of cyber power, the need for cyber power to be considered as one of the elements of national power and the importance of providing security against cyber attacks with deterrence
APA, Harvard, Vancouver, ISO, and other styles
7

Keinonen, Maria. "The Concept of Comprehensive Security as a Tool for Cyber Deterrence." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 567–74. http://dx.doi.org/10.34190/eccws.22.1.1254.

Full text
Abstract:
Cyber deterrence is often studied from the point of view of deterrence by punishment or offensive cyber strategies. A vast amount of studies claim that deterrence in cyberspace can never be successful with cyber means alone due to technical challenges and the problem of attribution. Some scholars argue that cyber resilience is an essential part of cyber deterrence, since not every cyberattack can be countered. These reviews are usually technical and concentrate on investigating the balance of offensive and defensive cyber strategies. The technical view leaves gaps in the physical and cyber-per
APA, Harvard, Vancouver, ISO, and other styles
8

Nye, Joseph S. "Deterrence and Dissuasion in Cyberspace." International Security 41, no. 3 (2017): 44–71. http://dx.doi.org/10.1162/isec_a_00266.

Full text
Abstract:
Understanding deterrence and dissuasion in cyberspace is often difficult because our minds are captured by Cold War images of massive retaliation to a nuclear attack by nuclear means. The analogy to nuclear deterrence is misleading, however, because many aspects of cyber behavior are more like other behaviors, such as crime, that states try (imperfectly) to deter. Preventing harm in cyberspace involves four complex mechanisms: threats of punishment, denial, entanglement, and norms. Even when punishment is used, deterrent threats need not be limited to cyber responses, and they may address gene
APA, Harvard, Vancouver, ISO, and other styles
9

Nishan, Elaf Hashim. "Reflection of the challenges facing cyber deterrence on cyber attacks." International and Political Journal, no. 55 (June 1, 2023): 185–202. http://dx.doi.org/10.31272/ipj.i55.171.

Full text
Abstract:

 As a result of the cyber-attacks to which many countries are exposed, and the increase in their numbers in the recent period, reliance on cyber deterrence has made an important issue. It Is related to the challenges of cyber deterrence, as the latter faces many attacks, which are a great pressure factor on this deterrence, as the challenges may be a contributing factor in reducing cyber-attacks and at the same time it may be a catalyst in increasing it, and this is what we will address in this research.
 
APA, Harvard, Vancouver, ISO, and other styles
10

NOVAK, STAŠA. "NATO AND CYBER DETERRENCE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2016/ ISSUE 18/2 (June 30, 2016): 29–50. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.18.2.2.

Full text
Abstract:
The impact of cyber technologies on the modern societies is significant. States have to adapt to the changed security environment to be able to ensure the security and stability for their territories and populations. Deterrence, which usually goes hand in hand with defence, is about preventing conflicts by dissuading potential aggressors to attack. With regard to cyber, the rules of deterrence change when compared to traditional deterrence, because of the special characteristics of the cyberspace. What is needed is new way of thinking about deterrence and a more comprehensive approach to it. T
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber deterrence"

1

Hemmer, Patrick T. "DETERRENCE AND CYBER-WEAPONS." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32836.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Rapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing se
APA, Harvard, Vancouver, ISO, and other styles
2

Moore, Ryan J. "Prospects for cyber deterrence." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.

Full text
Abstract:
Thesis (M.S. in Information Operations)--Naval Postgraduate School, December 2008.<br>Thesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Jasper, Scott. "U.S. strategic cyber deterrence options." Thesis, University of Reading, 2018. http://centaur.reading.ac.uk/79976/.

Full text
Abstract:
The U.S. government appears incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This thesis provides a systematic analysis of contemporary deterrence strategies and offers the U.S. the strategic option of active cyber defense designed for continuous cybered conflict. It examines the methods and motivations of the wide array of malicious actors operating in the cyber domain. The thesis explores how the theories of strategy and deterrence underpin the creation of strategic deterrence option
APA, Harvard, Vancouver, ISO, and other styles
4

Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.

Full text
Abstract:
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses of actions by convincing the aggressor that cost exceeds the profit. In cyberspace, where the costs are lower, deterrence is disputed because of the natural interconnectedness and constant actions. The aim of this study is to investigate how the US understands cyber deterrence. This study is motivated by the current ambiguity regarding whether deterrence works in cyberspace or not. Using both theories of conventional and cyber deterrence together with theories of offense and defense, the study fo
APA, Harvard, Vancouver, ISO, and other styles
5

Jafarian, Jafar Haadi. "Cyber Agility for Attack Deterrence and Deception." Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10686943.

Full text
Abstract:
<p> In recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either identifying and patching exploits, or detecting and filtering them. These techniques are only effective when intrusions are known or detectable. However, unknown (zero-day) vulnerabilities are constantly being discovered, and known vulnerabilities are not often patched promptly. Even worse, while defenders need to patch all vulnerabilities and intrusi
APA, Harvard, Vancouver, ISO, and other styles
6

Dawson, Ashley. "Addressing cyber warfare : bolstering deterrence through developing norms." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45001.

Full text
Abstract:
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-attacks that aim at disrupting, paralyzing and possibly destroying another state’s assets, with direct bearing on national security; and two, the potential strategies for limiting the scope and number of these attacks in the absence of viable deterrence. There is an ongoing debate about the nature and possibility of a ‘cyber war’ in the international system. By revisiting traditions conceptions of war, this paper argues a large-scale cyber war can be deterred using a strategy of deterrence by pun
APA, Harvard, Vancouver, ISO, and other styles
7

Akdag, Yavuz. "Cyber Deterrence against Cyberwar between the United States and China: A Power Transition Theory Perspective." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6993.

Full text
Abstract:
In the last three decades, states and societies have increasingly been connected to each other through Information and Communication Technologies (ICTs) such as satellites and the Internet, thus expanding the sphere of influence of cyberspace. While offering numerous economic and security benefits, this increased global connectivity also poses various security challenges and threats at the national and international level. In particular, the threat of cyberwar has become one of the top national security issues in both the United States and China, as reflected in an incr
APA, Harvard, Vancouver, ISO, and other styles
8

Edelman, Ross David. "Cyberattacks in international relations." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:e1d71a7a-7680-4f97-b98d-a41a4b484fda.

Full text
Abstract:
New methods of conflict and coercion can prompt tectonic shifts in the international system, reconfiguring power, institutions, and norms of state behavior. Cyberattacks, coercive acts that disrupt or destroy the digital infrastructure on which states increasingly rely, have the potential to be such a tool — but only if put into practice. This study examines which forces in the international system might restrain state use of cyberattacks, even when they are militarily advantageous. To do so I place this novel technology in the context of existing international regimes, employing an analogical
APA, Harvard, Vancouver, ISO, and other styles
9

Sidman, Nicholas, and 倪可思. "Warfare and Deterrence in the Cyber Realm: The Cases of the United States and Russia." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ppz9tf.

Full text
Abstract:
碩士<br>國立政治大學<br>國際研究英語碩士學位學程(IMPIS)<br>106<br>This thesis examines the cyber operations of the United States and Russia. By examining these two separate states, and the individual cases related to their cyber development, I illustrate how notions of deterrence are developing in the cyber realm. A major problem currently facing states with regards to deterrence in cyber space, is attribution. Knowing who engages in what cyber operations is attribution. However, through analysis of United States and Russian cyber operations through the lens of Joseph Nye's approach to cyber operations and deterr
APA, Harvard, Vancouver, ISO, and other styles
10

Broder, Melanie. "Rhetoric over reality? Assessing the success of deterrence in cyberspace: Israeli and US cyber security approaches between 2008 and 2018." Phd thesis, 2021. http://hdl.handle.net/1885/256573.

Full text
Abstract:
In April 2007 Estonia suffered a series of cyber-attacks in which hundreds of thousands of computers were used to cripple dozens of government and corporate sites. The attacks appeared to originate from Russia, although no country claimed responsibility. Regardless of the origin or reasons for the attack the consequences were far-reaching. States with advanced cyber postures began rapidly adopting measures to increase their cyber security to avoid similar attacks on their national interests, including creating specific cyber security policies and strategies. By 2008 at least twelve states had
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyber deterrence"

1

Tan, Eugene E. G. Cyber deterrence in Singapore: Frameworks & recommendations. S. Rajaratnam School of International Studies, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

author, Thayer Bradley A., ed. Deterring cyber warfare: Bolstering strategic stability in cyberspace. Palgrave Macmillan, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brantly, Aaron F. Cyber Deterrence Problem. Rowman & Littlefield Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brantly, Aaron F. Cyber Deterrence Problem. Rowman & Littlefield Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Strategic Cyber Deterrence. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jasper, Scott. Strategic Cyber Deterrence: The. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kello, Lucas. Cyber Defence. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0039.

Full text
Abstract:
Europe confronts an enormous cyber threat. The continent hosted the first international cyber crisis—the 2007 attacks by Russian political activists that crashed computer infrastructures in Estonia. Large European nations such as the UK and France focus their defensive efforts on proactive measures, which seek to neutralize threats before they materialize. Another tool of large powers is deterrence by punishment, an attempt to prevent hostile action with the pledge of severe reprisal. Smaller powers, by contrast, lack the resources necessary to implement proactive measures or deterrence. They
APA, Harvard, Vancouver, ISO, and other styles
8

Department of Defense. 2017 Cyber Attack Deterrence: Defense Science Board Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U. S. Nuclear Weapons, Attribution. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cyber Security Deterrence And It Protection For Critical Infrastructures. Springer International Publishing AG, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martellini, Maurizio. Cyber Security: Deterrence and IT Protection for Critical Infrastructures. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber deterrence"

1

Jabbour, Kamaal T., and E. Paul Ratazzi. "Does the United States Need a New Model for Cyber Deterrence?" In Deterrence. Palgrave Macmillan US, 2012. http://dx.doi.org/10.1057/9781137289810_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Katagiri, Nori. "Democracy and Cyber Deterrence." In How Liberal Democracies Defend Their Cyber Networks from Hackers. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soesanto, Stefan, and Max Smeets. "Cyber Deterrence: The Past, Present, and Future." In NL ARMS. T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_20.

Full text
Abstract:
AbstractThe question on whether and how deterring an adversary in or through cyberspace is feasible has provoked the minds of scholars and practitioners for decades. Today, cyber deterrence remains a quintessential anchoring concept for the political debates on cyber policy. However, does the concept of deterrence in cyberspace have a future when for almost three decades little to no seemingly feasible practical solutions nor an academic consensus have emerged? The purpose of this chapter is to situate the current debate on cyber deterrence within the historical evolution of deterrence thinkin
APA, Harvard, Vancouver, ISO, and other styles
4

le Gloannec, Anne-Marie, and Fleur Richard-Tixier. "Cyber security, cyber-deterrence and international law." In Routledge Handbook of War, Law and Technology. Routledge, 2019. http://dx.doi.org/10.4324/9781315111759-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taddeo, Mariarosaria. "The Challenges of Cyber Deterrence." In The 2018 Yearbook of the Digital Ethics Lab. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17152-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Haggman, Andreas. "Cyber Deterrence Theory and Practise." In Cyber Security: Power and Technology. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lupovici, Amir. "Uncertainty and the study of cyber deterrence." In Cyber Security Politics. Routledge, 2022. http://dx.doi.org/10.4324/9781003110224-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elder, Robert J., Alexander H. Levis, and Bahram Yousefi. "Alternatives to Cyber Warfare: Deterrence and Assurance." In Advances in Information Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14039-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Olsen, Peter, Hossein Zare, Todd Olsen, and Mojgan Azadi. "Basic Concepts and Considerations of Cyber-Deterrence." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43020-7_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cornish, Paul. "Deterrence and the Ethics of Cyber Conflict." In Ethics and Policies for Cyber Operations. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45300-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber deterrence"

1

Hadipour, Nastaran, and Renita Murimi. "Medical Advisories as Deterrents in Healthcare Cybercrime." In 2024 Cyber Awareness and Research Symposium (CARS). IEEE, 2024. https://doi.org/10.1109/cars61786.2024.10778642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brantly, Aaron F. "The cyber deterrence problem." In 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018. http://dx.doi.org/10.23919/cycon.2018.8405009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Cyber Deterrence and Russia’s Active Cyber Defense." In The 19th European Conference on Cyber Warfare. ACPI, 2020. http://dx.doi.org/10.34190/ews.20.038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Libicki, Martin C. "Obnoxious Deterrence." In 2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon). IEEE, 2022. http://dx.doi.org/10.23919/cycon55549.2022.9811024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Atkinson, Simon Reay, David Walker, Kevin Beaulne, and Liaquat Hossain. "Cyber -- Transparencies, Assurance and Deterrence." In 2012 International Conference on Cyber Security (CyberSecurity). IEEE, 2012. http://dx.doi.org/10.1109/cybersecurity.2012.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Soper, Braden C. "A Cyber-Nuclear Deterrence Game." In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Reddie, Andrew. "Tracing House: Wargaming Cyber Deterrence." In Proposed for presentation at the 89th MORS Symposium held June 21-25, 2021. US DOE, 2021. http://dx.doi.org/10.2172/1871419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kelvin, Gabriel, Bethany Goldblum, Kiran Lakkaraju, and Joshua Letchford. "Contextualizing and Measuring Cyber Deterrence." In Proposed for presentation at the NSSC's Kick-Off and Advisory Board Meeting held April 19-20, 2022 in , . US DOE, 2022. http://dx.doi.org/10.2172/2002955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wanic, Elizabeth, and Neil Rowe. "Assessing Deterrence Optinos for Cyber Weapons." In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Jim Q. "Take the rein of cyber deterrence." In 2017 International Conference on Cyber-Conflict (CyCon U.S.). IEEE, 2017. http://dx.doi.org/10.1109/cyconus.2017.8167510.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber deterrence"

1

Goychayev, Rustam, Geoffrey A. Carr, Rachel A. Weise, et al. Cyber Deterrence and Stability. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1405058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Simcox, Frank W. Flexible Options for Cyber Deterrence. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada539892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hammer, Ann, Trisha Miller, and Eva Uribe. Cyber Resilience as a Deterrence Strategy. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1668133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Detlefsen, William R. Cyber Attacks, Attribution, and Deterrence: Three Case Studies. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1001276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rehn, Steven D. Don't Touch My Bits or Else! -- Cyber Deterrence. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada560247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jackson, Marian, Heather Blackwell, and Jennifer McCann. ANALYTIC FRAMEWORK FOR UNITED STATES CYBER DETERRENCE STRATEGY. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1762023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Uribe, Eva C., Benjamin J. Bonin, Michael F. Minner, et al. Why does cyber deterrence fail and when might it succeed? A framework for cyber scenario analysis. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1623326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Raju, Nivedita, and Tytti Erästö. The Role of Space Systems in Nuclear Deterrence. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/nwlc4997.

Full text
Abstract:
This paper is the first of two exploring nuclear escalation risks in connection with the space domain, with a focus on China, Russia and the United States. Space systems are used for multiple civilian and military purposes, including missions related to nuclear deterrence. Consequently, real and perceived military operations targeting space systems may create pathways to nuclear escalation. China, Russia and the USA possess both nuclear weapons and counterspace capabilities and are at risk of being drawn into war with each other through regional conflicts and great power competition. These sta
APA, Harvard, Vancouver, ISO, and other styles
9

Hoang, Harold T. Cyber: A Flexible Deterrent Option. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ad1018825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!