Academic literature on the topic 'Cyber deterrence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber deterrence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyber deterrence"
Turunen, Maija, and Martti Kari. "Cumulative Cyber Deterrence." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 433–39. http://dx.doi.org/10.34190/iccws.17.1.55.
Full textKeinonen, Maria, and Kimmo Halunen. "Options for Signalling Cyber Deterrence Using Cyber Capabilities." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 463–71. http://dx.doi.org/10.34190/iccws.19.1.2061.
Full textKeinonen, Maria. "Using Military Cyber Operations as a Deterrent." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 489–96. http://dx.doi.org/10.34190/iccws.18.1.1025.
Full textChen, Jim. "A New Interpretation of Integrated Deterrence: Physical and Virtual Strategies." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 116–23. http://dx.doi.org/10.34190/eccws.22.1.1314.
Full textShahid, Nida, and Ahmad Khan. "ADDRESSING CYBER VULNERABILITIES THROUGH DETERRENCE." Journal of Contemporary Studies 11, no. 1 (2022): 50–68. http://dx.doi.org/10.54690/jcs.v11i1.212.
Full textSenol, Mustafa, and Ertugrul Karacuha. "Creating and Implementing an Effective and Deterrent National Cyber Security Strategy." Journal of Engineering 2020 (June 1, 2020): 1–19. http://dx.doi.org/10.1155/2020/5267564.
Full textKeinonen, Maria. "The Concept of Comprehensive Security as a Tool for Cyber Deterrence." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 567–74. http://dx.doi.org/10.34190/eccws.22.1.1254.
Full textNye, Joseph S. "Deterrence and Dissuasion in Cyberspace." International Security 41, no. 3 (2017): 44–71. http://dx.doi.org/10.1162/isec_a_00266.
Full textNishan, Elaf Hashim. "Reflection of the challenges facing cyber deterrence on cyber attacks." International and Political Journal, no. 55 (June 1, 2023): 185–202. http://dx.doi.org/10.31272/ipj.i55.171.
Full textNOVAK, STAŠA. "NATO AND CYBER DETERRENCE." CONTEMPORARY MILITARY CHALLENGES, VOLUME 2016/ ISSUE 18/2 (June 30, 2016): 29–50. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.18.2.2.
Full textDissertations / Theses on the topic "Cyber deterrence"
Hemmer, Patrick T. "DETERRENCE AND CYBER-WEAPONS." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32836.
Full textMoore, Ryan J. "Prospects for cyber deterrence." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.
Full textJasper, Scott. "U.S. strategic cyber deterrence options." Thesis, University of Reading, 2018. http://centaur.reading.ac.uk/79976/.
Full textOdhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Full textJafarian, Jafar Haadi. "Cyber Agility for Attack Deterrence and Deception." Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10686943.
Full textDawson, Ashley. "Addressing cyber warfare : bolstering deterrence through developing norms." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45001.
Full textAkdag, Yavuz. "Cyber Deterrence against Cyberwar between the United States and China: A Power Transition Theory Perspective." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6993.
Full textEdelman, Ross David. "Cyberattacks in international relations." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:e1d71a7a-7680-4f97-b98d-a41a4b484fda.
Full textSidman, Nicholas, and 倪可思. "Warfare and Deterrence in the Cyber Realm: The Cases of the United States and Russia." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ppz9tf.
Full textBroder, Melanie. "Rhetoric over reality? Assessing the success of deterrence in cyberspace: Israeli and US cyber security approaches between 2008 and 2018." Phd thesis, 2021. http://hdl.handle.net/1885/256573.
Full textBooks on the topic "Cyber deterrence"
Tan, Eugene E. G. Cyber deterrence in Singapore: Frameworks & recommendations. S. Rajaratnam School of International Studies, 2018.
Find full textauthor, Thayer Bradley A., ed. Deterring cyber warfare: Bolstering strategic stability in cyberspace. Palgrave Macmillan, 2015.
Find full textBrantly, Aaron F. Cyber Deterrence Problem. Rowman & Littlefield Publishers, Incorporated, 2020.
Find full textBrantly, Aaron F. Cyber Deterrence Problem. Rowman & Littlefield Publishers, Incorporated, 2020.
Find full textJasper, Scott. Strategic Cyber Deterrence: The. Rowman & Littlefield Publishers, Incorporated, 2017.
Find full textKello, Lucas. Cyber Defence. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0039.
Full textDepartment of Defense. 2017 Cyber Attack Deterrence: Defense Science Board Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U. S. Nuclear Weapons, Attribution. Independently Published, 2017.
Find full textCyber Security Deterrence And It Protection For Critical Infrastructures. Springer International Publishing AG, 2013.
Find full textMartellini, Maurizio. Cyber Security: Deterrence and IT Protection for Critical Infrastructures. Springer London, Limited, 2013.
Find full textBook chapters on the topic "Cyber deterrence"
Jabbour, Kamaal T., and E. Paul Ratazzi. "Does the United States Need a New Model for Cyber Deterrence?" In Deterrence. Palgrave Macmillan US, 2012. http://dx.doi.org/10.1057/9781137289810_3.
Full textKatagiri, Nori. "Democracy and Cyber Deterrence." In How Liberal Democracies Defend Their Cyber Networks from Hackers. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54561-0_2.
Full textSoesanto, Stefan, and Max Smeets. "Cyber Deterrence: The Past, Present, and Future." In NL ARMS. T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_20.
Full textle Gloannec, Anne-Marie, and Fleur Richard-Tixier. "Cyber security, cyber-deterrence and international law." In Routledge Handbook of War, Law and Technology. Routledge, 2019. http://dx.doi.org/10.4324/9781315111759-28.
Full textTaddeo, Mariarosaria. "The Challenges of Cyber Deterrence." In The 2018 Yearbook of the Digital Ethics Lab. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17152-0_7.
Full textHaggman, Andreas. "Cyber Deterrence Theory and Practise." In Cyber Security: Power and Technology. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_5.
Full textLupovici, Amir. "Uncertainty and the study of cyber deterrence." In Cyber Security Politics. Routledge, 2022. http://dx.doi.org/10.4324/9781003110224-11.
Full textElder, Robert J., Alexander H. Levis, and Bahram Yousefi. "Alternatives to Cyber Warfare: Deterrence and Assurance." In Advances in Information Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14039-1_2.
Full textOlsen, Peter, Hossein Zare, Todd Olsen, and Mojgan Azadi. "Basic Concepts and Considerations of Cyber-Deterrence." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43020-7_80.
Full textCornish, Paul. "Deterrence and the Ethics of Cyber Conflict." In Ethics and Policies for Cyber Operations. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45300-2_1.
Full textConference papers on the topic "Cyber deterrence"
Hadipour, Nastaran, and Renita Murimi. "Medical Advisories as Deterrents in Healthcare Cybercrime." In 2024 Cyber Awareness and Research Symposium (CARS). IEEE, 2024. https://doi.org/10.1109/cars61786.2024.10778642.
Full textBrantly, Aaron F. "The cyber deterrence problem." In 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018. http://dx.doi.org/10.23919/cycon.2018.8405009.
Full text"Cyber Deterrence and Russia’s Active Cyber Defense." In The 19th European Conference on Cyber Warfare. ACPI, 2020. http://dx.doi.org/10.34190/ews.20.038.
Full textLibicki, Martin C. "Obnoxious Deterrence." In 2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon). IEEE, 2022. http://dx.doi.org/10.23919/cycon55549.2022.9811024.
Full textAtkinson, Simon Reay, David Walker, Kevin Beaulne, and Liaquat Hossain. "Cyber -- Transparencies, Assurance and Deterrence." In 2012 International Conference on Cyber Security (CyberSecurity). IEEE, 2012. http://dx.doi.org/10.1109/cybersecurity.2012.22.
Full textSoper, Braden C. "A Cyber-Nuclear Deterrence Game." In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919910.
Full textReddie, Andrew. "Tracing House: Wargaming Cyber Deterrence." In Proposed for presentation at the 89th MORS Symposium held June 21-25, 2021. US DOE, 2021. http://dx.doi.org/10.2172/1871419.
Full textKelvin, Gabriel, Bethany Goldblum, Kiran Lakkaraju, and Joshua Letchford. "Contextualizing and Measuring Cyber Deterrence." In Proposed for presentation at the NSSC's Kick-Off and Advisory Board Meeting held April 19-20, 2022 in , . US DOE, 2022. http://dx.doi.org/10.2172/2002955.
Full textWanic, Elizabeth, and Neil Rowe. "Assessing Deterrence Optinos for Cyber Weapons." In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00011.
Full textChen, Jim Q. "Take the rein of cyber deterrence." In 2017 International Conference on Cyber-Conflict (CyCon U.S.). IEEE, 2017. http://dx.doi.org/10.1109/cyconus.2017.8167510.
Full textReports on the topic "Cyber deterrence"
Goychayev, Rustam, Geoffrey A. Carr, Rachel A. Weise, et al. Cyber Deterrence and Stability. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1405058.
Full textSimcox, Frank W. Flexible Options for Cyber Deterrence. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada539892.
Full textHammer, Ann, Trisha Miller, and Eva Uribe. Cyber Resilience as a Deterrence Strategy. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1668133.
Full textDetlefsen, William R. Cyber Attacks, Attribution, and Deterrence: Three Case Studies. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1001276.
Full textRehn, Steven D. Don't Touch My Bits or Else! -- Cyber Deterrence. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada560247.
Full textJackson, Marian, Heather Blackwell, and Jennifer McCann. ANALYTIC FRAMEWORK FOR UNITED STATES CYBER DETERRENCE STRATEGY. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1762023.
Full textUribe, Eva C., Benjamin J. Bonin, Michael F. Minner, et al. Why does cyber deterrence fail and when might it succeed? A framework for cyber scenario analysis. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1623326.
Full textRaju, Nivedita, and Tytti Erästö. The Role of Space Systems in Nuclear Deterrence. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/nwlc4997.
Full textHoang, Harold T. Cyber: A Flexible Deterrent Option. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ad1018825.
Full text