The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cyberwarfare with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2015 (19) 2016-2022 (12)
Publication types (Num. hits)
article(16) book(1) incollection(2) inproceedings(12)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 31 publication records. Showing 31 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36James Mulvenon Toward a Cyberconflict Studies Research Agenda. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cyberwar, cyberwarfare, cyberconflict
28Dimitrios Serpanos, Theodoros Komninos The Cyberwarfare in Ukraine. Search on Bibsonomy Computer The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Darshan Harsora, Khushalkumar Khoyani A systematic literature review of cyberwarfare and state-sponsored hacking teams. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Kristan Stoddart Cyberwarfare - Threats to Critical Infrastructure, 5 Search on Bibsonomy 2022   DOI  RDF
28Diop Ausar Harris Cyberwarfare Readiness in the Maritime Environment. Search on Bibsonomy ICEIS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28George Markowsky, Linda Markowsky Lanchester's Equations and Cyberwarfare. Search on Bibsonomy IDAACS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Ralph Peter Martins Punching Above Their Digital Weight: Why Iran is Developing Cyberwarfare Capabilities Far Beyond Expectations. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Virgílio A. F. Almeida, Danilo Doneda, Jacqueline de Souza Abreu Cyberwarfare and Digital Governance. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jovonni L. Pharr Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
28Brian Hay, Steven LaFountain Introduction to CyberWarfare: Offensive and Defensive Software Technologies Minitrack. Search on Bibsonomy HICSS The full citation details ... 2017 DBLP  BibTeX  RDF
28Ronald Loui, Will Hope Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure. Search on Bibsonomy DASC/PiCom/DataCom/CyberSciTech The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Brian Hay, Steven LaFountain Introduction to the CyberWarfare: Offensive and Defensive Software Technologies Minitrack. Search on Bibsonomy HICSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Daniel Hughes 0002, Andrew M. Colarik Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework. Search on Bibsonomy PAISI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Albert Olagbemiro Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Suchitra Abel Uncertainty Modeling: The Computational Economists' View on Cyberwarfare. Search on Bibsonomy Intelligent Methods for Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Ehab Al-Shaer, Mohammad Ashiqur Rahman Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. Search on Bibsonomy Cyber Warfare The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Brian Hay, Steven LaFountain Introduction to CyberWarfare: Offensive and Defensive Software Technologies Minitrack. Search on Bibsonomy HICSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Hannes Federrath, Götz Neuneck Workshop "Cyberwarfare". Search on Bibsonomy GI-Jahrestagung The full citation details ... 2015 DBLP  BibTeX  RDF
28Nir Kshetri Cyberwarfare: Western and Chinese Allegations. Search on Bibsonomy IT Prof. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Karla Steele Case study: Developing an intranet Web site for information security: The evolution of a corporate intranet Web site in the age of cyberwarfare. Search on Bibsonomy IPCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Maurizio Aiello, Gianluca Papaleo, Enrico Cambiaso SlowReq: A Weapon for Cyberwarfare Operations. Characteristics, Limits, Performance, Remediations. Search on Bibsonomy SOCO-CISIS-ICEUTE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Won Kim 0001 On cyberwarfare. Search on Bibsonomy Int. J. Web Grid Serv. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Raymond C. Parks, David P. Duggan Principles of Cyberwarfare. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Scott D. Applegate Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Ralph Langner Stuxnet: Dissecting a Cyberwarfare Weapon. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Thomas A. Berson, Dorothy E. Denning Cyberwarfare. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Sanjay Goel Cyberwarfare: connecting the dots in cyber intelligence. Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28 Cyberwarfare challenge. Search on Bibsonomy Nat. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Hyung-Jun Seo, Yoon-Cheol Choy Criteria for Comparing Cyberwarfare Capability. Search on Bibsonomy ICITCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28John Laprise Cyberwarfare seen through a mariner's spyglass. Search on Bibsonomy ISTAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Fred Cohen, Cynthia A. Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler A cause and effect model of attacks on information systems : Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID. Search on Bibsonomy Comput. Secur. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #31 of 31 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license