关注
Forrest Hare
Forrest Hare
Adjunct Professor, George Mason University
在 gmu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Borders in Cyberspace: Can Sovereignty adapt to the challenges of Cyber Security?
C Czosseck, K Geers
The Virtual Battlefield: Perspectives on Cyber Warfare 3, 88, 2009
562009
The Cyber Threat to National Security: Why Can’t We Agree?
F Hare
Conference on cyber conflict proceedings 15, 2010
512010
The signifi cance of attribution to cyberspace coercion: A political perspective
F Hare
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-15, 2012
382012
Private sector contributions to national cyber security: A preliminary analysis
FB Hare
Journal of Homeland Security and Emergency Management 6 (1), 2009
342009
The interdependent security problem in the defense industrial base: an agent-based model on a social network
F Hare, J Goldstein
International Journal of Critical Infrastructure Protection 3 (3), 128-139, 2010
172010
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures
J Rivera, F Hare
2014 6th International Conference On Cyber Conflict (CyCon 2014), 99-116, 2014
162014
Privateering in Cyberspace: Should Patriotic Hacking Be Promoted as National Policy?
FB Hare
Asian Security, 1-10, 2017
152017
The interdependent nature of national cyber security: Motivating private action for a public good
F Hare
152011
Precision cyber weapon systems: An important component of a responsible national security strategy?
FB Hare
Contemporary Security Policy, 1-21, 2018
112018
Noisy Operations on the Silent Battlefield
F Hare, W Diehl
The Cyber Defense Review 5 (1), 153-168, 2020
52020
Five Myths Of Cyberspace And Cyberpower
F Hare
Signal-Fairfax 61 (10), 89-92, 2007
52007
Achieving Security in the Internet of Things through Expansion of the Partnership Model
W Diehl, F Hare
2018 IEEE International Symposium on Technology and Society (ISTAS), 88-94, 2018
22018
系统目前无法执行此操作,请稍后再试。
文章 1–12