Borders in Cyberspace: Can Sovereignty adapt to the challenges of Cyber Security? C Czosseck, K Geers The Virtual Battlefield: Perspectives on Cyber Warfare 3, 88, 2009 | 56 | 2009 |
The Cyber Threat to National Security: Why Can’t We Agree? F Hare Conference on cyber conflict proceedings 15, 2010 | 51 | 2010 |
The signifi cance of attribution to cyberspace coercion: A political perspective F Hare 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-15, 2012 | 38 | 2012 |
Private sector contributions to national cyber security: A preliminary analysis FB Hare Journal of Homeland Security and Emergency Management 6 (1), 2009 | 34 | 2009 |
The interdependent security problem in the defense industrial base: an agent-based model on a social network F Hare, J Goldstein International Journal of Critical Infrastructure Protection 3 (3), 128-139, 2010 | 17 | 2010 |
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures J Rivera, F Hare 2014 6th International Conference On Cyber Conflict (CyCon 2014), 99-116, 2014 | 16 | 2014 |
Privateering in Cyberspace: Should Patriotic Hacking Be Promoted as National Policy? FB Hare Asian Security, 1-10, 2017 | 15 | 2017 |
The interdependent nature of national cyber security: Motivating private action for a public good F Hare | 15 | 2011 |
Precision cyber weapon systems: An important component of a responsible national security strategy? FB Hare Contemporary Security Policy, 1-21, 2018 | 11 | 2018 |
Noisy Operations on the Silent Battlefield F Hare, W Diehl The Cyber Defense Review 5 (1), 153-168, 2020 | 5 | 2020 |
Five Myths Of Cyberspace And Cyberpower F Hare Signal-Fairfax 61 (10), 89-92, 2007 | 5 | 2007 |
Achieving Security in the Internet of Things through Expansion of the Partnership Model W Diehl, F Hare 2018 IEEE International Symposium on Technology and Society (ISTAS), 88-94, 2018 | 2 | 2018 |