PrEP: A Framework for Malware & Cyber Weapons T Herr The Journal of Information Warfare 13 (1), 87-106, 2014 | 67 | 2014 |
Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’ S Shackelford, B Schneier, M Sulmeyer, AE Boustead, B Buchanan, ... | 57* | 2016 |
Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model T Herr, P Rosenzweig Journal of National Security Law and Policy 8 (2), 2015 | 49 | 2015 |
Taking stock: Estimating vulnerability rediscovery T Herr, B Schneier, C Morris Belfer Cyber Security Project White Paper Series, 2017 | 24 | 2017 |
Breaking trust–shades of crisis across an insecure software supply chain T Herr | 23 | 2021 |
Malware Counter-Proliferation and the Wassenaar Arrangement T Herr Proceedings of the 8th International Conference on Cyber Conflict: Cyber Power, 2016 | 22 | 2016 |
Cyber insurance and private governance: The enforcement power of markets T Herr Regulation & Governance 15 (1), 98-114, 2021 | 21 | 2021 |
Countering cyber proliferation: Zeroing in on Access-as-a-Service W DeSombre, J Shires, JD Work, R Morgus, PH O’NEILL, L Allodi, T Herr Atlantic Council., 2022 | 13 | 2022 |
A primer on the proliferation of offensive cyber capabilities W DeSombre, M Campobasso, L Allodi, J Shires, JD Work, R Morgus, ... In-Depth Research & Reports: Issue Brief, 2021 | 13 | 2021 |
Bugs in the system A Wilson, R Schulman, K Bankston, T Herr Washington DC: New America, 2016 | 13 | 2016 |
Milware: Identification and Implications of State Authored Malicious Software T Herr, E Armbrust NSPW15 Proceedings of the 2015 New Security Paradigms Workshop, 29-43, 2015 | 13 | 2015 |
Analyzing the ethical implications of research using leaked data AE Boustead, T Herr PS: Political Science & Politics 53 (3), 505-509, 2020 | 12 | 2020 |
Four myths about the cloud: The geopolitics of cloud computing T Herr Atlantic Council, 2020 | 12 | 2020 |
Countering the proliferation of offensive cyber capabilities R Morgus, M Smeets, T Herr The Global Commission on the Stability of Cyberspace, 2017 | 9 | 2017 |
Cyber Insecurity: Navigating the Perils of the Next Information Age R Harrison, T Herr Rowman & Littlefield, 2016 | 8* | 2016 |
Broken Trust: Lessons from Sunburst T Herr JSTOR Security Studies Collection, 2021 | 7 | 2021 |
Russia’s hacking success shows how vulnerable the cloud is B Schneier, T Herr Foreign Policy, 2021 | 6 | 2021 |
Combating complexity: Offensive cyber capabilities and integrated warfighting D Herrick, T Herr Available at SSRN 2845709, 2016 | 6 | 2016 |
Countering the Proliferation of Malware: Targeting the Vulnerability Lifecycle T Herr Belfer Cyber Security Project White Paper Series, 2017 | 5 | 2017 |
Military cyber operations: A primer T Herr, D Herrick American Foreign Policy Council Defense Technology Program Brief, 2016 | 5 | 2016 |