Publicly attributing cyber attacks: a framework
When should states publicly attribute cyber intrusions? Whilst this is a question governments
increasingly grapple with, academia has hardly helped in providing answers. This article …
increasingly grapple with, academia has hardly helped in providing answers. This article …
50 years of Operations Research in Defense–a European Perspective
K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …
methodologies are outlined, eg decision theory, game theory, mergers of differential …
[图书][B] Understanding terrorism and political violence: The life cycle of birth, growth, transformation, and demise
DK Gupta - 2020 - taylorfrancis.com
This book provides a multidisciplinary approach to understanding human behavior and uses
it to analyze the forces shaping the life cycle of violent political movements. This new edition …
it to analyze the forces shaping the life cycle of violent political movements. This new edition …
When smart systems fail: The ethics of cyber–physical critical infrastructure risk
Critical infrastructure (CI) remains an important part of daily life in support of providing basic
goods and services. Cyber-physical connections between CI systems and sectors continue …
goods and services. Cyber-physical connections between CI systems and sectors continue …
Foreign influence and domestic policy
In an interconnected world, economic and political interests inevitably reach beyond
national borders. Since policy choices generate external economic and political costs …
national borders. Since policy choices generate external economic and political costs …
How the process of discovering cyberattacks biases our understanding of cybersecurity
H Oppenheimer - Journal of Peace Research, 2024 - journals.sagepub.com
Social scientists do not directly study cyberattacks; they draw inferences from attack reports
that are public and visible. Like human rights violations or war casualties, there are missing …
that are public and visible. Like human rights violations or war casualties, there are missing …
The shadow of deterrence: Why capable actors engage in contests short of war
Defense policy makers have become increasingly concerned about conflict in the “gray
zone” between peace and war. Such conflicts are often interpreted as cases of deterrence …
zone” between peace and war. Such conflicts are often interpreted as cases of deterrence …
[PDF][PDF] Fifty Years of Operations Research in Defense
K Hausken - Eur. J. Oper. Res, 2024 - researchgate.net
ABSTRACT The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …
methodologies are outlined, eg decision theory, game theory, mergers of differential …
Engaging with emerged and emerging domains: cyber, space, and technology in the 2022 NATO strategic concept
R Gottemoeller, K Hedgecock, J Magula… - Defence Studies, 2022 - Taylor & Francis
Cyber, space, and emerging technologies have transformed the strategic environment.
Since the last publication of the NATO Strategic Concept, the Alliance has responded to this …
Since the last publication of the NATO Strategic Concept, the Alliance has responded to this …
Cyber deterrence with imperfect attribution and unverifiable signaling
Motivated by the asymmetric information inherent to cyberwarfare, we examine a game of
deterrence between an attacker and a defender in which the defender can signal its …
deterrence between an attacker and a defender in which the defender can signal its …