Publicly attributing cyber attacks: a framework

FJ Egloff, M Smeets - Journal of Strategic Studies, 2023 - Taylor & Francis
When should states publicly attribute cyber intrusions? Whilst this is a question governments
increasingly grapple with, academia has hardly helped in providing answers. This article …

50 years of Operations Research in Defense–a European Perspective

K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …

[图书][B] Understanding terrorism and political violence: The life cycle of birth, growth, transformation, and demise

DK Gupta - 2020 - taylorfrancis.com
This book provides a multidisciplinary approach to understanding human behavior and uses
it to analyze the forces shaping the life cycle of violent political movements. This new edition …

When smart systems fail: The ethics of cyber–physical critical infrastructure risk

C Grady, S Rajtmajer, L Dennis - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Critical infrastructure (CI) remains an important part of daily life in support of providing basic
goods and services. Cyber-physical connections between CI systems and sectors continue …

Foreign influence and domestic policy

TS Aidt, F Albornoz, E Hauk - Journal of Economic Literature, 2021 - aeaweb.org
In an interconnected world, economic and political interests inevitably reach beyond
national borders. Since policy choices generate external economic and political costs …

How the process of discovering cyberattacks biases our understanding of cybersecurity

H Oppenheimer - Journal of Peace Research, 2024 - journals.sagepub.com
Social scientists do not directly study cyberattacks; they draw inferences from attack reports
that are public and visible. Like human rights violations or war casualties, there are missing …

The shadow of deterrence: Why capable actors engage in contests short of war

JA Gannon, E Gartzke, JR Lindsay… - Journal of Conflict …, 2024 - journals.sagepub.com
Defense policy makers have become increasingly concerned about conflict in the “gray
zone” between peace and war. Such conflicts are often interpreted as cases of deterrence …

[PDF][PDF] Fifty Years of Operations Research in Defense

K Hausken - Eur. J. Oper. Res, 2024 - researchgate.net
ABSTRACT The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …

Engaging with emerged and emerging domains: cyber, space, and technology in the 2022 NATO strategic concept

R Gottemoeller, K Hedgecock, J Magula… - Defence Studies, 2022 - Taylor & Francis
Cyber, space, and emerging technologies have transformed the strategic environment.
Since the last publication of the NATO Strategic Concept, the Alliance has responded to this …

Cyber deterrence with imperfect attribution and unverifiable signaling

J Welburn, J Grana, K Schwindt - European Journal of Operational …, 2023 - Elsevier
Motivated by the asymmetric information inherent to cyberwarfare, we examine a game of
deterrence between an attacker and a defender in which the defender can signal its …