Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Fighting power, targeting and cyber operations
- P. Ducheine, J. V. Haaster
- Engineering, Computer Science
- 6th International Conference On Cyber Conflict…
- 2014
TLDR
Fighting Power, Targeting and Cyber Operations
- P. Ducheine, J. V. Haaster
- Business
- 7 February 2014
TLDR
Assessing cyber power
- J. V. Haaster
- Computer Science
- CyCon
- 1 May 2016
TLDR
On cyber : The utility of military cyber operations during armed conflict
- J. V. Haaster
- Business
- 2019
Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons.… Expand
- 3
- PDF
Chapter 4 – Appendices
- R. Gevers, M. Sprengers, J. V. Haaster
- Engineering
- 2016
This chapter discusses illustrative hacker groups and draws lessons from their activities. The following groups are illustrative to anybody waging cyber guerilla: early Anonymous, LulzSec, Chaos… Expand
Organization of #operations
- M. Sprengers, J. V. Haaster
- Engineering
- 2016
This chapter will focus on the actual conduct of operations, the focal point being the tactics, techniques, and procedures (TTPs) used by hacker groups when waging cyber guerilla. Before engaging in… Expand
General principles of cyber guerilla
- Jelle van Haaster
- Engineering
- 2016
This chapter covers the conceptual foundations of cyber guerilla. The essence of cyber guerilla is defined as an amorphous concept epitomizing the violent or nonviolent struggle against a larger… Expand
Some Legal and Operational Considerations regarding Remote Warfare: Drones and Cyber Warfare Revisited
- T. Gill, J. V. Haaster, M. Roorda
- Political Science
- 27 October 2017
Remote warfare has evolved from the use of strategic airpower to attack an enemy’s economic infrastructure in World War II and the role of intercontinental ballistic missile systems in promoting… Expand
The Impact of Hybrid Warfare on Traditional Operational Rationale
- M. Roorda, J. V. Haaster
- Engineering
- 2016
In this article the authors will describe how certain non-traditional means and methods could be used to undermine a military’s capacity to respond effectively to an emerging threat. They will do so… Expand
- 5
- PDF
Manoeuvring and Generating Effects in the Information Environment
- P. Ducheine, J. V. Haaster, Richard van Harskamp
- Engineering
- 2 June 2017
This chapter aims to offer a framework for States in general and armed forces in particular for generating effects in or through the information environment by answering the question: “How to… Expand