Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,793 papers from all fields of science
Search
Sign In
Create Free Account
Cyberwarfare
Known as:
Electronic army
, Cyber security attack
, Cyber war
Expand
Cyberwarfare has been defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
48 relations
API testing
Computer virus
Countermeasure (computer)
Cyber spying
Expand
Broader (4)
Computer security
Information sensitivity
Security engineering
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Tallinn manual on the international law applicable to cyber warfare
S. Watts
2013
Corpus ID: 115408348
Highly Cited
2013
Highly Cited
2013
Stuxnet and the Limits of Cyber Warfare
J. Lindsay
2013
Corpus ID: 154019562
Stuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first instance of a computer network attack…
Expand
Highly Cited
2013
Highly Cited
2013
The Myth of Cyberwar
E. Gartzke
,
S. Aaronson
,
+9 authors
Roff
2013
Corpus ID: 53480501
ditry, and ofacial pronouncements raise the specter of war on the internet. Future conoicts may well take place in cyberspace…
Expand
2013
2013
SCADA communication protocols: vulnerabilities, attacks and possible mitigations
Durga Samanth
,
Pidikiti bullet
,
Rajesh Kalluri
,
bullet R K Senthil Kumar
,
bullet B S Bindhumadhava
CSI Transactions on ICT
2013
Corpus ID: 10576704
Current hierarchical SCADA systems uses communication protocols which aren’t having the inbuilt security mechanism. This lack of…
Expand
2012
2012
The militarisation of cyberspace: Why less may be better
Myriam Dunn Cavelty
International Conference on Cyber Conflict
2012
Corpus ID: 12366701
Cyber security is seen as one of the most pressing national security issues of our time. Due to sophisticated and highly…
Expand
Highly Cited
2011
Highly Cited
2011
'Unwilling or Unable': Toward an Normative Framework for Extra-Territorial Self-Defense
Ashley S. Deeks
2011
Corpus ID: 145370906
Non-state actors, including terrorist groups, regularly launch attacks against states, often from external bases. When a victim…
Expand
Highly Cited
2011
Highly Cited
2011
China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence
Magnus Hjortdal
2011
Corpus ID: 145083379
This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a…
Expand
Highly Cited
2010
Highly Cited
2010
The challenge of cyber attack deterrence
Kenneth Geers
Computer Law and Security Review
2010
Corpus ID: 58503187
Highly Cited
2009
Highly Cited
2009
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr
2009
Corpus ID: 2415080
What people are saying about Inside Cyber Warfare "The necessary handbook for the 21st century." --Lewis Shepherd, Chief Tech…
Expand
Highly Cited
2006
Highly Cited
2006
Income, interdependence, and substitution effects affecting incentives for security investment
K. Hausken
2006
Corpus ID: 51840789
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE