A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Paper | Author | Link | Grade | DA Comments | Review Links | ADD YOURSELF HERE | ||||||||||||||||||||
5 | Rapid capabilities generation and prompt effects in offensive cyber operations | JD Work | Technology and The Cyber Domain: Implications for Intelligence. International Studies Association Annual Conference. Las Vegas. April 2021. | A | Explains the ops against bot networks from USCC | ||||||||||||||||||||||
6 | Successful counter-cyber operations secure US election | JD Work | Janes Intelligence Review | March 2021 | A | Points out a subtle area of PE in terms of judging success and failure... | ||||||||||||||||||||||
7 | Early intelligence assessments of COMBLOC computing | JD Work | JD Work (2021) Early intelligence assessments of COMBLOC computing, Journal of Intelligence History, DOI: 10.1080/16161262.2021.1884791 | A | Very much worth a read. Not just about the past. | ||||||||||||||||||||||
13 | Troubled vision: Understanding recent Israeli–Iranian offensive cyber exchanges | JD Work, Richard Harknett | https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/troubled-vision-understanding-israeli-iranian-offensive-cyber-exchanges/ | A | Best starter paper on PE | ||||||||||||||||||||||
15 | Public attribution of cyber intrusions | Florian J Egloff | doi: 10.1093/cybsec/tyaa012 | A | |||||||||||||||||||||||
17 | Who Hath Measured the (Proving) Ground: Variation in Offensive Capabilities Test and Evaluation | JD Work | https://osf.io/preprints/socarxiv/p92tn/ | A | There was some stuff in here I didn't know about how history played out (i.e. this is a paper where public facts get reinterpreted in a way that surprises you). | ||||||||||||||||||||||
19 | Offensive Cyber Operations and Future Littoral Operating Concepts | JD Work | https://digitalcommons.usf.edu/mca/vol5/iss1/3/ | A | I need to do a second big readthrough but the argument is this: Lots of 0day exists in the systems people rely on for military operations. Finding and using this 0day is possible over long time periods. This can produce important military effects on the battlefield. When you don't see effects happening , it can be mean several things - one of which is that you didn't prepare properly and one is that you didn't see it. (Came out the day that USUKEU announced the russian attack on VIASAT) | ||||||||||||||||||||||
39 | Daniel Moore | https://ccdcoe.org/uploads/2018/10/Art-05-Targeting-Technology.-Mapping-Military-Offensive-Network-Operations.pdf | B | This is a taxonomy, mostly, which is a good overview but does not push too far into the wacky corners. I feel like it sets the ground for a future paper (which is probably already written and sitting in an email queue somewhere). | |||||||||||||||||||||||
42 | In Defense of Pure Sovereignty in Cyberspace | Kevin Jon Heller | https://digital-commons.usnwc.edu/ils/vol97/iss1/50/ | B | Lots of weird logical flaws. I need to do a whole video on it (DONE). He write a big twitter thread response here: https://twitter.com/kevinjonheller/status/1455938399400079362?s=20 | https://www.youtube.com/watch?v=uzqKRk87dTI&t=1255s&ab_channel=DaveAitel | |||||||||||||||||||||
49 | Cyber Arms Transfer: Meaning, Limits and Implications | Max Smeets | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3913529 | U | |||||||||||||||||||||||
50 | |||||||||||||||||||||||||||
51 | |||||||||||||||||||||||||||
52 | |||||||||||||||||||||||||||
53 | MAX SMEETS SECTION | https://twitter.com/Maxwsmeets/status/1434813510895210497?s=20 | https://twitter.com/Maxwsmeets/status/1434816398585475072?s=20 | ||||||||||||||||||||||||
54 | "What's in a Name? Metaphors and Cybersecurity" 2021 - On the cyber domain as a foundational metaphor. | @Prof_J_Branch | https://www.cambridge.org/core/journals/international-organization/article/abs/whats-in-a-name-metaphors-and-cybersecurity/563998100A2FAF1E5DFDB5C52EC68569 | ||||||||||||||||||||||||
55 | "The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces" 2021 - on complex and transformative dynamics of ICT and new actors - | @TobiasLiebetrau & Christensen | https://www.cambridge.org/core/journals/european-journal-of-international-security/article/abs/ontological-politics-of-cyber-security-emerging-agencies-actors-sites-and-spaces/C716686BE6E4D753D80414F7824A0BAD | ||||||||||||||||||||||||
56 | "Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence," 2021 - on desirability of private sector contribution to cyber deterrence | Lilli | https://www.tandfonline.com/doi/full/10.1080/13523260.2021.1882812 | ||||||||||||||||||||||||
57 | "Cyber offense in NATO: Challenges and opportunities", 2021 On NATO's role in the cyber domain and ways to adapt. | @jeppeteglskov | https://academic.oup.com/ia/article-abstract/97/3/703/6205395?redirectedFrom=fulltext | ||||||||||||||||||||||||
58 | "Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy" 2021, on international diplomacy on cyber terrorism based on UN dynamics | @DennisBroeders @cristiano_fab | https://www.tandfonline.com/doi/full/10.1080/1057610X.2021.1928887 | ||||||||||||||||||||||||
59 | "State-industry relations and cybersecurity governance in Europe" 2021, focuses on role private sector companies in Europe (UK & FR focus) | Calcara & Marchetti | https://www.tandfonline.com/doi/abs/10.1080/09692290.2021.1913438?journalCode=rrip20 | ||||||||||||||||||||||||
60 | "Publicly attributing cyber attacks: a framework", 2021, Provides (policy) framework for state-level public attribution, | @egflo @Maxwsmeets | https://www.tandfonline.com/doi/full/10.1080/01402390.2021.1895117 | ||||||||||||||||||||||||
61 | "The Case for Cyber ‘Disarmament’ in the European Union" 2021, On the importance of arms control treaties (for the EU). | Benincasa | https://www.tandfonline.com/doi/abs/10.1080/03932729.2021.1872200?journalCode=rspe20 | ||||||||||||||||||||||||
62 | "International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks" 2021, relationship between cyber ops and trade. | @william_akoto | https://journals.sagepub.com/doi/abs/10.1177/0022343320964549?journalCode=jpra | ||||||||||||||||||||||||
63 | "A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel" 2021, | Schandler, Gross and Canetti | https://www.tandfonline.com/doi/abs/10.1080/13523260.2020.1868836?journalCode=fcsp20 | ||||||||||||||||||||||||
64 | "Hyper-Securitization, Everyday Security Practice and Technification: Cyber-Security Logics in Switzerland," 2021, case study of Swiss cyber security 'construction' | @CyberMyri @egflo | https://onlinelibrary.wiley.com/doi/abs/10.1111/spsr.12433 | ||||||||||||||||||||||||
65 | "Contested public attributions of cyber incidents and the role of academia" , 2020, On role academia in relation to (public) attribution through 3 cases - Sony Pictures, DNC & NotPetya | @egflo | https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1677324 | ||||||||||||||||||||||||
66 | "Against sovereignty in cyberspace," `2020, on distinct characteristics of cyberspace, its relationship with to territoriality and sovereignty. | @miltonmueller | https://academic.oup.com/isr/article-abstract/22/4/779/5572338?redirectedFrom=PDF | ||||||||||||||||||||||||
67 | "US cyber deterrence: Practice guiding theory," 2020, Implementation of US deterrence, | Wilner | https://www.tandfonline.com/doi/abs/10.1080/01402390.2018.1563779?journalCode=fjss20 | ||||||||||||||||||||||||
68 | "Cyber security meets security politics: Complex technology, fragmented politics, and networked science" 2021, On the study of cyber security politics (and its future) | @CyberMyri & Wenger | https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1678855 | ||||||||||||||||||||||||
69 | "Cyber campaigns and strategic outcomes," 2020, on cyber campaigns below the threshold of armed attack, | @harknett_uc @Maxwsmeets | https://www.tandfonline.com/doi/full/10.1080/01402390.2020.1732354 | ||||||||||||||||||||||||
70 | The unexpected norm-setters: Intelligence agencies in cyberspace, 2020, On the intelligence agencies' role as norm setters in the cyber domain | @Ilina_Gva | https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1677389 | ||||||||||||||||||||||||
71 | "Beyond Naming and Shaming: Accusations and International Law in Cybersecurity", 2020, On how accusations offer actors a range of strategic options | @DuncanHollis & Finnemore, | https://academic.oup.com/ejil/article/31/3/969/5904502 | ||||||||||||||||||||||||
72 | "At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes" 2020, on how elections increase the number of DoS attacks in authoritarian countries | @philutsc | https://journals.sagepub.com/doi/full/10.1177/0022002719861676 | ||||||||||||||||||||||||
73 | "Demystifying the Quantum Threat: Infrastructure, Institutions, and Intelligence Advantage," 2020, On the promise of quantum computing, | @jonrlindsay | https://www.tandfonline.com/doi/abs/10.1080/09636412.2020.1722853?journalCode=fsst20 | ||||||||||||||||||||||||
74 | "Cyber Terrorism and Public Support for Retaliation - A Multi-Country Survey Experiment," 2020, On whether exposure to cyber terrorism prompt calls for retaliatory military strikes | Schandler, Gross, Blackhouse, Canentti | https://www.cambridge.org/core/journals/british-journal-of-political-science/article/cyber-terrorism-and-public-support-for-retaliation-a-multicountry-survey-experiment/179C0560441076100DB4A4E5BBCB992F | ||||||||||||||||||||||||
75 | "Bipolar Rivalry in the Early Digital Age," 2020, on the future of US -China rivalry, including the role of cyber ops | Yan | https://academic.oup.com/cjip/article/13/3/313/5854839 | ||||||||||||||||||||||||
76 | "Lacan in the US cyber defence: Between public discourse and transgressive practice," 2020, on the constitutive role of transgressive practices for security communities | @jeppeteglskov | https://www.cambridge.org/core/journals/review-of-international-studies/article/abs/lacan-in-the-us-cyber-defence-between-public-discourse-and-transgressive-practice/38646AE140D77651862DCD1683BFBF35 | ||||||||||||||||||||||||
77 | "Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online” 2020, On escalation as second-order effect (through US 2016 case study) | Whyte | https://www.cambridge.org/core/journals/european-journal-of-international-security/article/abs/beyond-titfortat-in-cyberspace-political-warfare-and-lateral-sources-of-escalation-online/AAA1261224FBFB43826B42ADF5BCC4B8 | ||||||||||||||||||||||||
78 | “Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True,” 2020, review last 15 years in cyberterrorism research, | Giacomello | https://www.tandfonline.com/doi/abs/10.1080/1057610X.2020.1822591?journalCode=uter20 | ||||||||||||||||||||||||
79 | “Cyber-noir: Cybersecurity and popular culture, 2020, on the incorporation of noir elements in cybersecurity expert discourses, | @jamessshires | https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1670006 | ||||||||||||||||||||||||
80 | “Power and diplomacy in the post-liberal cyberspace.” 2020, On the geopolitics of cyberspace, 2020, | Barrinha and Renard | https://academic.oup.com/ia/article/96/3/749/5722299 | ||||||||||||||||||||||||
81 | "50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers," 2020, on the identities, practices, and behaviors of hackers | @leotanczt | https://www.tandfonline.com/doi/abs/10.1080/13523260.2019.1669336?journalCode=fcsp20 | ||||||||||||||||||||||||
82 | |||||||||||||||||||||||||||
83 | |||||||||||||||||||||||||||
84 | |||||||||||||||||||||||||||
85 | |||||||||||||||||||||||||||
86 | |||||||||||||||||||||||||||
87 | |||||||||||||||||||||||||||
88 | |||||||||||||||||||||||||||
89 | |||||||||||||||||||||||||||
90 | |||||||||||||||||||||||||||
91 | |||||||||||||||||||||||||||
92 | |||||||||||||||||||||||||||
93 | |||||||||||||||||||||||||||
94 | |||||||||||||||||||||||||||
95 | |||||||||||||||||||||||||||
96 | |||||||||||||||||||||||||||
97 | |||||||||||||||||||||||||||
98 | |||||||||||||||||||||||||||
99 | |||||||||||||||||||||||||||
100 | |||||||||||||||||||||||||||
101 | |||||||||||||||||||||||||||
102 | |||||||||||||||||||||||||||
103 | |||||||||||||||||||||||||||
104 | |||||||||||||||||||||||||||
105 | |||||||||||||||||||||||||||
106 | |||||||||||||||||||||||||||
107 | |||||||||||||||||||||||||||
108 | |||||||||||||||||||||||||||
109 | |||||||||||||||||||||||||||
110 | |||||||||||||||||||||||||||
111 | |||||||||||||||||||||||||||
112 | |||||||||||||||||||||||||||
113 | |||||||||||||||||||||||||||
114 | |||||||||||||||||||||||||||
115 | |||||||||||||||||||||||||||
116 | |||||||||||||||||||||||||||
117 | |||||||||||||||||||||||||||
118 | |||||||||||||||||||||||||||
119 | |||||||||||||||||||||||||||
120 | |||||||||||||||||||||||||||
121 | |||||||||||||||||||||||||||
122 | |||||||||||||||||||||||||||
123 | |||||||||||||||||||||||||||
124 | |||||||||||||||||||||||||||
125 | |||||||||||||||||||||||||||
126 | |||||||||||||||||||||||||||
127 | |||||||||||||||||||||||||||
128 | |||||||||||||||||||||||||||
129 | |||||||||||||||||||||||||||
130 | |||||||||||||||||||||||||||
131 | |||||||||||||||||||||||||||
132 | |||||||||||||||||||||||||||
133 | |||||||||||||||||||||||||||
134 | |||||||||||||||||||||||||||
135 | |||||||||||||||||||||||||||
136 | |||||||||||||||||||||||||||
137 | |||||||||||||||||||||||||||
138 |