Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Maurice Dawson
Associate Professor, Illinois Institute of Technology
Verified email at iit.edu
Cited by 1382
Cyber Terrorism
Cyber Warfare
Cyber Strategy
Software Assurance
Cyber Operations
Gary D. Brown
Associate Professor of Practice
Verified email at tamu.edu
Cited by 424
cyber law
cyber policy
cyber strategy
law of armed conflict
Valentin Weber
German Council on Foreign Relations
Verified email at dgap.org
Cited by 172
cybersecurity
cyber diplomacy
cyber strategy
internet censorship
grand strategy
Noelle van der Waag-Cowling
SIGLA, Stellenbosch University
Verified email at ma2.sun.ac.za
Cited by 77
Cyber Strategy
Cyber warfare
Emerging technologies
research management
defence
S. Raschid Muller, Ph.D.
Capitol Technology University
Verified email at captechu.edu
Cited by 68
Cybersecurity
Supply Chain Technology
Information Technology
Cyber Strategy
Cybersecurity
Hammaad Salik
University of Maryland Baltimore County
Verified email at umbc.edu
Cited by 6
Cyber Persistence
Cyber Deterrence
Offensive Cyber Operations
Cyber Warfare
Cyber Strategy
Privacy
Terms
Help
About Scholar
Search help