|
Network Interventions |
Technical Solutions |
Industry |
2013 |
|
Cyber Operations and the Jus in Bello: Key Issues |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2013 |
|
Cyber Operations and the Jus Ad Bellum Revisited |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
|
The Council of Europe Convention on Cybercrime |
Activities, Social Solutions, International Responses |
Governance |
2013 |
|
Convention on Cybercrime: CETS No. 185 |
Activities, Social Solutions, International Responses |
Governance |
2013 |
|
Law and Borders: The Rise of Law in Cyberspace |
Activities, Social Solutions |
Governance |
2013 |
|
Technology and Internet Jurisdiction |
Activities, Social Solutions |
Governance |
2013 |
|
The Law of Cyber-Attack |
Social Solutions, International Responses |
Governance, Industry |
2013 |
|
National Cyber Incident Response Plan |
Activities, Technical Solutions, Social Solutions |
Governance, Industry |
2013 |
|
International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World |
Activities, Social Solutions |
Governance, Industry, Trade |
2013 |
|
Institutional Foundations for Cyber Security: Current Responses and New Challenges |
Activities, Social Solutions, International Responses |
Governance, Industry |
2013 |
|
The Tao of IETF: A Novice's Guide to the Internet Engineering Task Force |
Social Solutions |
Governance, Industry |
2013 |
|
Lessons from ICANN: Is self-regulation of the Internet fundamentally flawed? |
Social Solutions, International Responses |
Governance, Industry |
2004 |
|
Cyber Security and International Agreements |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2010 |
|
Models of Internet Governance |
Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2008 |
|
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector |
Technical Solutions, Social Solutions |
Industry, Trade |
2013 |
|
Man-in-the-Middle Attack to the HTTPS Protocol |
Technical Solutions |
Industry |
2013 |
|
Introduction to Public Key Technology and the Federal PKI Infrastructure |
Technical Solutions |
Governance, Industry |
2013 |
|
An Insider's Guide to the Internet |
Technical Solutions |
Industry |
2013 |
|
The Design Philosophy of the DARPA Internet Protocols |
Technical Solutions |
Industry |
2013 |
|
Unmet need for contraception in Kuwait: issues for health care providers |
Social Solutions |
Governance, Unmet Needs |
2013 |
|
Permanent mission of the UAE to the United Nations-Occupation of the Three Islands |
Social Solutions, International Responses |
Conflicts, Land Use, Governance |
2013 |
|
Bahrain’s tertiary education reform : A step towards sustainable economic development |
Problems, Social Solutions |
Population, Urbanization |
2013 |
|
The Economic Costs of the Iraq War: An Appraisal Three Years After the Beginning of the Conflict |
Social Solutions |
Conflicts |
2013 |
|
Sustainable Manufacturing Centre |
Problems, Technical Solutions |
Consumption, Energy, Governance, Industry |
2013 |
|
Trustworthy Cyberspace: Strategic plan for the Federal cybersecurity research and development program |
Activities, Social Solutions |
Governance |
2013 |
|
Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise |
Activities, Social Solutions |
Governance |
2013 |
|
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions |
Activities, Social Solutions, International Responses |
Governance |
2013 |
|
Cybersecurity: Authoritative Reports and Resources |
Activities |
Governance |
2013 |
|
The Smart Grid and Cybersecurity -- Regulatory Policy and Issues |
Activities, Technical Solutions, Social Solutions |
Energy, Governance, Industry |
2013 |
|
Changing the game: Key findings from The Global State of Information Security Survey 2013 |
Activities |
Governance, Industry, Trade |
2013 |
|
Cyber-Security: The vexed question of global rules, An independent report of cyber-preparedness around the world |
Activities |
Governance |
2013 |
|
Internet matters: The Net's sweeping impact on growth, jobs, and prosperity |
Activities, Social Solutions |
Governance, Trade |
2011 |
|
Posner's Remarks on Internet Freedom and Responsibility, October 2011 |
Activities, Social Solutions, International Responses |
Governance, Industry, Trade |
2013 |
|
Sovereign Discourse on Cyber Conflict Under International Law |
Social Solutions, International Responses |
Conflicts, Governance |
2012 |
|
Perspectives for Cyber Strategists on Law for Cyberwar |
Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2011 |
|
Emerging Cyber Threats Report 2013 - Georgia Tech Institute Summit |
Activities, Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
|
Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States |
Activities, International Responses |
Conflicts, Governance, Industry |
2004 |
|
Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva & Hague Conventions in Cyber Conflict |
Social Solutions, International Responses |
Governance, Industry |
2011 |
|
The Five Futures of Cyber Conflict and Cooperation |
Social Solutions, International Responses |
Conflicts, Governance, Industry |
2012 |
|
Classification of Cyber Conflict |
Activities, International Responses |
Conflicts, Industry |
2012 |
|
International Cyber Incidents: Legal Considerations |
International Responses |
Conflicts, Governance |
2010 |
|
The Fourth Quadrant |
Activities |
Governance |
2012 |
|
Power Hackers: The U.S. Smart Grid is Shaping Up to be Dangerously Insecure |
Activities |
Energy, Governance |
2012 |
|
The Problem Isn't Attribution; It's Multi-Stage Attacks |
Activities |
Conflicts, Governance |
2012 |
|
Optimal Error Correction for Computationally Bounded Noise |
Activities |
Industry |
2012 |
|
Creating the Demand Curve for Cybersecurity |
Activities, Social Solutions |
Governance |
2012 |
|
Cyberthreat, Government Network Operations, and the Fourth Amendment |
Activities |
Conflicts, Governance, Industry |
2012 |
|
Everything you need to know about Wikileaks |
Activities |
Governance |
2012 |
|
Regulators Can Help Obama Secure It |
Activities, Social Solutions |
Governance |
2012 |