SEARCH THE HSDL

Advanced search    Help

Searching for terms: ALL (stuxnet)   in: title or summary

Set an Alert to get future results

Results  1 - 30 (of 44)          sorted by relevance     sort by date

Clear all search criteria

Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).

  • Shadows of Stuxnet: Recommendations for U.S. Policy on Critical Infrastructure Cyber Defense Derived from the Stuxnet Attack
    Naval Postgraduate School (U.S.); Naval Postgraduate School (U.S.). Center for Homeland Defense and Security
    Lendvay, Ronald L.
    2016-03
  • Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability [December 9, 2010]
    Library of Congress. Congressional Research Service
    Theohary, Catherine A.; Kerr, Paul K.; Rollins, John
    2010-12-09
  • Stuxnet, 'Schmitt Analysis,' and the Cyber 'Use of Force' Debate
    Air University (U.S.). Air War College
    Foltz, Andrew C.
    2012-02-15
  • Cyberspace Operations, Stuxnet, 'Jus Ad Bellum' and 'Jus in Bello'
    Air University (U.S.). Air War College
    Morton, Grady O., Jr.
    2013-03-14
  • Cyberterrorism After Stuxnet
    Army War College (U.S.). Strategic Studies Institute
    Chen, Thomas M.
    2014-06
  • Cyber Security--2010, Hearings Before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Eleventh Congress, Second Session, June 15, 2010, Protecting Cyberspace as a National Asset: Comprehensive Legislation for the 21st Century, November 17, 2010, Securing Critical Infrastructure in the Age of Stuxnet
    United States. Government Printing Office
    2011
  • Nodes and Codes: The Reality of Cyber Warfare
    U.S. Army Command and General Staff College. School of Advanced Military Studies
    Cobos, Mark A.
    2012-05-12
  • ICS-CERT - 2010 Year in Review
    United States Computer Emergency Readiness Team
    2011-01
  • Iranian Offensive Cyberattack Capabilities [January 13, 2020]
    Library of Congress. Congressional Research Service
    Theohary, Catherine A.
    2020-01-13
  • Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits
    Air Force Institute of Technology (U.S.)
    Bushey, Henry W.
  • The Evolution Of Preemptive Strikes In Israeli Operational Planning And Future Implications For The Cyber Domain
    U.S. Army Command and General Staff College. School of Advanced Military Studies
    Parmenter, Robert C.
    2013-01
  • Cyber Attacks: Proportionality and Precautions in Attack
    Naval War College (U.S.). International Law Studies
    Jensen, Eric Talbot
    2013
  • Offense-Defense Balance in Cyberspace: A Proposed Model
    Naval Postgraduate School (U.S.)
    Malone, Patrick J.
    2012-12
  • Organizing for Cyberspace Operations: Selected Issues
    Naval War College (U.S.). International Law Studies
    Walker, Paul
    2013
  • Road Ahead: Gaps, Leaks and Drips
    Naval War College (U.S.). International Law Studies
    Glennon, Michael J., 1947-
    2013
  • Cyberwar and B.H. Liddell Hart's Indirect Approach
    U.S. Army Command and General Staff College
    Euhus, Brandon Thomas
    2016
  • Cybersecurity: An Overview of Risks to Critical Infrastructure, Hearing Before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, First Session, July 26, 2011
    United States. Government Printing Office
    2012
  • Cybersecurity: Authoritative Reports and Resources, by Topic [April 3, 2014]
    Library of Congress. Congressional Research Service
    Tehan, Rita
    2014-04-03
  • Cybersecurity: Authoritative Reports and Resources, by Topic [February 19, 2014]
    Library of Congress. Congressional Research Service
    Tehan, Rita
    2014-02-19
  • Cybersecurity: Authoritative Reports and Resources, by Topic [October 14, 2014]
    Library of Congress. Congressional Research Service
    Tehan, Rita
    2014-10-14
  • Cybersecurity: Authoritative Reports and Resources, by Topic [May 7, 2015]
    Library of Congress. Congressional Research Service
    Tehan, Rita
    2015-05-07
  • Cybersecurity: Authoritative Reports and Resources, by Topic [February 27, 2015]
    Library of Congress. Congressional Research Service
    Tehan, Rita
    2015-02-27
  • The Vulnerability of Nuclear Facilities to Cyber Attack
    Naval Postgraduate School (U.S.). Center for Contemporary Conflict
    Kesler, Brent
    2011
  • A Feasibility Study on the Application of the ScriptGenE Framework as an Anomaly Detection System in Industrial Control Systems
    Air Force Institute of Technology (U.S.)
    Corvin, Charito M.
    2015-09-17
  • Role of Counterterrorism Law in Shaping 'ad Bellum' Norms for Cyber Warfare
    Naval War College (U.S.). International Law Studies
    Banks, William C.
    2013
  • Rise of a Cybered Westphalian Age
    Air University (U.S.). Press
    Demchak, Chris C.; Dombrowski, Peter J., 1963-
    2011
  • Cyber War and International Law: Does the International Legal Process Constitute a Threat to U.S. Vital Interests?
    Naval War College (U.S.). International Law Studies
    Murphy, John F.
    2013
  • CORESAFE: A Formal Approach Against Code Replacement Attacks on Cyber Physical Systems
    United States. Air Force. Office of Scientific Research
    Shukla, Sandeep K.; Das, Debleena; Banerjee, Anshuman
    2018-04-20
  • Cyber Warfare Governance: Evaluation of Current International Agreements on the Offensive Use of Cyber
    Air University (U.S.). Air Command and Staff College
    Lewis, Nicholas
    2015-10
  • Naval Law Review. Volume 64, 2015
    Naval Justice School (U.S.)
    2015
      1   2