Cyber Bibliography

Select Publications on Cybersecurity

The Strategic Technologies Program will maintain and regularly update this list of select publications on cybersecurity. This resource is in draft form. If you have any sugestions for added material, please email us at techpolicy@csis.org. 

The program would like to thank William Crumpler for assembling this resource.

LAST UPDATED: July 8, 2016

Publications on Cybersecurity

Abbassi, Puja, Martin Kaul, Vivek Mohan, Yi Shen, and Zev Winkelman. “Securing the Net: Global Governance in the Digital Domain.” Global Public Policy Institute, September 2013.

Abele-Wigert, Isabelle, and Myriam Cavelty. "International CIIP International Handbook 2006." Center for Security Studies. 2006.

Ablon, Lillian, Martin C. Libicki and Andrea A. Golay. “Markets for Cybercrime Tools and Stolen Data.”  RAND Corporation. 2014.

Applegate, Scott D. “The Dawn of Kinetic Cyber.” Presented at the 5th International Conference on Cyber Conflict, Tallinn, Estonia, June 4-7, 2013.

Arimatsu, Louise, “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2012.

Arquilla, John. “Cyberwar Is Already Upon Us.” Foreign Policy, February 27, 2012.

Austin, Greg. “International Legal Norms in Cyberspace: Evolution of China’s National Security Motivations.” In International Cyber Norms: Legal, Policy & Industry Perspectives, edited by Anna-Maria Osula and Henry Rõigas, NATO CCD COE Publication, Tallinn, 2016.

Austin, Greg, Bruce McConnell, and Jan Neutze. “Promoting International Cyber Norms: A New Advocacy Forum.” EastWest Institute. 2015.

Baker, Stewart, Shaun Waterman, and George Ivanov. “In the Crossfire.” McAfee, Inc. and the Center for Strategic and International Studies. 2010.

Baker, Stewart, Natalia Filipiak, and Katrina Timlin. “In the Dark.” McAfee, Inc. and the Center for Strategic and International Studies. 2011.

Ball, Desmond. “China’s Cyber Warfare Capabilities.” Security Challenges 7, no. 2 (Winter 2011): 81-103.

Ball, Desmond, and Gary Waters. “Cyber Defence and Warfare.” Security Challenges 9, no. 2 (2013): 91-98.

Baylon, Caroline, Roger Brunt, and David Livingstone. “Cyber Security at Civil Nuclear Facilities: Understanding the Risk.” Chatham House. 2015.

Beidleman, Scott W. “Defining and Deterring Cyber War.” Master’s thesis, U.S. Army War College, June 2009.

Bejtlich, Richard. "Outside Perspectives on the Department of Defense Cyber Strategy." The Brookings Institution. September 29, 2015.

Bejtlich, Richard. “Strategic Defense in Cyberspace: Beyond Tools and Tactics.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 159-170. Tallinn: NATO CCD COE Publication, 2015.

Bendiek, Annegret and Tobias Metzger. “Deterrence theory in the cyber-century: Lessons from a state-of-the-art literature review.” Lecture Notes in Informatics (LNI), Gesellschaft fur Informatik, Bonn, 2015.

Benitz, Jorge, and Jason Healey. “Cyber Offense is King.” The Atlantic Council. July 30, 2012.

Borum, Randy, and Ronald Sanders. “Cyber Intelligence: Preparing Today: for Tomorrow’s Threats.” Intelligence and National Security Alliance, 2015.

Bosch, Olivia. "Defending Against Cyber Terrorism: Preserving the Legitimate Economy." In Business and Security: Public-Private Sector Relationships in a New Security Environment, by Alyson J.K. Bailes and Isabel Frommelt, 187-96. New York: Oxford University Press, 2004.

Beeker, Kevin R. “Strategic Deterrence in Cyberspace: Practical Application” Master’s thesis, Air Force Institute of Technology, 2009.

Beeker, Kevin R., Robert F. Mills, Michael R. Grimaila, and Michael W. Haas. “Operationally Responsive Cyberspace: A Critical Piece in the Strategic Deterrence Equation.” In Thinking about Deterrence: Enduring Questions in a Time of Rising Powers, Rogue Regimes, and Terrorism, edited by Adam Lowther, 37-47. Alabama: Air University Press, 2013.

Blackburn, John and Gary Waters. “Optimising Australia’s Response to the Cyber Challenge.” Kokoda Paper No. 14, Kokoda Foundation, 2011.

Boo, Hyeong-Wook and Kang-Kyu Lee. “Cyber War and Policy Suggestions for South Korean Planners.” International Journal of Korean Unification Studies 21, no. 2 (2012): 85-106.

Brantly, Aaron F. “Cyber Actions by State Actors: Motivation and Utility.” International Journal of Intelligence and Counterintelligence 27, no. 3 (2014): 465-484.

Breaux, Travis D. and Catherine B. Lotrionte. “Towards a privacy management framework for distributed cybersecurity in the new data ecology.” Presented at Technologies for Homeland Security, 2011 IEEE International Conference on Digital Object Identifier, Waltham, Massachusetts, November 15-17, 2011.

Bronk, Christopher. “Blown to Bits: China’s War in Cyberspace, August-September 2020.” Strategic Studies Quarterly, (Spring 2011): 1-20.

Bronk, Christopher. “A Governance Switchboard: Scalability Issues in International Cyber Policymaking.” Baker Institute for Public Policy, Rice University. 2012.

Bronk, Christopher. “From Tunis to Tunis: Considering the Planks of U.S. International Cyber Policy, 2005-2011.” James A. Baker III Institute for Public Policy. 2012.

Bronk, Christopher. “Hacks on Gas: Energy, Cybersecurity, and U.S. Defense.” James A. Baker III Institute for Public Policy. 2014.

Bronk, Christopher and Eneken Tikk-Ringas. “Hack or Attack? Shamoon and the Evolution of Cyber Conflict.” Survival, Global Politics and Strategy 55, no. 2 (2013): 81-96.

Buchan, Russell. “The International Legal Regulation of State-Sponsored Cyber Espionage.” In International Cyber Norms: Legal, policy & Industry Perspectives edited by Anna-Maria Osula and Henry Rõigas, 65-86. Tallinn: NATO CCD COE Publication, 2016.

Bumgarner, John and Scott Borg. “Overview by the US-CCU of the Cyber Campaign against Georgia.” U.S. Cyber Consequences Unit. 2009.

Calvo, Alex. “Cyberwar is War.” Small Wars Journal 10, no. 4 (2014).

Canabarro, Diego Rafael and Thiago Borne. “Reflections on the Fog of (Cyber)War.” NCDG Policy Working Paper No. 13-001, National Center for Digital Government, 2013.

Cardash, Sharon L. “Obama’s cybersecurity initiative: a start but businesses – and individuals – need to do more.” The Conversation. February 24, 2015.

Carey, Casimir C. III. “NATO’s Options for Defensive Cyber Against Non-State Actors.” U.S. Army War College. 2013.

Carr, Jeffrey. “Responsible Attribution: A prerequisite for Accountability.” Tallinn Paper No. 6. NATO CCD COE Publication, Tallinn, 2014.

Carr, Madeline. "Public–private Partnerships in National Cyber-security Strategies." Chatham House. January 2016.

Cartin, Josh M. “Don’t Forget the Humans: Toward a 21st Century Offensive Cyber Strategy.” Global Security Studies 5, no. 2 (2014): 12-26.

Caton, Jeffrey L. “Exploring the Prudent Limits of Automated Cyber Attack.” Presented at the 5th International Conference on Cyber Conflict, Tallinn, Estonia, June 4-7, 2013.

Caton, Jeffrey L. “Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications” Strategic Studies Institute. U.S. Army War College. (October 2014).

Caton, Jeffrey L. “Army Support of Military Cyberspace operations: Joint Contexts and Global Escalation Implications” Strategic Studies Institute. U.S. Army War College. (January 2015).

Cavelty, Myriam D. “Cyber-Allies: Strengths and Weaknesses of NATO’s Cyberdefense Posture.” IP Global Edition 12, no. 3 (2012):11-15.

Cavelty, Myriam D. “The Art of CIIP Strategy: Tacking Stock of Content and Processes.” Critical Information Infrastructure Protection. (2012):15-38

Cavelty, Myriam D. “The militarization of cyber security as a source of global tension.” In Strategic Trends, edited by Zurich Mockli and Daniel Wegner, 103-124. 2012.

Cavelty, Myriam D. “The Militarisation of Cyberspace: Why Less May Be Better.” Paper presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2012.

Cavelty, Myriam D. “A Resilient Europe for an Open, Safe, and Secure Cyberspace”. December 2013.

Cavelty, Myriam D. “From Cyber-Bombs to Political Fallout: Threat Representation with an Impact on Cyber-Security Discourse.” International Studies Review, 15. (2013):105-122.

Cavelty, Myriam D. “Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.” Science of Engineering Ethics 20, no. 3 (2014).

Cavelty, Myriam D. “Cybersecurity in Switzerland.” Springer Briefs in Cybersecurity. New York City: Springer. 2014.

Cavelty, Myriam D. “Cyber Security.” In the Contemporary Security Studies vol. 4, edited by Alan Collins, 400-416. New York City: Oxford University Press, 2015.

Cavelty, Myriam D. “The normalization of cyber-international relations.” In Strategic Trends, edited by Oliver Thranert and Martin Zapfe, 81-98. 2015.

Chang, Amy. "Warring State: China's Cybersecurity Strategy." Center for a New American Security. December 3, 2014.

Chantzos, Ilias and Shireen Alam. “Technological integrity and the Role of Industry in Emerging Cyber Norms.” In International Cyber Norms: Legal, Policy & Industry Perspectives, edited by Anna-Maria Osula and Henry Rõigas, NATO CCD COE Publication, Tallinn, 2016.

Chen, Thomas M. “Cyberterrorism after STUXNET” Strategic Studies Institute. U.S. Army War College. (June 2014).

Chertoff, Michael, Frank Cilluffo. “A Strategy of Cyber Deterrence.” The John Hay Initiative. (2015).

Cilluffo, Frank J. “The Iranian Cyber Threat to the United States.” Homeland Security Policy Institute. April 14, 2012.

Cilluffo, Frank J. “Cyber Threats from China, Russia, and Iran: Protecting American Critical Infrastructure.” Homeland Security Policy Institute. March 20, 2013.

Cilluffo, Frank J. “A Global Perspective on Cyber Threats.” Center for Cyber and Homeland Security. June 16, 2015.

Cilluffo, Frank J., and J. Richard Knop. “Getting Serious About Cyberwarfare.” The Journal of International Security Affairs (2012):41-47.

Cilluffo, Frank J., and Joseph R. Clark. “Preparing for Netwars: Repurposing Cyber Command.” The Journal of International Security Affairs (2012):111-118.

Cilluffo, Frank J., and Joseph R. Clark. “Shoot, Move, Communicate: Thinking through Cyber’s Role in Ground Combat.” Military Review. (2015).

Cilluffo, Frank J., Sharon L. Cardash, and George C. Salmolraghl. "A Blueprint for Cyber Deterrence: Building Stability through Strength." Military and Strategic Affairs 4, no. 3 (December 2012): 3-23.

Clarke, Richard A. “Securing Cyberspace through International Norms: Recommendations for Policymakers and the Private Sector.” Good Harbor Security Risk Management, LLC. 2012.

Clayton, Blake and Adam Segal. “Addressing Cyber Threats to Oil and Gas Suppliers.” Council on Foreign Relations. 2013.

Colby, Elbridge. “Cyberwar and the Nuclear Option.” The National Interest, (June 24, 2013).

Cornish, Paul. “Governing Cyberspace through Constructive Ambiguity.” Survival 57, no. 3 (July 2015): 153-176

Cornish, Paul, David Livingstone, Dave Clemente, and Claire Yorke. “On Cyber Warfare.” Chatham House. 2010.

Cornish, Paul, David Livingstone, Dave Clemente, and Claire Yorke. “Cyber Security and the UK’s Critical National Infrastructure.” Chatham House. 2011.

Cornish, Paul, Rex Hughes, and David Livingstone. “Cyberspace and the National Security of the United Kingdom.” Chatham House. 2009.

Craig, Anthony and Brandon Valeriano. “Conceptualising Cyber Arms Races.” Presented at the 8th International Conference on Cyber Conflict, Tallinn, Estonia, 2016.

CSIS Commission on Cybersecurity for the 44th President. "A Human Capital in Crisis: Technical Proficiency Matters." Center for Strategic and International Studies. November 2010.

CSIS Commission on Cybersecurity for the 44th President. “Securing Cyberspace for the 44th Presidency.” Center for Strategic and International Studies. December 2008.

"Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum." National Academy of Sciences. 2014

“Cybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities.” The George Washington University Center for Cyber and Homeland Security. June 22, 2014.

Davis, John S. II, Martin C. Libicki, Stuart E. Johnson, Jason Kumar, Michael Watson, Andrew Karode. “A Framework for Programming and Budgeting for Cybersecurity.” RAND Corporation. 2016.

Davis, Paul K. “Deterrence, Influence, Cyber Attack, and Cyberwar.” New York University Journal of International Law and Politics 47, no. 2 (2014): 327-355.


Deibert, Ron. “Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace.” Canadian Defence and Foreign Affairs Institute, Mulk School of Global Affairs: University of Toronto. August 2012.

Deibert, Ron. “Bounding Cyber Power: Escalation and Restraint in Global Cyberspace.” Internet Governance Papers: Paper No. 6. Center for International Governance Innovation. 2013.

Deibert, Ron. “Divide and Rule: Republican Security Theory as Civil Society Cyber Society.”  Georgetown Journal of International Affairs 20, (2014): 45-56.

Deibert, Ron. “The Geopolitics of Cyberspace After Snowden.” Current History 114, no. 768 (2015): 9-15.

Deibert, Ron, and Masashi Crete-Nishihata. “Global Governance and the Spread of Cyberspace Controls.” Global Governance 18, no. 3 (2012): 339-361.

Deibert, Ron and Rafal Rohozinski. “Liberation Vs. Control: The Future of Cyberspace.” Journal of Democracy 21, no. 4 (2010): 43-57.

Deibert, Ron, and Rafal Rohozinski. “Contesting Cyberspace and the Coming Crisis of Authority.” In Access Contested: Security, Resistance, and Identity in Asian Cyberspace, edited by Ron Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, 21-42. Cambridge, Massachusetts: MIT Press, 2011.

Deibert, Ron, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain. “Access Contested: Toward the Fourth Phase of Cyberspace Controls.” In Access Contested: Security, Resistance, and Identity in Asian Cyberspace, edited by Ron Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, 3-20. Cambridge, Massachusetts: MIT Press, 2011.

Delerue, François. “Civilian Direct participation in Cyber Hostilities.” IDP Revista de Internet, Derecho y Politica no. 19 (October 2014): 3-17.

Demchak, Chris C. and Peter J. Dombrowski. “Rise of a Cybered Westphalian Age”. Strategic Studies Quarterly, (Spring 2011): 31-62.

Demchak, Chris C. “Resilience and Cyberspace: Recognizing the Challenges of a Global Socio-Cyber Infrastructure (GSCI).” Journal of Comparative Policy Analysis: Research and Practice 14, no. 3 (2012): 254-269

Demchak, Chris C. “Political and Economic Coercion and a Rising Cyber Westphalia.” In Peacetime Regimes for Governmental Cyber Operations: International Law, Foreign Affairs and Cyber-Diplomacy, edited by Katharina Ziolkowski, 595-620. Tallinn: NATO CCD COE Publication, 2013.

Demchak, Chris C. "Uncivil and Post-Western Cyber Westphalia:  Changing the International Power Relations of the Cybered World." Cyber Defense Review 1, no. 1 (2016): 49-74.

Denneson, Kristen, John Felker, Tonya Feyes, and Sean Kern. “Strategic Cyber Intelligence.” Intelligence and National Security Alliance. (2014).

Denning, Dorothy E. “Rethinking the Cyber Domain and Deterrence.” Joint Force Quarterly 77, no 2. (2015): 8-15.

Dewar, Robert. “Cyber-Lisbon? The Impact of the Treaty of Lisbon on European Union Cybersecurity Policy.” Presented at EUSA conference, Boston, 2015.

Dombrowski, Peter and Chris C. Demchak. “Cyber War, Cybered Conflict, and the Maritime Domain.” Naval War College Review 67, no. 2 (Spring 2014): 71-96.

Dörmann, Knut. "Applicability of the Additional Protocols to Computer Network Attacks." International Committee of the Red Cross. November 19, 2004.

Ellis, Jamie M. “Chinese cyber espionage: a complementary method to aid PLA modernization.” Thesis, Navy Postgraduate School, 2015.

Ellis, Ryan. "The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy." Belfer Center for Science and International Affairs. February 2015.

Erskine, Toni and Madeline Carr. “Beyond ‘Quasi-Norms’: The Challenges and Potential of Engaging with Norms in Cyberspace.” In International Cyber Norms: Legal, Policy & Industry Perspectives, edited by Anna-Maria Osula and Henry Rõigas, 87-109. Tallinn: NATO CCD COE Publication, 2016.

Fahrenkrug, David T. “Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2013.

Feakin, Tobias. “Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies’ Cyber Capabilities.” Australian Strategic Policy Institute. June 2013.

Feakin, Tobias. “Developing a Proportionate Response to a Cyber Incident.” Council on Foreign Relations Press. August 2015.

Fidler, David P. “Cyber Deterrence and the OPM Hack: Making Threats that Lack Credibility and Leave Nothing to Chance?” Cybersecurity Review, (Autumn 2015): 77-81.

Fidler, David P, Richard Pregent, and Alex Vandurme. “NATO, Cyber Defense, and International Law.” Articles by Maurer Faculty. Paper 1672. 2013.

Fitzgerald, Ben, and Parker Wright. "Digital Theaters: Decentralizing Cyber Command and Control." Center for a New American Security. April 24, 2014.

Flook, Kara. "Russia and the Cyber Threat." American Enterprise Institute. May 13, 2009.

Fontaine, Richard. "Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era." Center for a New American Security. September 18, 2014.

Futter, Andrew. “Hacking the bomb: Nuclear Weapons in the Cyber Age.” Draft Working Paper for ISA Annual Conference, New Orleans, LA, February, 2015.

Gartzke, Erik. “The Myth of Cyberwar.” International Security 38, no. 2 (Fall 2013): 41-73.

Gartzke, Erik and Jon R. Lindsay. “Cross-Domain Deterrence: Strategy in an Era of Complexity.” Prepared for the International Studies Association Annual Meeting, Toronto, 25-29 March, 2014.

Gartzke, Erik and Jon R. Lindsay. “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace.” Security Studies 24, no. 2 (2015): 316-348.

Geer, Daniel E. "Cybersecurity and National Policy." Harvard National Security Journal 1 (April 7, 2010): 203-15.

Geer, Daniel E. “Dan Geer: In cybersecurity, expectations drive reality.” The Christian Science Monitor. November 19, 2015.

Geer, Daniel E. “What Does the Future Hold for Cyber Security?” Suits and Spooks. June 19, 2015.

Geers, Kenneth. “Pandemonium: Nation States, National Security, and the Internet.” Tallinn Paper No. 1, NATO CCD COE Publication, Tallinn, 2014.

Geiss, Robin. “Cyber Warfare: Implications for Non-international Armed Conflicts.” International Law Studies 89, (2013): 627-645.

Geist, Edward. “Deterrence Stability in the Cyber Age.” Strategic Studies Quarterly, (Winter 2015): 44-62.

Giles, Keir. “’Information Troops’ – a Russian Cyber Command?” Presented at the 3rd International Conference on Cyber Conflict, Tallinn, Estonia, 2011.

Giles, Keir. “Russia and Its Neighbors: Old Attitudes, New Capabilities.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 19-28. Tallinn: NATO CCD COE Publication, 2015.

Giles, Keir and Andrew Monaghan. “Legality in Cyberspace: An Adversary View.” Strategic Studies Institute. U.S. Army War College. (March 2014).

Giles, Keir and Kim Hartmann. “Cyber Defense: An International View” Strategic Studies Institute. U.S. Army War College. (September 2015).

Gill, Terry D. and Paul A. L. Decheine. “Anticipatory Self-Defense in the Cyber Context.” International Law Studies 89, (2013): 438-471.

Glaser, Charles L. “Deterrence of Cyber Attacks and U.S. National Security.” The George Washington University Cyber Security Policy and Research Institute (June 2011).

Glennon, Michael J. “The Dark Future of International Cybersecurity Regulation.” Journal of National Security Law and Policy 6, (2013): 563-570.

Global Commission on Internet Governance. "Toward a Social Compact for Digital Privacy and Security." Chatham House. April 15, 2015.

Goldsmith, Jack. “The Cyberthreat, Government Network Operations, and the Fourth Amendment.” The Brookings Institution. December 08, 2010.

Goldsmith, Jack. “Cybersecurity: A Skeptical View.” in Future Challenges in National Security and Law, edited by Peter Berkowitz. (2013).

Goldsmith, Jack. “How Cyber Changes the Laws of War.” The European Journal of International Law 24, no.1 (2013): 129-138.

Goodman, Will. “Cyber Deterrence: Tougher in Theory than in Practice?” Strategic Studies Quarterly. (Fall 2010): 102-135.

Gray, Colin S. “Making Strategic Sense of Cyber Power: Why the Sky is not Falling.” Strategic Studies Institute. U.S. Army War College. (April 2013).

Greylogic. “Project Grey Goose Report on Critical Infrastructure: Attacks, Actors, and Emerging Threats.” GreyLogic. January 21, 2010.

Hancock, Geoff, Christian Anthony, and Lincoln Kaffenberger. “Tactical Cyber Intelligence.” Intelligence and National Security Alliance. (2015).

Haney, Cecil D. “Strategic Deterrence for the Future.” Air and Space Power Journal (July-August 2015): 4-8.

Hare, Forrest. “Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?” In The Virtual Battlefield: Perspectives on Cyber Warfare edited by Christian Czosseck and Keneth Geers. Tallinn: NATO CCD COE Publication, 2009.

Hare, Forrest. “The Significance of Attribution to Cyberspace Coercion: A Political Perspective.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2012.

Harold, Scott Warren, Martin C. Libicki, and Astrid Cevallos. "Getting to Yes with China in Cyberspace." RAND Corporation. 2016.

Hathaway, Melissa E. "Strategic Advantage: Why America Should Care About Cybersecurity." Belfer Center for Science and International Affairs. October 2009.

Hathaway, Melissa E. “Cyber Readiness 1.0.” Hathaway Global LLC. (2013).

Hathaway, Melissa E. "Cyber Readiness Index 2.0" Belfer Center for Science and International Affairs. November 30, 2015.

Hathaway, Oona A. “The Drawbacks and Dangers of Active Defense.” Presented at the 6th International Conference on Cyber Conflict, Tallinn, Estonia, 2014.

Hathaway, Oona A., Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, and Julia Spiegel. “The Law of Cyber-Attack.” California Law Review 100, (2012): 817-885.

Healey, Jason. “The Five Futures of Cyber Conflict and Cooperation.” Atlantic Council. Issue Brief. December 2011.

Healey, Jason. "Beyond Attribution: Seeking National Responsibility in Cyberspace." Atlantic Council. February 22, 2012.

Healey, Jason. “The US Cyber Policy Reboot.” The Atlantic Council. Issue Brief. March 2012.

Healey, Jason. “When “Not My Problem” Isn’t enough: Political Neutrality and National Responsibility in Cyber Conflict.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2012.

Healey, Jason and A.J. Wilson. “Cyber Conflict and the War Powers Resolution: Congressional Oversight of Hostilities in the Fifth Domain.” Georgetown Journal of International Affairs Special Issue: International Engagement on Cyber, (2012): 59-69.

Healey, Jason and Klara Tothova Jordan. “NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow.” Atlantic Council. 2014.

Healey, Jason and Michelle Cantos. “What’s Next for Putin in Ukraine: Cyber Escalation?” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 153-158. Tallinn: NATO CCD COE Publication, 2015.

Heinl, Caitriona H. “Regional Cyber Security: Moving Towards a Resilient ASEAN Cyber Security Regime.” S. Rajaratnam School of International Studies, Working Paper no. 263, September 2013.

Heinl, Caitriona H. “Artificial (Intelligent) Agents and Active Cyber Defence: Policy Implications.” Presented at the 6th International Conference on Cyber Conflict, Tallinn, Estonia, 2014.

Heinl, Caitriona H. “National Security Implications of Increasingly Autonomous Technologies: Defining Autonomy, and Military and Cyber-Related Implications Part 1.” S. Rajaratnam School of International Studies. Policy Report. February 2015.

Heinl, Caitriona H. “National Security Implications of Increasingly Autonomous Technologies: Legal Ambiguity, Challenges in Controlling this Space, Public/Private Sector Dynamics and Ethical Concerns.” S. Rajaratnam School of
International Studies. Policy Report. February 2015.

Heinl, Caitriona H. “Enabling Better Multinational and International Military Cooperation for Cyber-Related Matters Across Asia and Europe.” S. Rajaratnam School of International Studies. Policy Report. March 2015.

Heinl, Caitriona H. “Civil-Military Relations and International Military Cooperation in Cyber Security: Common Challenges & State Practices Across Asia and Europe.” Presented at the 7th International Conference on Cyber Conflict, Tallinn, Estonia, 2015.

Heintschel von Heinegg, Wolff. “Legal Implications of Territorial Sovereignty in Cyberspace.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2012.

Heintschel von Heinegg, Wolff. “Neutrality in Cyberspace.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2012.

Hengel, Steven Jr, Sean Klern, and Andrea Little Limbago. “Operational Cyber Intelligence.” Intelligence and National Security. (2014).

Iasiello, Emilio. “Cyber Attack: A Dull Tool to Shape Foreign Policy.” NATO CCD COE Publication, Tallinn, (2013).

Iasiello, Emilio. “Hacking Back: Not the Right Solution.” Parameters 44, no. 3 (2014): 105-113.

Isaiello, Emilio. “Is Cyber Deterrence an Illusory Course of Action.” Journal of Strategic Security 7, no. 1 (Spring 2014): 54-67. 

Iasiello, Emilio. “Are Cyber Weapons Effective Military Tools?” Military and Strategic Affairs, 7, no. 1 (2015):23-40.

Iasiello, Emilio. “Ramping Down Chinese Commercial Cyber Espionage.” Foreign Policy Journal. December 9, 2015.

ICANN. "Plan for Enhancing Internet Security, Stability, and Resiliency." May 16, 2009.

Intelligence and National Security Alliance Cyber Intelligence Task Force. "Cyber Intelligence: Setting the Landscape for an Emerging Discipline." Intelligence and National Security Alliance. September 2011.

Intelligence and National Security Alliance Cyber Intelligence Task Force. "Operational Levels of Cyber Intelligence" Intelligence and National Security Alliance. September 2013.

Intelligence and National Security Alliance Cyber Intelligence Task Force. "Operational Cyber Intelligence." Intelligence and National Security Alliance. October 2014.

Intelligence and National Security Alliance Cyber Intelligence Task Force. "Strategic Cyber Intelligence." Intelligence and National Security Alliance. March 2014.

Intelligence and National Security Alliance Cyber Intelligence Task Force. "Tactical Cyber Intelligence." Intelligence and National Security Alliance. December 2015.

Intelligence and National Security Alliance Cyber Task Force. "Addressing Cyber Security Through Public - Private Partnership: An Analysis of Existing Models." Intelligence and National Security Alliance. November 2009.

Intelligence and National Security Alliance Rebalance Task Force. "Expectations of Intelligence in the Information Age" Intelligence and National Security Alliance. October 2012.

Jabbour, Kamal ST. “Cyber Vision and Cyber Force Development.” Strategic Studies Quarterly (Spring 2010): 63-73.

Jabbour, Kamal ST. and E. Paul Ratazzi. “Deterrence in Cyperspace.” In Thinking about Deterrence: Enduring Questions in a Time of Rising Powers, Rogue Regimes, and Terrorism, edited by Adam Lowther, 37-47. Alabama: Air University Press, 2013.

Jaitner, Margarita Levin. “Russian Information Warfare: Lessons from Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 87-94. Tallinn: NATO CCD COE Publication, 2015.

Jasper, Scott. “Deterring Malicious Behavior in Cyberspace.” Strategic Studies Quaterly. Spring 2015. 60-85.

Jensen, Eric T. “Cyber Deterrence.” Emory International Law Review 26 issue 2. (2012):775-824.

Jensen, Eric T. “Cyber Attacks: Proportionality and Precautions in Attack.” International Law Studies 89, (2013): 198-217.

Joyner, Christopher C. and Catherine Lotrionte. “Information Warfare as International Coercion: Elements of a Legal Framework.” European Journal of International Law 12, no. 5 (2001): 825-865.

Junio, Timothy J. “How Probable is Cyber War? Bringing IR Theory Back in to the Cyber Conflict Debate.” Journal of Strategic Studies, (2013).

Kaljurand, Marina. “United Nations Group of Governmental Experts: The Estonian Perspective.” In International Cyber Norms: Legal, Policy & Industry Perspectives edited by Anna-Maria Osula and Henry Rõigas, NATO CCD COE Publication, Tallinn, 2016.

Kanuck, Sean. “Sovereign Discourse on Cyber Conflict under International Law.” Texas Law Review 88, (2010): 1571-1597.

Kaska, Kadri, Anna-Maria Osula, LTC Jan Stinissen. “The Cyber Defence Unit of the Estonian Defence League: Legal, Policy and Organisational Analysis.” NATO CCD COE, Tallinn, 2013.

Kaska, Kadri, Eneken Tikk, and Liis Vihul. "International Cyber Incidents: Legal Considerations." NATO Cooperative Cyber Defence Centre of Excellence. 2010.

Kello, Lucas. “The Meaning of the Cyber Revolution: Perils to Theory and Statecraft.” International Security 38, no. 2 (2013): 7-40.


Kerttunen, Mika and Saskia Kiisel. “Norms for International Peace and Security: The Normative Frameworks of International Cyber Cooperation.” ICT4Peace Norms Project, GCCS 2015, 2015.

Khan, Zafar. “Strategizing Cyber Revolution within the Domain of Security Studies.” IPRI Journal, 15, no.2. (Summer 2015):95-112.

Kim, Sangbae. “Cyber Security and Middle Power Diplomacy: A Network Perspective.” The Korean Journal of International Studies 12, no. 2 (2014): 323-352.

Klein, John J. “Deterring and Dissuading Cyberterrorism.” Journal of Strategic Security 8 no. 4 (2015): 23-28.

Klimburg, Alexander. “Mobilising Cyber Power.” Survival 53, no. 1 (2011): 41-60.

Klimburg, Alexander. “The Whole of Nation in Cyberpower.” Georgetown Journal of International Affairs Special Issue: International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity, (2011): 171-179.

Klimburg, Alexander (Ed.) “National Cyber Security Framework Manual.” NATO CCD COE Publication, Tallinn, 2012.

Klimburg, Alexander. “The Internet Yalta.” Center for a New American Security. February 5, 2013.

Klimburg, Alexander and Heli Tirmaa-Klaar. “Cybersecurity and Cyberpower: Concepts, Conditions and Capabilities for Cooperation for Action Within the EU.” European Parliament.  Directorate-General for External Policies of the Union. April 2011.

Knake, Robert K. "Internet Governance in an Age of Cyber Insecurity." Council on Foreign Relations. September 2010.

Knake, Robert K. “Lawful Hacking.” Council on Foreign Relations. October 11, 2015.

Knake, Robert K. “A ‘Brown Water’ Navy.” Council on Foreign Relations. December 15, 2015.

Knake, Robert K. “Business Should Focus on Private-Private Partnerships.” Council on Foreign Relations. December 16, 2015.

Knake, Robert K. "Time to Clean Up U.S. Cyberspace." Council on Foreign Relations. January 4, 2016.

Korff, Douwe. “The Rule of Law on the Internet and in the Wider Digital World.” Council of Europe. Issue Paper. December 2014.

Kostyuk, Nadiya.  “Ukraine: A Cyber Safe Haven?” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 113-122. Tallinn: NATO CCD COE Publication, 2015.

Kovacs, Anja. “Addressing India’s Global Cybersecurity Concerns: Norm Development, Regulatory Challenges, Alternative Approaches.” Internet Democracy Project. 2015.

Koval, Nikolay. “Revolution Hacking.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 55-48. Tallinn: NATO CCD COE Publication, 2015.

Kramer, Franklin D. “Achieving International Cyber Stability.” Atlantic Council. 2012.

Kramer, Franklin D. “Cyber Security: An Integrated Governmental Strategy for Progress.” Georgetown Journal of International Affairs (2012): 136-150.

Kramer, Franklin D. “Cyber Security and the Need for New Approaches.” The Atlantic Council. 2012.

Kramer, Franklin D., Robert J. Butler, and Catherine Lotrionte. “Cyber, Extended Deterrence, and NATO.” The Atlantic Council. Issue Brief. May 2016.

Kramer, Franklin D. and Melanie J. Teplinsky. “Cybersecurity and Tailored Deterrence.” Atlantic Council. December 2013. 

Kramer, Franklin D., Stuart H. Starr, and Larry K. Wentz, eds. Cyberpower and National Security. Center for Technology and National Security Policy, 2009.

Krause, Hannes. “NATO on its Way towards a Comfort Zone in Cyber Defence.” Tallinn Paper No. 3. NATO NCCD COE Publications, Tallinn, 2014.

Krepinevich, Andrew F. “Cyber Warfare: A “Nuclear Option”?” Center for Strategic and Budgetary Assessments. 2012.

Kugler, Richard L. “Deterrence of Cyber Attacks.” In Cyberpower-I. Center for Technology and National Security Policy, 2014.

Lachow, Irving. "Active Cyber Defense A Framework for Policymakers." Center for a New American Security. February 2013.

Lange-Ionatamishvili, Elina and Sanda Svetoka. “Strategic Communications and Social Media in the Russia Ukraine Conflict.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 103-112. Tallinn: NATO
CCD COE Publication, 2015.

Langner, Ralph. "Defending Cyber Dominance." Brookings Institution. March 19, 2014.

Langner, Ralph and Perry Pederson. “Bound to Fail: Why Cyber Security Risk Cannot Be “Managed” Away.” Center for 21st Century Security and Intelligence. February 2013.

Lawson, Sean. “Putting the “war” in cyberwar: metaphor, analogy, and cybersecurity discourse in the United States.” First Monday 17, no. 7 (2012)

Leitzel, Benjamin. “Cyber Ricochet: Risk Management and Cyberspace Operations.” Center for Strategic Leadership, U.S. Army War College. 2012.

Lewis, James A. "Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats." Center for Strategic and International Studies. December 2002.

Lewis, James A. "The “Korean” Cyber Attacks and Their Implications for Cyber Conflict." Center for Strategic and International Studies. October 2009.

Lewis, James A. “Cross-Domain Deterrence and Credible Threats.” Center for Strategic and International Studies. July 2010.

Lewis, James A. "Thresholds for Cyberwar." Center for Strategic and International Studies. September 2010.

Lewis, James A. “Conflict and Negotiation in Cyberspace.” Center for Strategic and International Studies. February 2013.

Lewis, James A. “Reconsidering Deterrence for Space and Cyberspace.” In Anti-satellite Weapons, Deterrence and Sino-American Space Relations edited by Michael Krepton & Julia Thompson, 61-80. Washington, DC: Stimson Center, September 2013. 

Lewis, James A. “Reconsidering Deterrence in Cyberspace.” Center for Strategic and International Studies. October 2013.

Lewis, James A., ‘Economic warfare and cyberspace,” Australian Strategic Policy Institute, March 2014

Lewis, James A. “Deterrence in the Cyber Age.” Center for Strategic and International Studies. November 2014.

Lewis, James A. “Disruptive Technologies and the Future of Deterrence.” Center for Strategic and International Studies. December 2014.

Lewis, James A. “North Korea and Sony: Why So Much Doubt and What about Deterrence?” 38 North. January 2015.

Lewis, James A. “Geopolitics and Deterrence.” Center for Strategic and International Studies. June 2015.

Lewis, James A. “U.S. Efforts to Deter Hostile Iranian Cyber Actions.” Center for Strategic and International Studies. July 2015.

Lewis, James A. "Moving Forward with the Obama-Xi Cybersecurity Agreement." Center for Strategic International Studies, October 21, 2015.

Lewis, James A. “’Compelling our Opponents to Our Will’: The Role of Cyber Warfare in Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 39-48. Tallinn: NATO CCD COE Publication, 2015.

Lewis, James A. “The Role of Offensive Cyber Operations in NATO’s Collective Defence.” Tallinn Paper No. 8. NATO CCD COE Publication, Tallinn, 2015.

Lewis, James A. “Indictments, Countermeasures, and Deterrence.” Center for Strategic and International Studies. March 2016.

Lewis, James A. “Cyberspace and armed forces: the rationale for offensive cyber capabilities,” Australian Strategic Policy Institute, March 2016

Lewis, James A. and Stewart Baker. “The Economic Impact of Cybercrime and Cyber Espionage.” McAfee, Inc. and the Center for Strategic and International Studies. July 2013.

Lewis, James A. and Stewart Baker. “Net Losses: Estimating the Global Cost of Cybercrime.” McAfee, Inc. and the Center for Strategic and International Studies. June 2014.

Lewis, James A. "Selected Bibliography for Cyber Security." Center for Strategic and International Studies. September 9, 2011.

Li, Cheng, and Ryan McElveen. "A New Type of Cyber Relations?" The Brookings Institution. October 29, 2015.

Li, Yan. “Reforming Internet Governance and the Role of China.” Institute for Security & Development Policy. Focus Asia, no. 12 (2015): 1-9.

Liang, Qiao, and Wang Xiangsui. "Unrestricted Warfare." 1999.

Libicki, Martin C. "Cyberdeterrence and Cyberwar." RAND Corporation. October 2009.

Libicki, Martin C. “The Strategic Uses of Ambiguity in Cyberspace.” Military and Strategic Affairs 3, no. 3 (December 2011): 3-10.

Libicki, Martin C. “Crisis and Escalation in Cyberspace.” RAND Corporation, 2012.

Libicki, Martin C. “Cyberspace is Not a Warfighting Domain.” I/S: A Journal of Law and Policy for the Information Society 8, no. 2 (Fall 2012): 325-340.

Libicki, Martin C. “Brandishing Cyberattack Capabilities.” RAND Corporation. 2013.

Libicki, Martin C., Olesya Tkacheva, Chaoling Feng, Brett Hemenway. “Ramifications of DARPA’s Programming Computation on Encrypted Data Program.” RAND Corporation. 2013.

Libicki, Martin C., David Senty, Julia Pollak. “Hackers Wanted: An Examination of the Cybersecurity Labor Market.” RAND Corporation. 2014.

Libicki, Martin C. "Why Cyber War Will Not and Should Not Have Its Grand Strategist." Strategic Studies Quarterly, (Spring 2014): 23-39.

Libicki, Martin C. “The Cyber War that Wasn’t.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 49-54. Tallinn: NATO CCD COE Publication, 2015.

Libicki, Martin C., Lillian Ablon, Timm Webb. “The Defender’s Dilemma: Charting a Course Toward Cybersecurity.” RAND Corporation. 2016.

Lieberthal, Kenneth and Peter W. Singer. “Cybersecurity and U.S.-China Relations.” Brookings Institution. February 2012.

Limnéll, Jarno. “Northern European Cyber Security in Light of the Ukraine War.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 145-152. Tallinn: NATO CCD COE Publication, 2015.

Limnéll, Jarno. “The Exploitation of Cyber Domain as Part of Warfare: Russo-Ukrainian War.” International Journal of Cyber Security and Digital Forensics 4, no. 4 (2015): 521-532.

Lin, Herbert S. “Offensive Cyber Operations and the Use of Force.” Journal of National Security and Policy 4, no. 63. (August 2010): 63-86.

Lin, Herbert S. “Cyber Conflict and International Law.” International Review of the Red Cross 96, no. 886 (2012): 515-531.

Lin, Herbert S. “Cyber Conflict and National Security.” International Politics Enduring Concepts and Contemporary Issues, (2012):476-489.

Lin, Herbert S. “Escalation Dynamics and Conflict Termination in Cyberspace.” Strategic Studies Quarterly, (Fall 2012): 46-70.

Lin, Herbert S. “Responding to Sub-Threshold Cyber Intrusions.” Georgetown Journal of International Affairs, (2012): 127-135.

Lin, Herbert S. “Thoughts on Threat Assessment in Cyberspace.” I/S: A Journal of Law and Policy for the Information Society 8, no. 2 (2012): 337-355.

Lindsay, Jon R. “Proxy Wars: Control Problems in Irregular Warfare and Cyber Operations.” Prepared for the International Studies Association annual meeting, San Francisco, April 2013.

Lindsay, Jon R. “Stuxnet and the Limits of Cyber Warfare.” Security Studies 22, no. 3 (2013): 365-404.

Lindsay, Jon R. and Lucas Kello. “Correspondence: A Cyber Disagreement.” International Security 39, no. 2 (Fall 2014): 181-192.

Lindsay, Jon R. “Exaggerating the Chinese Cyber Threat.” Policy Brief, Belfer Center for Science and International Affairs, Harvard Kennedy School, May 2015.

Lindsay, Jon R. “The Impact of China on Cybersecurity: Fiction and Friction.” International Security 39, no. 3 (2015): 7-47.

Lindsay, Jon R. “Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack.” Journal of Cybersecurity, (November 2015): 53-67. 

Lotrionte, Catherine. “Introduction: Strengthening the Norms of State Responsibility.” Georgetown Journal of International Affairs, Special Cyber Issue, 1st ed., (2011): 101-109.

Lotrionte, Catherine. “Cyber Operations: Conflict Under International Law.” Georgetown Journal of International Affairs, Special Cyber Issue, 2nd ed. (2012): 15-24.

Lotrionte, Catherine. “A Better Defense: Examining the United States’ New Norms-Based Approach to Cyber Deterrence.” Georgetown Journal of International Affairs Special Cyber Issue, 3rd ed. (January 2014): 71-84.

Lotrionte, Catherine. “An Expanded Mandate for the ITU?” IEEE, (2014).

Lozada, Brian A. “The Risk of Cyber Crimes to the Critical national Infrastructure: A Threat Assessment.” National Cybersecurity Institute Journal 1, no. 2 (2014): 57-63.

Lu, Chuanying, “Cyber strategies of great powers: US-China interactions and cooperation.” Shanghai Institutes for International Studies. 2016.

Lupovici, Amir. “Cyber Warfare and Deterrence: Trends and Challenges in Research.” Military and Strategic Affairs 3, no. 3 (December 2011): 49-62.

Maness, Ryan C. and Brandon Valeriano. “The Impact of Cyber Conflict on International Interactions.” Armed Forces and Society 42, (2015): 301-323.

Manjikian, Mary. “From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik.” International Studies Quarterly 54, (2010): 381-401.

Manjikian, Mary. “Confidence building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes” Strategic Studies Institute. U.S. Army War College. (April 2015).

Maurer, Tim. “Cyber Norm Emergence at the United Nations – An Analysis of the UN‘s Activities Regarding Cyber-security?” Discussion Paper 2011-11, Belfer Center for Science and International Affairs. 2011.

Maurer, Tim. “Cyber Proxies and the Crisis in Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 79-86. Tallinn: NATO CCD COE Publication, 2015.

Maurer, Tim. “The New Norms: Global Cyber-Security Agreements Face Challenges.” Jane’s Intelligence Review. February 5, 2016.

Maurer, Tim and Robert Morgus. “Tipping the Scale: An Analysis of Global Swing States in the Internet Governance Debate.” Paper No. 7, CIGI. 2014.

Maurer, Tim and Robert Morgus. “Compilation of Existing Cybersecurity and Information Security Related Definitions.” New America. October 2014.

Maurer, Tim, Robert Morgus, Isabel Skierka, and Mirko Hohmann. “Technological Sovereignty: Missing the Point?” New America and the Global Public Policy Institute. 2013.

Mazanec, Brian M. and Bradley A. Thayer. “Cyber Warfare: Is Deterrence an Option?” Cicero Foundation Great Debate paper No. 15/03, May 2015.

McAfee, and Good Harbor Consulting, LLC, comps. Virtual Criminology Report 2009. Report. 2009.


McFadyen, Rebecca C. E. “Protecting the Nation’s Cyber Infrastructure: Is the Department of Homeland Security Our Nation’s Savior or the Albatross around Our Neck?” I/S: A Journal of Law and Policy for the Information Society 5, no. 2 (2009): 319-379.

McReynolds, Joe. “Cyber Transparency for Thee, but Not for Me.” The Jamestown Foundation. 2014.

McReynolds, Joe. “China’s Evolving Perspectives on Network Warfare: Lessons from the Science of Military Strategy.” The Jamestown Foundation. 2015.

McReynolds, Joe. “Network Warfare in China’s 2015 Defense White Paper.” The Jamestown Foundation. 2015.

Medvedev, Sergei A. “Offense-Defense Theory Analysis of Russian Cyber Capability.” Master’s Thesis, Naval Postgraduate School, 2015.

Meyer, Paul. “Outer Space and cyberspace: A Tale of Two Security Realms.” In International Cyber Norms: Legal, Policy & Industry Perspectives edited by Anna-Maria Osula and Henry Rõigas, NATO CCD COE Publication, Tallinn, 2016.

Moens, Alexander, Seychelle Cushing and Alan W. Dowd. “Cybersecurity Challenges.” Fraser Institute, March 2016.

Morgan, Patrick M. “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm.” In Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, edited by Patrick M. Morgan, 56-76. Irvine: University of California, 2010.

Morgan, Patrick M. “The State of Deterrence in International Politics Today.” Contemporary Security Policy 33, no. 1 (April 2012): 85-107.

Morgus, Robert, Isabel Skierka, Mirko Hohmann, Tim Maurer. “National CSIRTs and Their Role in Computer Security Incident Response.” New America. November 19, 2015.

Nagy, Viktor. “The geostrategic struggle in cyberspace between the United States, China, and Russia.” Security 11, no. 1 (2012): 13-26.

Negroponte, John D. and Samuel J. Palmisano, Chairs; Adam Segal, Project Director. “Defending an Open, Global, Secure, and Resilient Internet.” Independent Task Force Report No. 70. Council on Foreign Relations. June 2013.

Noor, Elina. “Cyberwarfare: Logged and loaded, but wither Asia?” NTS Insight, No IN13-05, RSIS Centre for Non-Traditional Security Studies, Singapore, 2013.

Noor, Elina. “International Dimensions of National (In)Security Concepts, Challenges and Ways Forward: Cyber Security.” Presented at the 9th Berlin Conference on Asian Security (BCAS), Berlin, June 14-16, 2015.

Noor, Elina. “Strategic Governance of Cyber Security: Implications for East Asia.” In Navigating Change: ASEAN-Japan Strategic Partnership in East Asia and Global Governance edited by Rizal Sukma and Yoshihide Soeya, 150-163. Tokyo: Japan Center for International Exchange, 2015.

Noor, Elina. “The Problem with Cyber Terrorism.” In SEARCCT’s Selection of Articles Vol. 2, 51-64. 2011.

Pakharenko, Glib. “Cyber Operations at Maidan: A First-Hand Account.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 59-66. Tallinn: NATO CCD COE Publication, 2015.

Papay, Michael L., Frank J. Cilluffo, Sharon L. Cardash. “Raising the Bar on Cybersecurity and Acquisition.” Northrop Grumman and the George Washington University Cybersecurity Initiative. October 2014.

Past, Liisa. “Missing in Action: Rhetoric on Cyber Warfare.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 95-102. Tallinn: NATO CCD COE Publication, 2015.

Pawlak, Patryk. “Capacity Building in Cyberspace as an Instrument of Foreign Policy.” Global Policy 7, no. 1 (2016): 83-92.

Pawlak, Patryk. “Confidence-Building Measures in Cyberspace: Current Debates and Trends.” In International Cyber Norms: Legal, Policy & Industry Perspectives, edited by Anna-Maria Osula and Henry Rõigas, 129-153. Tallinn: NATO CCD COE Publication, 2016.

Pawlak, Patryk and Catherine Sheahan. “The EU and its (cyber) partnerships.” European Institute for Security Studies. 2014.

Pernik, Piret, Jesse Wojtkowiak, and Alex Verschoor-Kirss. “National Cyber Security Organization: United States.” NATO CCD COE Publication, Tallinn, 2016.

Pihelgas, Manuo (Ed.). “Mitigating Risks Arising from False-Flag and No-Flag Cyber Attacks.” NATO CCD COE Publication, Tallinn, 2015.

Raymond, Mark. “Applying Old Rules to New Cases: International Law in the Cyber Domain.” Presented to the International Studies Association, Atlanta, Georgia, March 16-19, 2016.

Rid, Thomas. “Cyber War Will Not Take Place.” Journal for Strategic Studies 35, (October 2011): 5-32.

Rid, Thomas. “Cryptopolitik and the Darknet.” Survival 58, no. 1 (February-March 2016): 7-38.

Rid, Thomas and Ben Buchanan. “Attributing Cyber Attacks.” Journal of Strategic Studies 38, no.1-2 (2015): 4-37.

Rid, Thomas and Peter McBurney. “Cyber Weapons.” The RUSI Journal 157, no. 1 (2012): 6-13.

Rivera, Jason. “Understanding and Countering Nation-State Use of Protracted Unconventional Warfare.” Small Wars Journal 10, no. 10 (2014).

Rivera, Jason. “Achieving Cyberdeterrence and the Ability of Small States to Hold Large States at Risk.” Presented at the 7th International Conference on Cyber Conflict, Tallinn, Estonia, 2015.

Rivera, Jason, and Forrest Hare. “The Deployment of Attribution Agnostic Cyberdefense Constructs and Internally Based Cyberthreat Countermeasures.” Presented at the 6th International Conference on Cyber Conflict, Tallinn, Estonia, 2014.

Roberts, Shawn. “Cyber Wars: Applying Conventional Laws of War to Cyber Warfare and Non-State Actors.” Northern Kentucky Law Review 41, (2014): 535-572.

Rõigas, Henry. “The Ukraine Crisis as a Test for Proposed Cyber Norms.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 135-144. Tallinn: NATO CCD COE Publication, 2015.

Schmidt, Laura. “Perspective on 2015 DoD Cyber Strategy: Testimony before the House Armed Services Committee.” RAND Corporation. CT-439. 2015.

Schmitt, Michael N. “Tallinn Manual on the International Law Applicable to Cyber Warfare.” New York: Cambridge University Press, 2009. 

Schmitt, Michael N. “Cyber Operations and the Jus Ad Bellum Revisited.” Villanova Law Review 56, (2011): 569-605.

Schmitt, Michael N. “Classification of Cyber Conflict.” International Law Studies 89, (2013): 233-251.

Schmitt, Michael N. “’Below the Threshold’ Cyber Operations: The Countermeasures Response Option and International Law.” Virginia Journal of International Law 54, (2014): 697-732.

Schmitt, Michael N. “The Law of Cyber Warfare: Quo Vadis?” Stanford Law & Policy Review 25, (2014): 269-299.

Schmitt, Michael N. “The Law of Cyber Targeting.” Tallinn Paper No. 7, NATO CCD COE Publication, Tallinn, 2015.

Schmitt, Michael N. and Liis Vihul. “Proxy Wars in Cyberspace.” Fletcher Security Review 1, no. 2 (Spring 2014): 55-73.

Schmitt, Michael N. and Liis Vihul. “The Nature of International Law Cyber Norms.” Tallinn Paper No. 5. NATO CCD COE, Tallinn, 2014.

Schwartz, Ari and Rob Knake. “Government’s Role in Vulnerability Disclosure:  Creating a Permanent and Accountable Vulnerability Equities Process.” Belfer Center for Science and International Affairs. June 2016.

Segal, Adam. “Policy Innovation Memorandum No. 2: Cyberspace governance: The Next Step.” Council on Foreign Relations. 2011.

Segal, Adam. The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital AgeNew York: PublicAffairs, 2016.

Segal, Adam and Tang Lan. “Reducing and Managing U.S.-China Conflict in Cyberspace.” In U.S.-China Relations in Strategic Domains. National Bureau of Asian Research. 2016.

Shadowserver Foundation. Shadows in the Cloud: Investigating Cyber Espionage 2.0. Report. Compiled by Information Warfare Monitor. April 6, 2010.

Sheldon, John B. “State of the Art: Attackers and Targets in Cyberspace.” Journal of Military and Strategic Studies 14, no. 2 (2012): 1-19.

Skierka, Isabel, Robert Morgus, Mirko Hohmann, Tim Maurer. “CSIRT Basics for Policy-Makers.” New America. April 29, 2015.

Solis, Gary D. “Cyber Warfare.” Military Law Review 219, (Spring 2014): 1-52.

Stevens, Tim. “A Cyberwar of Ideas? Deterrence and Norms in Cyberspace.” Contemporary Security Policy 33. (April 2012): 148-170.

Stiennon, Richard. Surviving Cyberwar. Lanham, MD: Government Institutes, 2010.

Stiennon, Richard. “Security Analytics: Essential Cyber Defense Capabilities.” Security Current. April 22, 2014.

Stinissen, Jan. “A Legal Framework for Cyber Operations in Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 123-134. Tallinn: NATO CCD COE Publication, 2015.

Sukumar, Arun Mohan. “India’s Internet Diplomacy: Reading the Tea Leaves.” Council on Foreign Relations. July 2015.

Sukumar, Arun Mohan and R.K. Sharma. “The Cyber Command: Upgrading India’s National Security Architecture.” Observer Research Foundation. March 2016.

Sukumar, Arun Mohan. “Where are US-India Cyber Relations Headed?” Lawfare. May 2016.

Tang, Lan. “China’s Perspective.” In Crux of Asia:  China, India, and the Emerging Global Order, edited by Ashley J. Tellis and Sean Mirski, 185-194. Washington, DC: Carnegie Endowment for International Peace, 2013.

Tang, Lan and Zhang Xin. “Can Cyber Deterrence Work?” In Global Cyber Deterrence: Views from China, the U.S., Russia, India, and Norway, ed. Andrew Nagorski, 1-3. EastWest Institute, 2010. 

Thomas, Timothy L. "Google Confronts China’s “Three Warfares." Parameters, Summer 2010, 101-12.

Tikk-Ringas, Eneken. “Developments in the Field of Information and Telecommunication in the Context of International Security: Work of the UN First Committee 1998-2012”. ICT4Peace Publishing, Geneva. 2012.

Tikk-Ringas, Eneken. “The Implications of Mandates in International Cyber Affairs”. Georgetown Journal of International Affairs, (2012): 41–48.

Tikk-Ringas, Eneken. “Cyber power in the Gulf.” The International Institute for Strategic Studies. December 5, 2013.

"Tracking Ghostnet: Investigating a Cyber Espionage Network." Information Warfare Monitor. March 29, 2009.

Unwala, Azhar and Shaheen Ghori. “Brandishing the Cybered Bear: Information War and the Russia-Ukraine Conflict.” Military Cyber Affairs 1, no. 1 (2015): 1-11.

Valeriano, Brandon and Ryan C. Maness. “Cyberwar and Rivalry: The Dynamics of Cyber Conflict between Antagonists, 2001-2011.” Western Political Science Association, 2012.

Valeriano, Brandon and Ryan C. Maness. “The Dynamics of Cyber Conflict between Rival Antagonists” In Cyber Hype versus Cyber Reality: Restraint and Norms in Cyber Conflict by Brandon Valeriano and Ryan C. Maness, 68-104. New York: Oxford University Press, 2015.

van der Meer, Sico. “Foreign Policy Responses to International Cyber-attacks: Some Lessons Learned.” Clingendael. 2015.

van der Meer, Sico and Frans Paul van der Putten. “US Deterrence against Chinese Cyber Espionage.” Clingendael. 2015.

van der Meulen, Nicole. "How Organizations Invest in Cybersecurity." Exploring Investment in Cybersecurity. RAND Corporation. February 11, 2016.

van der Meulen, Nicole, Eun Jo, and Stefan Soesanto. "Exploring Cybersecurity Threats and Policy Responses in the EU and Beyond." RAND Corporation. 2015.

Vishik, Claire, Mihoko Matsubara and Audrey Plonk. “Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber Security Norms.” In International Cyber Norms: Legal, Policy & Industry Perspectives edited by Anna-Maria Osula and Henry Rõigas, NATO CCD COE Publication, Tallinn, 2016.

Walker, Paul A. “Law of the Horse to Law of the Submarine: The Future of State Behavior in Cyberspace.” Presented at the 7th International Conference on Cyber Conflict, Tallinn, Estonia, 2015.

Wang, Yuzhu. “Understanding the Real Concern of China’s Cyber Security Strategy.” Shanghai Institutes for International Studies. 2015.

Waters, Gary. “Pressing issues for the 2015 Defence White Paper.” Kokoda Foundation. 2014.

Watts, Sean. “Low-Intensity computer Network Attack and Self-Defense.” International Law Studies 87, (2011): 59-87.

Watts, Sean. “The Nation of Competency in Cyber Warfare.” Presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia, 2012.

Watts, Sean. “Cyber Law Development and the United States Law of War Manual.” In International Cyber Norms: Legal, Policy & Industry Perspectives edited by Anna-Maria Osula and Henry Rõigas, NATO CCD COE Publication, Tallinn, 2016.

Waxman, Matthew C. “Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4).” Yale Journal of International Law 36, (2011): 421-459.

Waxman, Matthew C. “Self-defensive Force against Cyber Attacks: Legal, Strategic and Political Dimensions.” International Law Studies 89, (2013): 109-122.

Weedon, Jen. “Beyond ‘Cyber War’” Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 67-78. Tallinn: NATO CCD COE Publication, 2015.

Whyte, Christopher. “On the Future of Order in Cyberspace.” Strategic Studies Quarterly, (Summer 2015): 69-77.

Whyte, Christopher. “Power and Predation in Cyberspace.” Strategic Studies Quarterly, (Spring 2015): 100-118.

Wirtz, James J. “Cyber War and Strategic Culture:  The Russian Integration of Cyber Power into Grand Strategy.” In Cyber War in Perspective: Russian Aggression against Ukraine, ed. Kenneth Geers, 29-38. Tallinn: NATO CCD COE Publication, 2015.

Wong, Tiong Pern. “Active Cyber Defense: Enhancing National Cyber Defense.” Master’s thesis, Navy Postgraduate School, 2011.

Yamin, Tughral. “Developing Information-Space Confidence Building Measures (CBMs) between India and Pakistan.” Sandia National Laboratories, Report SAND2014-4934, 2014.

Yi, Shen. “Cyber Sovereignty and the Governance of Global Cyberspace.” Chinese Political Science Review 1, (2016): 81-93

Yu, Peter K. “Trade Secret Hacking, Online Data Breaches, and China’s Cyberthreats.” Cardozo Law Review, (DE•NOVO 2015): 130-150.

Zhang, Li. “A Chinese Perspective on Cyber War.” International Review of the Red Cross 94, no. 886 (2012): 801-807.

Zheng, Denise E. and James A. Lewis. “Cyber Threat Information Sharing.” Center for Strategic and International Studies. March 2015.

Zheng, Denise E. and William A. Carter. “The Evolution of Cybersecurity Requirements for the U.S. Financial Industry.” Center for Strategic and International Studies. July 2015.

Zheng, Denise E. and William A. Carter. “Leveraging the Internet of Things for a More Efficient and Effective Military.” Center for Strategic and International Studies. September 2015.

Ziolkowski, Katharina. “Confidence Building Measures for Cyberspace – Legal Implications.” NATO CCD COE Publication, Tallinn, 2013.