共 9 条
- [1] Public–private partnerships in national cyber‐security strategies[J] . MADELINE CARR.International Affairs . 2016 (1)
- [2] A U.S.-China Grand Bargain? The Hard Choice between Military Competition and Accommodation[J] . Charles L. Glaser.International Security . 2015 (4)
- [3] Contest and conquest: Russia and global internet governance[J] . JULIEN NOCETTI.International Affairs . 2015 (1)
- [4] Attributing Cyber Attacks[J] . Thomas Rid,Ben Buchanan.Journal of Strategic Studies . 2015 (1-2)
- [5] The Impact of China on Cybersecurity: Fiction and Friction[J] . Jon R. Lindsay.International Security . 2014 (3)
- [7] Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War[J] . AdamP. Liff.Journal of Strategic Studies . 2012 (3)
- [8] Use of the Internet by Terrorists – A Threat Analysis –[J] . Centre of Excellence Defence Against Terrorism, Ankara, Turkey,Phillip W. Brunst.NATO Science for Peace and Security Series, E: Hu . 2008
- [9] Identity Theft Resource Center Breach Report Hits Near Record High in 2015. Identity Theft Resource Center. http://www.idtheftcenter.org/ITRC-Surveys-Studies/2015databreaches.html . 2016