Since the cyber realm has become a prevalent area in society, states have been developing ways to use this realm to their advantage. Popular literature asserts that cyber attacks are equalizing, frequently-occurring events that make them “revolutionary” tools of warfare; however, this study hypothesizes that cyber operations are not as revolutionary as the literature asserts. This study examines the revolutionary capabilities of offensive cyber operations by studying documented cases of state-sponsored offensive cyber operations from 2005-2019. By utilizing statistical methods, first the paper examines the documented cases and analyzes which states conduct most of these operations. Then, the paper will use statistical methods to examine the...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is g...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
This study identifies and explains variation in how states behave in the new security environment of...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
This study identifies and explains variation in how states behave in the new security environment of...
Cyber-attacks have increased since the 1988-Morris worm and can target any connected device from any...
This article addresses the rise in state-sponsored cyber attacks over the past three decades and pro...
This article addresses the rise in state-sponsored cyber attacks over the past three decades and pro...
Cyber-attacks have increased since the 1988-Morris worm and can target any connected device from any...
Recent cyber defense studies has shown that there is a qualitative increase in the numbers of cyber-...
How have military cyber operations, a diverse set of activities that often differ little from civili...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is g...
The United States is heavily reliant on information technology and cyberspace to function at the soc...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
This study identifies and explains variation in how states behave in the new security environment of...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
This study identifies and explains variation in how states behave in the new security environment of...
Cyber-attacks have increased since the 1988-Morris worm and can target any connected device from any...
This article addresses the rise in state-sponsored cyber attacks over the past three decades and pro...
This article addresses the rise in state-sponsored cyber attacks over the past three decades and pro...
Cyber-attacks have increased since the 1988-Morris worm and can target any connected device from any...
Recent cyber defense studies has shown that there is a qualitative increase in the numbers of cyber-...
How have military cyber operations, a diverse set of activities that often differ little from civili...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is g...
The United States is heavily reliant on information technology and cyberspace to function at the soc...