Cyber strategy article bank, with full text of cyber security research papers.
Last updated 12 May 2021
Operation Security (OPSEC)
PDF Yuill, J., Denning, D., and Feer, F., “Using Deception to Hide Things from Hackers,” Journal of Information Warfare, Vol. 5, No. 3, 2006, pp. 26-40.
PDF Denning, D. E., “Information Operations and Terrorism.”
Yuill, J., Zappe, M., Denning, D., and Freer, F., “Honeyfiles: Deceptive Files for Intrusion Detection,”Proc. IEEE Workshop on Information Assurance, U.S. Military Academy, West Point, NY, June 2004.
Cyber attacks as a tool in foreign policy
Denning, D. E., “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy,” Nautilus Institute. A revised version appeared in The Computer Security Journal, Vol. XVI, No. 3, Summer 2000, pp. 15-35. A further revision appeared in Networks and Netwars : The Future of Terror, Crime, and Militancy, J. Arquilla and D. F. Ronfeldt (eds), 2001, pp. 239-288.
PDF Wondracek, Holz, et al., A practical attack to de-anonymize social network users
PDF Alexander, K. B. (2007). Warfighting in cyberspace. Joint Forces Quarterly, 3rd Quarter(46), 58-61.
PDF Richard M. Crowell, War in the Information Age, US Army War College
Book reissued in 2021 Denning, D. E., “The Internet and the Iraq Conflict,” in The Three Circles of War: Understanding the Dynamics of Conflict in Iraq, (H. S. Gregg, H. S. Rothstein, and J. Arquilla, eds.)Washington DC: Potomac, 2010.
Read Online Denning, D. E., “Terror’s Web: How the Internet is Transforming Terrorism,” to appear in Handbook on Internet Crime (Y. Jewkes and M. Yar, eds.), Willan Publishing, 2010.
Read Online Denning, D. E., “The Web Ushers In New Weapons of War and Terrorism,” Scientific American, August 18, 2008.
Read Online Kinniburgh, J. and Denning, D. E., “Blogs and Military Information Strategy,” IO Sphere, Joint Information Operations Center, Summer 2006, pp. 5-13.
PDF Denning, D. E., “Barriers to Entry: Are They Lower for Cyber Warfare?” IO Journal, April 2009.
PDF Denning, D. E., “Assessing the CNO Threat of Foreign Countries,” in Information Strategy and Warfare(J. Arquilla and D. Borer eds.), Routledge, 2007.
PDF Denning, D. E., “The Ethics of Cyber Conflict,” in Information and Computer Ethics (K. E. Himma and H. T. Tavani eds.), Wiley, 2007.
PDF Denning, D. E., “A View of Cyberterrorism Five Years Later,” Readings in Internet Security: Hacking, Counterhacking, and Society (K. Himma ed.), Jones and Bartlett Publishers, Boston, 2006.
PDF Denning, D. E., “Cyberwarriors,” Harvard International Review, Summer 2001, pp. 70-75.
PDF Denning, D. E., “Obstacles and Options for Cyber Arms Control,” proceedings of Arms Control in Cyberspace, Heinrich Böll Foundation, Berlin, Germany, June 29-30, 2001.
- Author: Cyber Loop Editor
- Bookmark: /academic-papers/cyber-strategy-article-bank.html
- License: Attribution-NonCommercial-ShareAlike 4.0 International（CC BY-NC-SA）