Sam Liles partial bibliography of cyber-warfare topics

2010/02/15 cyber-warfare 37222 words, 107 min of reading

Sam Liles published a good bibliography of cyber-warfare topics back in 2007 on his blog at selil.com.

The list below is published with his permission.


U.S. Policy and low intensity-conflict: Potentials for military struggles in the 1980’s (1981). New York: Transaction Books.

Low-intensity conflict and modern technology (1986). Maxwell Air Force Base, Alabama: Air University Press.

Low-intensity conflict: The pattern of warfare in the modern world (1989). Lexington, Massachusetts: Lexington Books.

In Athena’s camp: Preparing for conflict in the information age (1997). Santa Monica, CA: RAND.

Presidential Decision Directive/NSC-63 (1998). Retrieved November 1, 2007, from http://www.fas.org/irp/offdocs/pdd/pdd-63.htm

The changing role of information in warfare (1999). Santa Monica, CA: RAND.

A nation transformed by information: How information has shaped the United States from colonial times to the present (2000). New York: Oxford University Press.

Leadership: The warriors art (2001). Carlisle, Pennsylvania: Army War College Foundation Press.

The transnational dimension of cyber crime and terrorism (2001). Stanford, CA: Hoover Institution Press.

Homeland Security Presidential Directive/Hspd-7 (2003). Retrieved November 1, 2007, from http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html

Information operations: Warfare and the hard reality of soft power (2004). Dulles, VA: Brasseys Inc.

A concept for distributed operations (2005). (pp. 8): Department of the Navy Headquarters U.S. Marine Corps.

Joint publications 3-13: Information Operations (2006). United States Government.

The U.S. Army Marine Corps counterinsurgency field manual: US Army field manual No. 3-24 Marine Corps war-fighting publication No. 3-33.5 (2007). Chicago: University of Chicago Press.

China spying ‘biggest US threat’ (2007, November 15, 2007). International Version. Retrieved November 15, 2007, from http://news.bbc.co.uk/2/hi/americas/7097296.stm

China denies Pentagon cyber-raid (2007, September 4, 2007). International Version. Retrieved November 16, 2007, from http://news.bbc.co.uk/2/hi/americas/6977533.stm

Adam, A. E. (2004). Hacking into hacking: Gender and the hacker phenomenon. ACM SIGCAS Computers and Society, 32(7).

Adams, T. K. (1998). Radical destabilizing effects of new technologies. Parameters, 1998(Autumn), 99-111.

Adkins, M., Kruse, J., & Younger, R. (2002). Ubiquitous computing: Omnipresent technology in support of network centric warfare. Paper presented at the 35th Hawaii International Conference of Systems Sciences, Hawaii.

Alexander, K. B. (2007). Warfighting in cyberspace. Joint Forces Quarterly, 3rd Quarter(46), 58-61.

Anderson, P. S. (2008). Critical infrastructure protection in the information age Retrieved June 1, 2008, from http://lirne.net/resources/netknowledge/anderson.pdf

Arquilla, J., & Ronfeldt, D. (1997). XXXX TBD XXX A new epoch and spectrum of conflict. In J. Arquilla & D. Ronfeldt (Eds.), In Athena’s camp: Preparing for conflict in the information age (pp. 501). Santa Monica, CA: RAND.

Arquilla, J., & Ronfeldt, D. (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: RAND.

Augustine, N. R. (1986). Land Warfare. IEEE Transaction on Aerospace and Electronic Systems, AES-22(September), 487-512.

Bailey, M., Cooke, E., Jahanian, F., Provos, N., Rosaen, K., & Watson, D. (2005). Data reduction for the scalable automated anlaysis of distributed darknet traffic. Paper presented at the Internet Measurement Conference, Berkley, CA.

Baker, J. (2006). Systems thinking and counterinsurgencies. Parameters, 2006(Winter), 26-43.

Bakken, D. E., Rupa, P., Blough, D. M., Franz, A. A., & Palmer, T. J. (2004). Anonymity and desensitization of usable data sets. IEEE Security and Privacy November/December, 34-40.

Barno, D. (2006). Challenges in fighting a global insurgency. Parameters, 2006(Summer), 15-29.

Bayles, W. J. (2001). The ethics of computer network attack. Parameters, 2001(Spring), 44-58.

Becker, J. (1980). Computer crime career of the future? Computer Careers Magazine, October.

Berinato, S. (2007, May 31, 2007). How online criminals make themselves tough to find, near impossible to nab. CIO Retrieved October 1, 2008, from http://www.cio.com/article/114550/How_Online_Criminals_Make_Themselves_Tough_to_Find_Near_Impossible_to_Nab

Berkowitz, B. D. (2003). The new face of war: How war will be fought in the 21st century. New York: Free Press.

Berkowitz, B. D., & Goodman, A. E. (1989). Strategic intelligence for American national security. Princeton, New Jersey: Princeton University Press.

Betts, R. K. (1998). Intelligence warning: Old problems, new agendas. Parameters, 1998(Spring), 26-35.

Bhaskar, R. (2006). State and local law enforcement is not ready for a cyber Katrina. Communications of the ACM, 49(2), 81-83.

Bishop, M. (2006). Teaching context in information secuirty. ACM Journal of educational resources in computing, 6(3).

Bishop, M. (2006). China’s cyber warriors. Foreign Policy.

Blank, S. (2003). Rethinking asymmetric threats. Carlisle, PA: Stategic Studies Insitute U.S. Army War College.

Blank, S., Grinter, L. E., Magyar, K. P., Ware, L. B., & Weathers, B. E. (1990). Responding to low-intensity conflict challenges. Maxwell Air Force Base, Alabama: Air University Press.

Bracken, P. (2006). Net assessment: A practical guide. Parameters, 2006(Spring), 90-100.

Bradenburger, A. M., & Nalebuff, B. J. (1995). The right game: Use game theory to shape strategy. Harvard Business Review(July-August), 57-71.

Brenner, B. (2005). Myfip’s Titan Rain connection Retrieved November 17, 2007, from http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1120855,00.html

Bridis, T. (2005). CIA overseeing 3-day war game on Internet. Associated Press,

Brooks, P. (2000). A vision of PSYOP in the information age. Special Warfare(Winter).

Brophy, E. (2002). The outlaw ‘Net’: Opposition to IANN’s new Internet order. ACM SIGCAS Computers and Society, 32(4).

Brubaker, J. R. (2005). Low-intensity cultural conflict: Critical art, terrorism and the neurolinguistic environment. Anthropology of Complex Societies, 2005(Spring), 1-7.

Bunker, R. (1996 ). Generations, waves, epochs: Modes of warfare and the RPMA. Airpower Journal(Spring), 1-10.

Burton, A. M., Schofield, D., & Goodwin, L. M. (2005). Gates of global perception: Forensic graphics for evidence presentation. Paper presented at the 13th annual ACM International Conference on Multimedia, Singapore.

Byres, E., & Lowe, J. (2004). The myths and facts behind cyber security risks for industrial control systems. Paper presented at the VDE Congress, Berlin, Germany.

Cahill, T. P., Rozinov, K., & Mule, C. (2003). Cyber warfare peacekeeping. Paper presented at the Workshop on Information Assurance and Security, United States Military Academy, West Point, NY.

Caloyannides, M. (2003). Privacy vs. information technology. IEEE Security and Privacy, January/February.

Ceruti, M. G. (2001). Mobile agents in network-centric warfare. Paper presented at the 5th International Autonomous Decentralized Systems, Dallas, TX.

Chambliss, S. (2005). We have not correctly framed the debate on intelligence reform. Parameters, 2005(Spring), 5-13.

Claburn, T. (2008). CIA admits cyber attacks blacked out cities Retrieved October 1, 2008, from http://www.informationweek.com/news/internet/showArticle.jhtml?articleID=205901631

Clark, R. M. (2004). Intelligence analysis a target-centric approach. Washington D.C: CQ Press.

Clarke, R. A. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498-512.

Clausewitz, C. V. (1982). On war (A. Rapoport, Trans.). London: Penguin Books.

Clausewitz, C. V. (2003). Principles of war. Minneola, New York: Dover Publication.

Cogan, K. J. (2007). A view of command, control, communications, and computer architectures at the dawn of network centric warfare. Issue Paper Center for Strategic Leadership, 2-07.

Coldwell, R. A. (1993). University students’ attitudes towards computer crime: A research note. Computers and Society, 23(1-2).

Collett, S. (2005). Precious Cargo Retrieved November 17, 2007, from http://www.csoonline.com/read/080105/cargo.html

Cook, J. M. (1986). What C.S. graduates don’t learn about security concepts and ethical standards or- “Every company has its share of damn fools. Now every damn fool has access to a computer”. ACM SIGCSE Bulletin, 18(1), 89-96.

Cooper, J. R. (2005). Curing analytic pathologies: Pathways to improved intelligence analysis. Washington D.C. : Center for Study of Intelligence, Central Intelligence Agency.

Cooper, S. (2006). China’s secret war. Popular Mechanics, August.

Corn, D. (1996). Pentagon trolls the net. The Nation, March 4.

Cronin, A. K. (2006). Cyber-mobilization: The new leve’e en masse. Parameters, 2006(Summer), 77-87.

Curran, K., Morrissey, C., Fagan, C., Murphy, C., O’Donnell, B., Fitzpatrick, G., et al. (2005). Monitoring hacker activity with a honeynet. International Journal of Network Management, 15(January), 123-134.

Czerwinski, T. J. (1996). Command and control at the crossroads. Parameters, 1996(Autumn), 121-132.

Damian, D. E., & Zowghi, D. (2003). An insight into the interplay between culture, conflict, and distance in globally distributed requirements negotiations. Paper presented at the 36th Hawaii International Conference on System Sciences, Oahu, Hawaii.

Dartnell, M. Y. (2006). Insurgency online: Web activism and global conflict. Toronto: University Toronto Press.

Dean, D. J. (1986). The Air Force role in low-intensity conflict. Maxwell Air Force Base, Alabama: Air University Press.

Denning, D. E. (1999). Information warfare and security. New York: Addison Wesley.

Denning, D. E. (2000). Cyberterrorism Retrieved November 1, 2007, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html

Denning, P., Parker, D. B., Nycum, S. H., & Ware, W. H. (1984). Computers, crime and privacy a national dilemma: Congressional testimony from the industry. Communications of the ACM, 27(4), 312-321.

Deptula, D. A., & Brown, G. (2008). A house divided: The indivisibility of intelligence, surveillance, and reconnaissance. Air & Space Power Journal, Summer, 1-8.

Dion, E. (2004). The e-Forces!: The evolution of battle-groupings in the face of 21st century challenges. Canadian Army Journal(7), 3.

Djemaiel, Y., & Boudriga, N. (2007). A global marking scheme for tracing cyber attacks. Paper presented at the Symposium on Applied Computing, Seoul Korea.

Doyle, C. (2008). Cybercrime: An overview of the federal computer fraud and abuse statute and related federal criminal laws. Congressional Research Service: Library of Congress.

Dresher, M. (1981). The mathematics of games of strategy: Theory and applications. New York: Dover.

Drogin, B. (1999, October 7). Russians seem to be hacking into Pentagon: Sensitive information taken–but nothing top secret. SFGate.com,

Dudenhoeffer, D., Miller, C., & Manic, M. (2007, Summer). Interdependency modeling and emergency response. Paper presented at the Summer Computer Simulation Conference, San Diego, CA.

Dulles, A. W. (2006). The craft of intelligence: America’s legendary spy master on the fundamentals of intelligence gather for a free world. Guilford, CT: Lyons Press.

Dunlap, C. (1997). 21st century land warfare: Four dangerous myths. Parameters, 1997(Autumn), 27-37.

Dunnigan, J. F. (2000). Wargames handbook: How to play and design commercial and professional wargames (Third ed.). New York: Writers Club Press.

Echevarria, A. (2005). Fourth-generation war and other myths. Strategic Studies Institute: United States Army War College.

Elbirt, A. J. (2003). Information warfare: Are you at risk. IEEE Technology and Society Magazine(Winter), 13-19.

Endicott-Popovsky, B., Frincke, D. A., & Taylor, C. A. (2997). A theoretical framework for organizational network forensic readiness. Journal of Computers, 2(3), 1-11.

Erbacher, R. F. (2005). Extending command and control infrastructures to cyber warfare assets. Paper presented at the Workshop on Information Assurance and Security United States Military Academy, West Point, NY.

Erbschloe, M. (2001). Information warfare: How to survive cyber attacks. Berkley California: Osborne/McGraw Hill.

Espiner, T. (2005, November 23, 2005). Security experts lift lid on Chinese hack attacks Retrieved November 17, 2007, 2007, from http://news.zdnet.com/2100-1009_22-5969516.html

Evron, G. (2008). Battling botnets and online mobs: Estonia’s defense efforts during the Internet war. Georgetown Journal of International Affairs(Winter/Spring), 121-126.

Falk, C. (2004). Gray hat hacking: Morally black and white. Center for Educationa and Research in Informaiton Assurance and Security: Purdue University.

Fleming, B. (2004). Can reading Clausewitz save us from future mistakes. Parameters, 2004(Spring), 62-76.

Forno, R., & Baklarz, R. (1997). The art of information warfare: Insight into the knowledge warrior philosophy. Dunkirk, MD: Universal Publishers.

Franz, T., Durkin, M., Williams, P., Baines, R., & Mills, R. (2007). Defining information operations forces. Air & Space Power Journal(Summer), 1-11.

Friedman, T. L. (1999). The Lexus and the olive tree: Understanding globalization. New York: FSG Books.

Fuxman, A., Giorgini, P., Kolp, M., & Mylopoulos, J. (2001). Information systems as social structures. Paper presented at the The International Conference on Formal Ontology in Information Systems, Ogunquit, Maine, USA.

Gal-Or, E., & Ghose, A. (2004). Chapter 8: The economic consequences of sharing security information Advances in Information Security (Vol. 12): Springer US.

Gallagher, C. J. J. (1992). Low-intensity conflict: A guide for tactics, techniques, and procedures. Mechanicsburg, PA: Stackpole Books.

Galliers, R. D., & Land, F. F. (1987). Choosing appropriate information systems research methodologies. Communications of the ACM, 30(11), 900-902.

Gantz, J., & Rochester, J. B. (2005). Pirates of the digital millennium: How the intellectual property wars damage or personal freedoms, our jobs, and the world economy. Upper Saddle River, NJ: Financial Times Prentice Hall.

Gast, A. P. (2003). The impact of restricting information access on science and technology Retrieved October 1, 2008, from http://web.mit.edu/nobel-lectures/homeland_security_impact.pdf

Giacomello, G. (2004). Bangs for the buck: A cost benefit analysis of cyberterrorism. Studies in conflict & terrorism, 27, 387-408.

Gibson, W. (1984). Neuromancer. New York: Ace Books.

Giffin, R. E., & Reid, D. J. (2003, June 17-19). A woven web of guesses, canto one: Network centric warfare and the myth of the new economy. Paper presented at the 8th International Command and Control Research & Technology Symposium, National Defense University, Washington DC.

Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions of information system security, 5(4), 438-457.

Gordon, S. (2003). Cyberterrorism? (pp. 15). Cupertino, CA: Symantec Corporation.

Grabo, C. M. (2004). Anticipating surprise: Analysis for strategic warning. Lanham, Maryland: University Press of America.

Graham, P. (2004). Hackers & painters big ideas from the computer age. Sebestopol, CA: O’Reilly.

Granger, S. (1994). The hacker ethic. Paper presented at the Ethics of the Computer Age, Gatlinburg, TN.

Grant, T. J., Venter, H. S., & Eloff, J. H. P. (2007, October 2-3). Simulating adversarial interactions between intruders and system administrators using OODA-RR. Paper presented at the 2007 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, Port Elizabeth, South Africa.

Grasso, V. B. (2005). Defense outsourcing: The OMB circular A-76 policy. Congressional Research Service: Library of Congress.

Gray, C. S. (2007). Irregular warfare: One nature, many characters. Strategic Studies Quarterly(Winter), 35-57.

Grimmett, R. F. (2006). 9/11 Commission recommendations: Implementation status. Congressional Research Service: Library of Congress.

Groh, J. L. (2008). Network-centric warfare: Leveraging the power of information U.S. Army War College Guide to National Security Issues. Third Edition (Vol. 1, pp. 323-338). Carlisle, PA: Army War College: Strategic Studies Institute.

Gross, L. (1948). The Peace of Westphalia, 1648-1948. The American Jouranl of International Law, 42(1), 20-41.

Grow, B., & Bush, J. (2005). Hacker hunters: An elite force takes on the dark side of computing Retrieved October 1, 2008, from http://www.businessweek.com/magazine/content/05_22/b3935001_mz001.htm

Gupta, A., & Laliberte, S. (2004). Security by example defend I.T. New York: Addison Wesley.

Haffa, R. P., & Patton, J. H. (1998). Gaming the “Systems of Systems”. Parameters, 1998(Spring), 110-121.

Hafiz, M. (2006). McCumber Cube Retrieved February 1, 2009, from http://en.wikipedia.org/wiki/index.html?curid=5372484

Hafner, K., & Lyon, M. (1996). Where wizards stay up late: The origins of the Internet. New York: Simon & Schuster.

Hammes, T. X. (2004). The sling and the stone: On war in the 21st century. St. Paul, Mn: Zenith Press.

Hammes, T. X. (2007). Fourth generation warfare evolves, fifth emerges. Military Review, May-June, 14-23.

Hammonds, G. L. (1993). Confidentiality, integrity, assured service: Tying security all together. Paper presented at the New Security Paradigms Workshop Little Compton, Rhode Island.

Harknet, R. J. (1996). Information warfare and deterrence. Parameters, 1996(Autumn), 93-107.

Harris, S. (2004). Watching people on behalf of Uncle Sam Retrieved March 16, 2004, from http://www.govexec.com/features/0304/0304s1.htm

Harvey, R. (2007). Third baby dies from drug overdose Retrieved November 17, 2007, from http://www.wthr.com/global/story.asp?s=5432058&ClientType=Printable

Henry, R., & Peartree, E. C. (1998). Military theory and information warfare. Parameters, 1998(Autumn), 121-135.

Herman, M. (1998-99). Modeling the revolution in military affairs. Joint Forces Quarterly, Autumn/Winter, 85-90.

Hicks, B. (2004, October 24-28). Transforming avionics architecture to support network centric warfare. Paper presented at the The 23rd Digital Avionics Systems Conference.

Hoffman, F. G. (2007). Conflict in the 21st century: The rise of hybrid wars (pp. 1-72). Arlington, VA: Potomac Institute for Policy Studies.

Hollinger, R. C. (1990). Hackers: Computer heroes or electronic highwaymen? Paper presented at the American Society of Criminology, Baltimore, Maryland.

Hollingsworth, D., & Redmond, T. (2000). Enhancing operating system resistance to information warfare. Paper presented at the 21st Century Military Communications Conference, Los Angeles, California.

Hollis, D. B. (2007). Why states need an international law for information operations. Temple University Beasley School of Law.

Hooker, R. D. (2005). Beyond Vom Kriege: The character and conduct of modern war. Parameters, 2005(Summer), 4-17.

Householder, A., Houle, K., & Dougherty, C. (2002). Computer attack trends challenge internet security. Security & Privacy (Computer), 35(4), 5-7.

Howerton, P. W. (1985). Computer crime: A tutorial. Paper presented at the ACM Annual Conference on the Range of Computing : Mid-80’s Perspective, Denver, Colorado.

Huntington, S. P. (1993). The clash of civilizations? Foreign Affairs, 72(3), 22-49.

Ilett, D. (2005). Security Guru slams misuse of ‘cyberterrorism’ Retrieved November 1, 2007, from http://news.zdnet.com/2100-1009_22-5685500.html

Jackson, G. A. (2004). Open source is the answer. Now what was the question? The Chronicle of Higher Education, September 24, 2004.

Jajodia, S., Ammann, P., & McCollum, C. D. (1999). Surviving information warfare attacks. Computer(April), 57-63.

James, J. R. (2003, January 6-9). Modeling of information dominance in complex systems: A system partitioning and hybrid control framework. Paper presented at the 36th Annual Hawaii International Conference on Systems Sciences.

Jo, K. Y. (1998). Virtual network representations of the information warfare battlespace. Paper presented at the Military Communications Conference, Boston, MA.

Jones, G. (2001). Working with the CIA. Parameters, 2001(Winter), 28-39.

Kahn, D. (1996). The code breakers: The Comprehensive history of secret communication from ancient times to the Internet. New York: Scribner.

Kewley, D. L., & Lowry, J. (2001, June 5-6). Observations on the effects of defense in depth on adversary behavior in cyber warfare. Paper presented at the Workshop on Information Assurance and Security, United States Military Academy, West Point, NY.

Kling, R. (1980). Computer abuse and computer crim as organizational activities. Computer Law Journal, 2(2), 12-24.

Klinger, J. (2006). The social science of Carl von Clausewitz. Parameters, 2006(Spring), 79-89.

Knezo, G. J. (2006). Homeland security research and development funding, organization, and oversight (pp. 1-6). Congressional Research Service: The Library of Congress.

Kumagai, J. (2001). The web as a weapon. IEEE Spectrum(January), 118-121.

Lasker, J. (2005). U.S. military’s elite hacker crew Retrieved October 1, 2008, from http://www.wired.com/politics/security/news/2005/04/67223

Lau, R. W. H., Lam, K.-Y., & Cheung, S.-L. (1996). The failure of anti-hacking legislation: A Hong Kong perspective. Paper presented at the 3rd ACM Conference on Computer and Communications Security, New Delhi, India.

Lee, J. A. N., Segal, G., & Steier, R. (1986). Positive alternatives: A report on an ACM panel on hacking. Communications of the ACM, 29(4), 297-299.

Lemos, R. (2005). Backup tapes are backdoor for ID thieves Retrieved November 17, 2007, from http://www.theregister.co.uk/2005/04/29/backup_tapes_are_backdoor_for_id_thieves/

Lesser, I. O., Hoffman, B., Arquilla, J., Ronfeldt, D., & Zanini, M. (1999). Countering the new terrorism. Santa Monica, CA: RAND.

Levy, S. (1984). Hackers: Heroes of the computer revolution. New York: Penguin Putnam.

Levy, S. (2001). Crypto: How the code rebels beat the government saving privacy in the digital age. New York: Penguin Putnam.

Lewandowski, J. O. (2005, November 6-9). Creating a culture of technical caution: Addressing the issues of security, privacy protection, and the ethical use of technology. Paper presented at the Special Interest Group on University and College Computing Services Conference, Monterey, California.

Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington DC: Center for Strategic & International Studies.

Lewis, J. A. (2005). Computer espionage, Titan Rain, and China. Washington DC: Center for Strategic & International Studies.

Lin, H. (2006). Policy consequences and legal/ethical implications of offensive information operations and cyber attack: National Academies of Science.

Lipinski, T. A. (1999). Information warfare, American style. IEEE Technology and Society Magazine, Spring, 10-15.

Locasto, M. E., Stavrou, A., & Keromytis, A. D. (2006). Dark application communities. Paper presented at the 2006 Workshop on New Security Paradigms, Schloss Dagstuhl, Germany.

Long, A. (2006). On “Other War”: Lesson from five decades of RAND counterinsurgency research. Santa Monica, CA: RAND Corporation.

Lowry, J. (2001). An initial foray into understanding adversary planning and courses of action. Paper presented at the DARPA Information Survivability Conference and Exposition 2, Anaheim, CA.

Luard, T. (2005, July 22, 2005). China’s spies come out from the cold International Version. Retrieved November 16, 2007, from http://news.bbc.co.uk/2/hi/asia-pacific/4704691.stm

Maconachy, W. V., Schou, C. D., Ragsdale, D., & Welch, D. (2001). A Model for Information Assurance: An Integrated Approach. Paper presented at the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY.

Manion, M., & Goodrum, A. (2000). Terrorism or civil disobedience: Towards a hacktivist ethic. Computers and Society, June, 14-19.

Mark, R. (2004). The Internet: ‘A dirty mess’ Retrieved October 1, 2008, from http://www.internetnews.com/bus-news/article.php/3365491

Masse, T. (2006). Homeland security intelligence: Perceptions, statutory definitions, and approaches. Congressional Research Service: Library of Congress.

Masse, T. (2007). Intelligence and information-sharing elements of S. 4 and H.R. 1. Congressional Research Service: Library of Congress.

McCauley-Bell, P., & Freeman, R. (1997). Uncertainty management in information warfare. Paper presented at the IEEE International Conference on Systems, Management, and Cybernetics ‘Computational Cybernetics and Simulation’, Orlando, FL.

McCumber, J. (1991). Information Systems Security: A Comprehensive Model. Paper presented at the 14th National Computer Security Conference, National Institute of Standards and Technology. Baltimore, MD. October.

McCumber, J. (2005). Assessing and managing security risks in IT systems: A structured methodology. Boca Raton, FL: Auerbach.

McLean, J. (1985). A comment on the “Basic Security Theorem” of Bell and LaPadula. Information Processing Letters, 20(2).

McQueen, M. A., Boyer, W. F., Flynn, M. A., & Beitel, G. A. (2005). Time-to-compromise model for cyber risk reduction estimation. Idaho Falls, Idaho: Idaho National Laboratory.

Meigs, M. C. (2003). Unorthodox thoughts about asymmetric warfare. Parameters, 2003(Summer), 4-18.

Meinel, C. P. (2004). Cybercrime treaty could chill research. IEEE Security and Privacy(July/August), 28-32.

Meserve, J. (2007, September 26, 2007). Source: Staged cyber attack reveals vulnerability in power grid Retrieved November 1,, 2007, from http://www.cnn.com/2007/US/09/26/power.at.risk/index.html

Miller, N. L., & Shattuck, L. G. (2006). A dynamic process model for the design and assessment of network centric systems. Paper presented at the Command and Control Research and Technology Symposium: The State of the Art and the State of the Practice, Monterey, California.

Mink, M., & Freiling, F. C. (2006). Is attack better than defense? Teaching information security the right way. Paper presented at the 3rd Annual Conference on Information Security Curriculum Development, Kennesaw, Georgia.

Mitnick, K. D., & Simon, W. (2002). The art of deception: Controlling the human element of security. Indianapolis, IN: Wiley Publishing.

Molander, R. C., Riddile, A. S., & Wilson, P. A. (1996). Strategic information warfare: A new face of war. Parameters, 1996(Autumn), 81-92.

Moteff, J. (2006). Critical infrastructure: The national asset database (Vol. RL33648). Congressional Research Service: Library of Congress.

Moteff, J., Copeland, C., & Fischer, J. (2003). Critical infrastructures: What makes an infrastructure critical? (Vol. RL31556). Congressional Research Service: Library of Congress.

Moteff, J. D. (2007). Critical infrastructures: Background, policy, and implementation (Vol. RL30153). Congressional Research Service: Library of Congress.

Mulvenon, J. (2005). Toward a cyberconflict studies research agenda. IEEE Security and Privacy(July/August), 52-55.

Munro, N. (1996). Sketching a national information warfare defense plan. Communications of the ACM, 39(11), 15-17.

Munro, N. (1999). Infowar: AK-47s, lies, and videotape. Communications of the ACM, 42(7), 19-22.

Murdock, P. (2002). Principles of war on the network-centric battlefield: Mass and economy of force. Parameters, 2002(Spring), 86-95.

Murphy, D., & Groh, J. L. (2006). Land power and network-centric operations: How information in today’s battlespace can be exploited (draft). U.S. Army War College: Center for Strategic Leadership.

Myerson, J. M. (2002). Identifying enterprise network vulnerabilities. International Journal of Network Managemetn, 2002(12), 135-144.

National Research Council (2003). Understanding risk: Informing decisions in a democratic society. Washington, D.C.: National Research Council Committee on Risk Characterization.

Neagoe, V., & Bishop, M. (2006). Inconsistency in deception for defense. Paper presented at the 2006 Workshop on New Security Paradigms, Dagstuhl, Germany.

Ning, P., & Xu, D. (2003, October 27-31). Learning attack strategies from intrusion alerts. Paper presented at the 10th ACM Conference on Computer and Communications Security, Washington DC.

Orris, M. (2007). You’ve got hate: Web based terror. Small Wars Journal, 8(May), 2-10.

Padayachee, K. (2002, September 16-18). An interpretive study of software risk management perspectives. Paper presented at the South African Institute of Computer Scientists and Information Technologists, Port Elizabeth, South Africa

Panda, B., & Giordano, J. (1998). An overview of post information warfare data recovery. Paper presented at the Symposium on Applied Computing Atlanta, Georgia.

Panda, B., & Giordano, J. (1999). Defensive information warfare. Communications of the ACM, 42(7), 31-32.

Panda, B., & Yalamanchili, R. (2001). Transaction fusion in the wake of information warfare. Paper presented at the Symposium on Applied Computing, Las Vegas, NV.

Paradis, S., Benaskeur, A., Oxenham, M., & Cutler, P. (2005). Threat evaluation and weapons allocation in network-centric warfare. Paper presented at the 7th International Conference on Information Fusion (FUSION).

Parfomak, P. W. (2007). Vulnerability of concentrated critical infrastructure: Background and policy options (Vol. RL33206). Congressional Research Service: Library of Congress.

Parker, D. B., & Nycum, S. H. (1984). Computer crime. Communications of the ACM, 27(4), 313-321.

Parks, R. C., & Duggan, D. P. (2001). Principles of cyber-warfare. Paper presented at the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY.

Pattee, P. G. (2008). Network-centric operations. Air & Space Power Journal(Spring).

Perl, R. F. (2006). Terrorism and national security: Issues and tends (Vol. IB10119). Congressional Research Service: Library of Congress.

Perl, R. F. (2007). International terrorism: Threat, policy, and response (Vol. RL33600). Congressional Research Service: Library of Congress.

Peters, R. (2000). The plague of ideas. Parameters, 2000(Winter), 4-20.

Petersen, R., Larsen, R., Schou, C., & Strickland, L. (2004). What’s in a name? Educause Quarterly, 2004(3), 5-8.

Phister, P. W., & Cherry, J. D. (2004, March 5-12). Knowledge centric operations: Implications to future command and control. Paper presented at the 2005 IEEE Aerospace Conference, Big Sky, Montana.

Popp, R., Armour, T., Senator, T., & Numrych, K. (2004). Countering terrorism through information technology. Communications of the ACM, 47(3), 36-43.

Price, S. M. (2008). Extending the McCumber Cube to model network defense. Information Systems Security Association Journal, September, 14-18.

Pufeng, W. (1995). The challenges of information warfare. Excerpted from China Military Science(Spring 2005).

Quirk, M. D., & Fernandez, S. J. (2005). Infrastructure robustness for multiscale critical missions. Journal of Homeland Security and Emergency Management, 2(2), 1-24.

Ramanathan, R. (2006). Thinking beyond security. Information Security Journal, 15(2), 49-54.

Rattray, G. J. (2001). Stategic warfare in cyberspace. Cambridge, Massachusetts: Massachusetts Institute of Technology.

Reed, B. (2007). A social network approach to understanding an insurgency. Parameters, 2007(Summer), 19-30.

Resnik, D. (1996). The ethics of cyber relationships. Computers and Society, 26(1), 16-19.

Rezgui, A., Bouguettaya, A., & Eltoweissy, M. Y. (2003). Privacy on the web: Facts, challenges, and solutions. IEEE Security and Privacy, 1(6), 40-49.

Robb, J. (2007). Brave new war: The next stage of terrorism and the end of globalization. Hoboken, New Jersey: John Wiley & Sons.

Robbins, E. L. (2006). Muddy boots IO: The rise of soldier blogs Retrieved October 1, 2008, from http://usacac.army.mil/CAC/Staff/g7/InformationOperations-RobbinsMuddyBoots.pdf

Rogers, M. (2005). DCSA: A practical Approach to Digital Crime Scene Analysis. Unpublished Pre-Publication. Purdue University

Rogin, J. (2006, May 25, 2006). DOD: China fielding cyberattack units Retrieved November 1, 2007, from http://www.fcw.com/online/news/94650-1.html

Rollins, J., & Wilson, C. (2007). Terrorist capabilities for cyberattack: Overview and policy issues (Vol. RL33123). Congressional Research Service: The Library of Congress.

Rose, L. H. (2004). Information security: A difficult balance. Educause Quarterly, 39(5), 10-11.

Ryan, J. J. C. H., & Jefferson, T. I. (2003). The use, misuse, and abuse of statistics in information security research. Computer Security Update Retrieved October 1, 2008, from http://www.attrition.org/archive/misc/use_misuse_abuse_stats_infosec_research.pdf

Saydjari, O. S. (2002). Defending cyberspace. Computer, 35(12), 125.

Saydjari, S. (2004). Cyber defense: Art to science. Communications of the ACM, 47(3), 53-57.

Schaaff, K. P., & Bossio, F. T. (1996, October 21-October 24). Warfare as a complex adaptive system. Paper presented at the Military Communications Conference, McLean, VA.

Schachtman, N. (2007). How technology almost lost the war: In Iraq the critical networks are social – not electronic Retrieved October 1, 2008, from http://www.wired.com/politics/security/magazine/15-12/ff_futurewar

Schepens, W. J., Ragsdale, D. J., Surdu, J. R., & Schafer, J. (2003). The cyber defense exercise: An evaluation of the effectiveness of information assurance education Retrieved October 1, 2008, from http://www.blackhat.com/presentations/bh-federal-03/bh-fed-03-dodge.pdf

Schermer, B. (2007). Alan Turing and the Matrix: Intelligent systems for law enforcement in virtual worlds Retrieved October 1, 2008, from http://virtuallyblind.com/files/reading-room/B19_schermer.pdf

Schmitt, G. J., & Shulsky, A. N. (1999). Leo Strauss and the world of intelligence Retrieved October 1, 2008, from http://turcopolier.typepad.com/sic_semper_tyrannis/files/leo_strauss_and_the_world_of_intelligence.pdf

Schneir, B. (2005). Attack trends: 2004 and 2005 Retrieved November 1, 2007, from http://www.schneier.com/blog/archives/2005/06/attack_trends_2.html

Sevestopulo, D. (2007, September 3, 2007). Chinese military hacked into Pentagon Retrieved November 17, 2007, from http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html?nclick_check=1

Shaw, E., Post, J., & Ruby, K. (2000). Managing the threat from within. Information Security Journal.

Sheldon, F., Potok, T., Krings, A., & Oman, P. (2004, December 10 – December 12). Critical energy infrastructure survivability, inherent limitations, obstacles, and mitigation strategies. Paper presented at the PowerCON 2003 – Special Theme: BLACKOUT New York, USA.

Shorrock, T. (2007). Bush goes private to spy on you Retrieved October 1, 2008, from http://www.alternet.org/rights/69105/

Shulsky, A. N., & Schmitt, G. J. (2002). Silent warfare: Understanding the world of intelligence. Washington, D.C.: Potomac Books, Inc.

Shurtleff, D. K. (2002). The effects of technology on our humanity. Parameters, 2002(Summer), 100-112.

Simons, B., & Spafford, E. H. (2003). Risks of total surveillance. Communications of the ACM, 46(3), 120.

Siponen, M. T. (2001). Five dimensions of information security awareness. Computers and Society, 2001(June), 24-29.

Slipchenko, V. I. (1993). A russian analysis of warfare leading to the sixth generation. Field Artillery(October), 38-41.

Spafford, E. H., & Wilson, D. L. (2004 ). Whether Linux or Windows, no software is secure. The Chronicle of Higher Education Retrieved September 24, 2004, from http://chronicle.com/weekly/v51/i05/05b02102.htm

Steele, R. D. (2006). Information operations: Putting the “I” back into DIME (pp. 75). Carlisle Barracks: Strategic Studies Institute.

Steve L. Ferenci, Choi, M., Evans, J., Fujimoto, R. M., Alspaugh, C., & Legaspi, A. K. (2004). Experiences integrating netwars with the naval simulation system using the high level architecture. Paper presented at the IEEE Military Communications Conference, Monterey, CA.

Stevens, G. M. (2003). Privacy: Total information awareness programs and related information access, collection, and protection laws (Vol. RL31730, pp. 30). Congressional Research Service: Library of Congress.

Stohl, M. (2006). Cyber terrorism: A clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Social Change, 2006(46), 223-238.

Stoll, C. (1990). The cuckoo’s egg: Tracking a spy through the maze of computer espionage. New York: Pocket Books.

Strossen, N. (2000). Cybercrime v. Cyberliberties. International Review of Law Computers & Technology, 14(1), 11-24.

Sukhai, N. B. (2004). Hacking and cybercrime. Paper presented at the Information Security Curriculum Development Conference, Kennesaw, GA.

Sutherland, I., Evans, J., Tryfonas, T., & Blyth, A. (2008). Acquiring volatile operating system data tools and techniques. ACM SIGOPS Operating Systems Review, 42(3), 65-73.

Szafranski, R. (1990). Thinking about small wars. Parameters, 1990(September), 39-49.

Tavani, H. T. (2000). Defining the boundaries of computer crime: Piracy, break-ins, and sabotage in cyberspace. Computers and Society(September), 3-9.

Taylor, C., & Alves-Foss, J. (2005, September 20-23). Diversity as a computer defense mechanism a panel. Paper presented at the 2005 Workshop on New Security Paradigms, Lake Arrowhead, CA.

Taylor, C., Krings, A., & Alves-Foss, J. (2003). Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening Retrieved October 1, 2008, from http://www.csds.uidaho.edu/papers/Taylor02a.pdf

Templeton, S. J., & Levitt, K. (2000, September 19-21). A requires/provides model for computer attacks. Paper presented at the 2000 Workshop on New Security Paradigms, Ballycotton, Country Cork, Ireland.

The Government of the United States (2004). The 9/11 commission report: Final report of the national commission on terrorist attacks upon the United States (Authorized Edition ed.). New York: Norton & Company.

Thom, M. C. (2006). Information warfare arms control: Risks and costs (pp. 63). Colorado Springs Colorado: USAF Institute for National Security Studies.

Thomas, T. L. (1996). Russian views on information-based warfare. Airpower Journal, X(Special Edition), 25-35.

Thornburgh, N. (2005, August 25, 2006). Inside the Chinese hack attack Retrieved November 1, 2007, from http://www.time.com/time/nation/article/0,8599,1098371,00.html

Tihua, Y., & Basohu, W. (2005, May 27-30). A grid service model of network centric warfare based on OGSA framework. Paper presented at the 2005 International Conference on Communications, Circuits and Systems.

Toomey, C. J. (2004). Army digitization: Making it ready for prime time. Parameters, 2003(Winter ), 40-53.

Traub, J. F. (1996). From infoware to infowar (pp. 11). Colorado Springs, Colorado: USAF Institute for National Security Studies.

Treverton, G. F. (2001). Reshaping national intelligence for an age of information. Cambridge, NY: Cambridge University Press.

Tuerkheimer, F. M. (1993). The underpinnings of privacy protection. Communications of the ACM, 36(8), 69-73.

Tuttle, J. O. (1993). C4I for the 21st century. IEEE Communications Magazine(January), 48-50.

Ulusoy, H. (2003). Revisiting security communities after the cold war: The constructivist perspective. Journal of International Affairs, 8(September-November), 1-22.

Undercoffer, J., & Pinkston, J. (2002, August 9-). Modeling computer attacks: A target-centric ontology for intrusion detection. Paper presented at the Workshop on Ontologies and Distributed Systems, Acapulco, MX.

Verton, D. (2003). Black Ice: The invisible threat of cyber-terrorism. New York: McGraw-Hill/Osborne.

Wall, D. S. (2000). Introduction cybercrimes, cyberspeech and cyberliberties. International Review of Law Computers & Technology, 14(1), 5-9.

Ware, L. (1995). Some observations of the enemy as a system. Airpower Journal, 1995(Winter), 1-6.

Ware, W. H. (1984). Information systems security and privacy. Communications of the ACM, 27(4), 315-321.

Ware, W. H. (1998). The cyber-posture of the national information infrastructure. Santa Monica, CA: Rand.

Weimann, G. (2005). Cyberterrorism: The sum of all fears? Studies in conflict & terrorism, 28, 129-149.

Welch, D. J., Buchheit, N., & Ruocco, A. (1999). Strike back: Offensive actions in information warfare. Paper presented at the New Security Paradigms Workshop, Caledon Hills, Ontario.

Wesensten, N. J., Belenky, G., & Balkin, T. J. (2005). Cognitive readieness in network-centric operations. Parameters, 2005(Spring), 94-105.

White, F. E. (1999, October 24-27). Managing data fusion systems in joint and coalition warfare. Paper presented at the Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA.

Whitted, G. A., & Just, M. E. (2005, May 15-20). Advanced collaborative technologies supporting the 21st century warfighter in a network centric environment. Paper presented at the The 2005 International Symposium on Collaborative Technologies and Systems, Saint Louis, Missouri.

Wiener, N. (1965). Cybernetics: Or control and communication in the animal and the machine (Second ed.). Cambridge: Massachusetts Institute of Technology.

Wilber, G. F., & Plaisted, S. J. (1989, May 22-26). Intelligent real-time electronic warfare. Paper presented at the Aerospace and Electronics Conference, Dayton, OH.

Williams, J. D. (1986). The complete strategyst: Being a primer on the theory of games of strategy (Reprint ed.). New York: Dover.

Wilson, C. (2005). Computer attack and cyberterrorism: Vulnerabilities and policy issues for congress (Vol. RL32114, pp. 43). Congressional Research Service The Library of Congress.

Wilson, C. (2006). Information operations and cyberwar: Capabilities and related policy issues. In C. R. Service (Ed.) (Vol. RL 31787, pp. 14). Congressional Research Service: The Library of Congress.

Wilson, C. (2008). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress (Vol. RL32114, pp. 40). Congressional Research Service: Library of Congress.

Wilson, D. L. (2004). Risk perceptions and trusted computer systems: Is open source software really more secure than proprietary software? (Vol. 2004-07, pp. 76). CERIAS, West Lafayette, IN: Purdue University.

Winn, A. C. (2006). The future of US intelligence. Parameters, 2006(Summer), 120-123.

Zhang, Z. M., Slaerno, J. J., & Yu, P. S. (2003). Applying data mining in investigating money laundering crimes. Paper presented at the International Conference on Knowledge Discovery and Data Mining, Washington DC.

Copyright

Search

    Table of Contents