ExLibris header image
SFX Logo
Title: Implementing the Federal Cybersecurity R&D Strategy
Source:

Computer [0018-9162] yr:2015


Collapse list of basic services Basic
Full text
Full text available via IEEE Electronic Library (IEL) Journals GO
Access for AWI, GFZ, IASS only
Document delivery
Request document via Library/Bibliothek GO
Users interested in this article also expressed an interest in the following:
1. "United States : DOD's Cyber Strategy Emphasizes Building Partner Capacity." MENA Report . Link to SFX for this item
2. STONE, R. "A Call to Cyber Arms." Science 339.6123 (2013): 1026-1027. Link to SFX for this item
3. Dey, D. "Hacker Behavior, Network Effects, and the Security Software Market." Journal of management information systems 29.2 (2012): 77-108. Link to SFX for this item
4. Axelrod, R. "Timing of cyber conflict." Proceedings of the National Academy of Sciences of the United States of America 111.4 (2014): 1298-1303. Link to Full Text for this item Link to SFX for this item
5. Sindhu, K. K. "Digital Forensics and Cyber Crime Datamining." Journal of information security 03.03 (2012): 196-201. Link to SFX for this item
6. Rid, T. "Cyber War Will Not Take Place." Journal of strategic studies 35.1 (2011): 1-32. Link to SFX for this item
7. "United States : Manchin Applauds President's National Cybersecurity Strategy." MENA Report . Link to SFX for this item
8. Zhiyuan Tan, X. "Improving cloud network security using the Tree-Rule firewall." Future generation computer systems 30.1: 116-126. Link to SFX for this item
9. Israelashvili, M. "Adolescents’ over-use of the cyber world – Internet addiction or identity exploration?" Journal of adolescence 35.2 (2012): 417-424. Link to SFX for this item
10. Bhargava, Hemant K. "Research Note—When Is Versioning Optimal for Information Goods?" Management science 54.5 (2008): 1029-1035. Link to Full Text for this item Link to SFX for this item
11. "Big boost in cyber-security spending." Network security 2011.12 (2011): 20-20. Link to SFX for this item
12. Garg, R. "Measuring Information Diffusion in an Online Community." Journal of management information systems 28.2 (2011): 11-38. Link to SFX for this item
13. Ransbotham, S. "Choice and Chance: A Conceptual Model of Paths to Information Security Compromise." Information Systems Research 20.1 (2009): 121-139. Link to SFX for this item
14. Thomas, J. "The moral ambiguity of social control in cyberspace: a retro-assessment of the 'golden age' of hacking." New media & society 7.5 (2005): 599-624. Link to Full Text for this item Link to SFX for this item
15. Stone, J. "Cyber War Will Take Place!" Journal of strategic studies 36.1 (2012): 1-8. Link to SFX for this item
16. Kuss, Daria J. "Internet addiction in adolescents: Prevalence and risk factors." Computers in human behavior 29.5 (2013): 1987-1996. Link to SFX for this item
17. Lindsay, J. "The impact of China on cybersecurity: fiction and friction." International security 39.3 (2014): 7-47. Link to SFX for this item
18. Farwell, James P. "Stuxnet and the future of cyber war." Survival 53.1 (2011): 23-40. Link to SFX for this item
19. Jordan, J. "When Heads Roll: Assessing the Effectiveness of Leadership Decapitation." Security studies 18.4 (2009): 719-755. Link to SFX for this item
View More...
View Less...
Select All Clear All

Expand list of advanced services Advanced