Language
English
German
^M
Dutch
Spanish
Title:
Implementing the Federal Cybersecurity R&D Strategy
Source:
Computer [0018-9162] yr:2015
Basic
Full text
Full text available via
IEEE Electronic Library (IEL) Journals
Access for AWI, GFZ, IASS only
Document delivery
Request document via
Library/Bibliothek
Users interested in this article also expressed an interest in the following:
description
1.
"United States : DOD's Cyber Strategy Emphasizes Building Partner Capacity."
MENA Report
.
description
2.
STONE, R.
"A Call to Cyber Arms."
Science
339.6123 (2013): 1026-1027.
description
3.
Dey, D.
"Hacker Behavior, Network Effects, and the Security Software Market."
Journal of management information systems
29.2 (2012): 77-108.
description
4.
Axelrod, R.
"Timing of cyber conflict."
Proceedings of the National Academy of Sciences of the United States of America
111.4 (2014): 1298-1303.
description
5.
Sindhu, K. K.
"Digital Forensics and Cyber Crime Datamining."
Journal of information security
03.03 (2012): 196-201.
description
6.
Rid, T.
"Cyber War Will Not Take Place."
Journal of strategic studies
35.1 (2011): 1-32.
description
7.
"United States : Manchin Applauds President's National Cybersecurity Strategy."
MENA Report
.
description
8.
Zhiyuan Tan, X.
"Improving cloud network security using the Tree-Rule firewall."
Future generation computer systems
30.1: 116-126.
description
9.
Israelashvili, M.
"Adolescentsâ over-use of the cyber world â Internet addiction or identity exploration?"
Journal of adolescence
35.2 (2012): 417-424.
description
10.
Bhargava, Hemant K.
"Research Note—When Is Versioning Optimal for Information Goods?"
Management science
54.5 (2008): 1029-1035.
description
11.
"Big boost in cyber-security spending."
Network security
2011.12 (2011): 20-20.
description
12.
Garg, R.
"Measuring Information Diffusion in an Online Community."
Journal of management information systems
28.2 (2011): 11-38.
description
13.
Ransbotham, S.
"Choice and Chance: A Conceptual Model of Paths to Information Security Compromise."
Information Systems Research
20.1 (2009): 121-139.
description
14.
Thomas, J.
"The moral ambiguity of social control in cyberspace: a retro-assessment of the 'golden age' of hacking."
New media & society
7.5 (2005): 599-624.
description
15.
Stone, J.
"Cyber War Will Take Place!"
Journal of strategic studies
36.1 (2012): 1-8.
description
16.
Kuss, Daria J.
"Internet addiction in adolescents: Prevalence and risk factors."
Computers in human behavior
29.5 (2013): 1987-1996.
description
17.
Lindsay, J.
"The impact of China on cybersecurity: fiction and friction."
International security
39.3 (2014): 7-47.
description
18.
Farwell, James P.
"Stuxnet and the future of cyber war."
Survival
53.1 (2011): 23-40.
description
19.
Jordan, J.
"When Heads Roll: Assessing the Effectiveness of Leadership Decapitation."
Security studies
18.4 (2009): 719-755.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
ProCite
EndNote
RefWorks
Reference Manager
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
Other articles by this author? -- in
Online Contents Geosciences
Other articles by this author? -- using
Web of Science
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Search for related information in
Google Scholar
Article Title
Journal Title
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.