Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 156
1.
  • Cyberspace and Instability Cyberspace and Instability
    Chesney, Robert 01/2023
    eBook
    Odprti dostop

    A wide range of actors have publicly identified cyber stability as a key policy goal but the meaning of stability in the context of cyber policy remains vague and contested. Vague because most ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
2.
  • Cyber Arms Transfer: Meanin... Cyber Arms Transfer: Meaning, Limits, and Implications
    Smeets, Max Security studies, 2022, Letnik: 31, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    What are the motivations and opportunities for arms transfer in the cyber realm? Although scholarship has failed to systematically address this question, having an accurate answer is crucial for ...
Celotno besedilo
Dostopno za: BFBNIB, IZUM, KILJ, NUK, ODKLJ, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
3.
  • A matter of time: On the tr... A matter of time: On the transitory nature of cyberweapons
    Smeets, Max Journal of strategic studies, 02/2018, Letnik: 41, Številka: 1-2
    Journal Article
    Recenzirano
    Odprti dostop

    This article examines the transitory nature of cyberweapons. Shedding light on this highly understudied facet is important both for grasping how cyberspace affects international security and ...
Celotno besedilo
Dostopno za: BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
4.
  • The challenges of military ... The challenges of military adaptation to the cyber domain: a case study of the Netherlands
    Smeets, Max Small wars & insurgencies, 10/2023, Letnik: 34, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Whilst NATO speaks increasingly publicly about the military use of cyber operations, adaptation to the cyber domain has reportedly been challenging for most militaries. Little research has sought to ...
Celotno besedilo
Dostopno za: BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK
5.
  • U.S. cyber strategy of pers... U.S. cyber strategy of persistent engagement & defend forward: implications for the alliance and intelligence collection
    Smeets, Max Intelligence and national security, 04/2020, Letnik: 35, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    This article evaluates the implications of U.S. cyber strategy of persistent engagement for the alliance and intelligence collection. Whilst the strategy may have benefits for certain alliance ...
Celotno besedilo
Dostopno za: BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK
6.
  • A US history of not conduct... A US history of not conducting cyber attacks
    Smeets, Max Bulletin of the atomic scientists, 07/2022, Letnik: 78, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    There were numerous occasions when the US military considered conducting cyber attacks but refrained from doing so, but these have been largely overlooked as sources of insight. Six cases that we do ...
Celotno besedilo
Dostopno za: BFBNIB, DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
7.
  • Integrating offensive cyber... Integrating offensive cyber capabilities: meaning, dilemmas, and assessment
    Smeets, Max Defence studies, 10/2018, Letnik: 18, Številka: 4
    Journal Article
    Recenzirano

    Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities. One of the key dilemmas faced by these states is whether (and how) to ...
Celotno besedilo
Dostopno za: BFBNIB, DOBA, IZUM, KILJ, NUK, ODKLJ, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
8.
  • Cyber campaigns and strateg... Cyber campaigns and strategic outcomes
    Harknett, Richard J.; Smeets, Max Journal of strategic studies, 06/2022, Letnik: 45, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of ...
Celotno besedilo
Dostopno za: BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
9.
  • Regulatory cybersecurity go... Regulatory cybersecurity governance in the making: the formation of ENISA and its struggle for epistemic authority
    Dunn Cavelty, Myriam; Smeets, Max Journal of European public policy, 07/2023, Letnik: 30, Številka: 7
    Journal Article
    Recenzirano

    Over the last decades, cybersecurity has become a top priority for the European Union (EU). As a contribution to scholarship on the 'regulatory security state', we analyze how the European Union ...
Celotno besedilo
Dostopno za: BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK
10.
  • Verboden vruchten in het (B... Verboden vruchten in het (Binnen)hof
    Smeets, Max Atlantisch Perspectief, 01/2019, Letnik: 43, Številka: 1
    Journal Article

    Het vermogen om de werkelijkheid te verdraaien maakt grote sprongen. Dit vermogen hoeft niet altijd voor goede doeleinden te worden gebruikt. De last om oplossingen te bedenken ligt niet alleen bij ...
Celotno besedilo
Dostopno za: NMLJ, NUK, UL, UM, UPUK
1 2 3 4 5
zadetkov: 156

Nalaganje filtrov