Abstract is missing.
- Strategic Cyber: Responding to Russian Online Information WarfareMatthew J. Flynn. 1-22 [doi]
- Fake news, (dis)information and principle of non-interventionAnnachiara Rotondo, Pierluigi Salvati. 1-9 [doi]
- The Calculus of Protecting Interstate Competition from Cyber AttackVaughn H. Standley, Roxanne B. Everetts. 1-7 [doi]
- Combining Recurrence Quantification Analysis and Adaptive Clustering to Detect DDoS AttacksMarcelo Antonio Righi, Raul Ceretta Nunes. 1-7 [doi]
- A Model for Evaluating Fake NewsChar Sample, Connie Justice, Emily Darraj. 1-11 [doi]
- Critical Infrastructure Protection at the Local LevelColin Brooks. 1-11 [doi]
- Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forumsSoumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian. 1-7 [doi]
- Defense Support to the Private Sector: New Concepts for DoD's National Cyber Defense MissionJason Healey, Erik B. Korn. 1-8 [doi]
- Feed the Bears, Starve the TrollsNina A. Kollars, Michael B. Petersen. 1-8 [doi]
- Applies computational social choice theory as a framework for new cyber-threatsDavid M. Perlman. 1-9 [doi]
- Borders in Cyberspace: Stratigive Information Conflict since 9/11Michael Warner. 1-19 [doi]
- Beyond the United Nations Group of Governmental Experts: Norms of Responsible Nation State Behavior in CyberspaceJohn A. Davis, Charlie Lewis. 1-6 [doi]
- Persistent Engagement, Agreed Competition, Cyberspace Interaction Dynamics and EscalationMichael P. Fischerkeller, Richard J. Harknett. 1-13 [doi]
- United By Necessity: Conditions for Institutional Cooperation against CybercrimeJobel Kyle P. Vecino. 1-11 [doi]
- Cyber AcquisitionThomas Klemas, Rebecca K. Lively, Nazli Choucri. 1-9 [doi]