Skip to:

Cybersecurity

Recent Scholarly Publications

Records 24 / 32

The Existential Threat From Cyber-enabled Information Warfare

July 2019

Corruption of the information ecosystem is not just a multiplier of two long-acknowledged existential threats to the future of humanity—climate change and nuclear weapons.

Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks

March 2019

Abstract: Technical tools dominate the cyber risk management market. Social cybersecurity tools are severely underutilised in helping organisations defend themselves against cyberattacks.

Knowledge Management for Democratic Governance of Socio-Technical Systems (Chapter in The Future of Digital Democracy. Lecture Notes in Computer Science.)

December 2018

The Digital Transformation (DX) is a broad term describing the changes and innovations brought about by the introduction of information and communication technologies into all aspects of society....

The Strategic Promise of Offensive Cyber Operations

September 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions?

Integrating offensive cyber capabilities: meaning, dilemmas, and assessment

August 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Integrating Offensive Cyber Capabilities: Meaning, dilemmas, and assessment

August 2018

Abstract: Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Office of the Director of National Intelligence: From Pariah and Piñata to Managing Partner

June 2017

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z.

An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems

March 2017

Safety-critical system domains such as critical infrastructures, aerospace, automotive, and industrial manufacturing and control are becoming increasingly dependent on the use of distributed...

Introduction to the special issue on strategic dimensions of offensive cyber operations

March 2017

Nations around the world recognize cybersecurity as a critical issue for public policy.

A Matter of Time: On the Transitory Nature of Cyber Weapons

February 2017

Abstract: This article examines the transitory nature of cyberweapons.

Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems

January 2017

Modern distributed systems and networks, like those found in cyber-physical system domains such as critical infrastructures, contain many complex interactions among their constituent software and...

Attribution of Malicious Cyber Incidents: From Soup to Nuts

September 2016

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance.

Perspectives on Complex Global Challenges: Education, Energy, Healthcare, Security, and Resilience

July 2016

This book discusses issues in large-scale systems in the United States and around the world.

An Empirical Analysis of Cyber Security Incidents at a Large Organization

February 2016

Every day, security engineers cope with a flow of cyber security incidents.

The flawed analogy between nuclear and cyber deterrence

February 2016

Despite the tempting similarities, the analogy between nuclear and cyber weapons is presently flawed.

Department of Energy Cyber Security Incidents

February 2016

Despite significant interest in cybersecurity, data on cyber security incidents remains scarce.

Documenting Cyber Security Incidents

December 2015

Organizations often record cybersecurity incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk.

Deterrence Stability in the Cyber Age

December 2015

Technical and operational realities make it prohibitively difficult to adapt a Cold War paradigm of “deterrence stability” to the new domain of cyber warfare.

Defending a Hacker: Amicus brief for U.S. v. Andrew Auernheimer

July 2013

In an amicus brief written in defense of computer expert and hacker Andrew Auernheimer, Jennifer Granick and Jonathan Mayer argue that independent security testing of websites strengthen user...

Weighing the Case For a Convention to Limit Cyberwarfare

November 2009

The United States must take steps to protect its critical national infrastructure against serious cyberattack.

Terror and Beauty - The European Institute for Mathematical Methods in Counterterrorism

September 2005

Concepts and techniques from mathematics--specifically, from lattice theory and reflexive theory--have already been applied to counterterrorism and computer security problems.

Proposal for an International Convention on Cyber Crime and Terrorism, A

August 2000

The information infrastructure is increasingly under attack by cyber criminals. The number, cost, and sophistication of attacks are increasing at alarming rates.

How Much Is Enough? A Risk-Management Approach to Computer Security

August 2000

How much security is enough? No one today can satisfactorily answer this question for computer-related risks.

Critical Infrastructures: The Path Ahead (Proceedings of: XIWT symposium on Cross-Industry Activities for Information Infrastructure Robustness)

February 1999

The Cross-Industry Working Team (XIWT), with the support of Stanford University Consortium for Research on Information Security and Policy (CRISP), sponsored a symposium on cross-industry...

People

Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Eileen Donahoe Lecturer, CDDRL
Herb Lin Herbert Lin Senior Research Scholar
Alex Stamos Adjunct Professor Visiting Scholar, Hoover Institution, Director, Stanford Internet Observatory
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Headshot of Thomas Fingar Thomas Fingar Lecturer at APARC
Dan Boneh Dan Boneh Co-director, Cyber Policy Center Professor, Electrical Engineering
Nathaniel Persily Co-director, Cyber Policy Center, Senior Fellow Professor, Law, Professor, by courtesy, Political Science, Professor, by courtesy, Communication
Jan Rydzak Research Scholar, CDDRL Research Scholar and Associate Director for Program, GDPi
Max Smeets Max Smeets Postdoctoral Fellow
Gregory Falco Postdoctoral Fellow