Cybersecurity

Recent Scholarly Publications

Records 24 / 24

Office of the Director of National Intelligence: From Pariah and Piñata to Managing Partner

June 2017

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z.

An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems

March 2017

Safety-critical system domains such as critical infrastructures, aerospace, automotive, and industrial manufacturing and control are becoming increasingly dependent on the use of distributed...

Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems

January 2017

Modern distributed systems and networks, like those found in cyber-physical system domains such as critical infrastructures, contain many complex interactions among their constituent software and...

Attribution of Malicious Cyber Incidents: From Soup to Nuts

September 2016

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance.

Perspectives on Complex Global Challenges: Education, Energy, Healthcare, Security, and Resilience

July 2016

This book discusses issues in large-scale systems in the United States and around the world.

An Empirical Analysis of Cyber Security Incidents at a Large Organization

February 2016

Every day, security engineers cope with a flow of cyber security incidents.

The flawed analogy between nuclear and cyber deterrence

February 2016

Despite the tempting similarities, the analogy between nuclear and cyber weapons is presently flawed.

Department of Energy Cyber Security Incidents

February 2016

Despite significant interest in cybersecurity, data on cyber security incidents remains scarce.

Documenting Cyber Security Incidents

December 2015

Organizations often record cybersecurity incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk.

Deterrence Stability in the Cyber Age

December 2015

Technical and operational realities make it prohibitively difficult to adapt a Cold War paradigm of “deterrence stability” to the new domain of cyber warfare.

Defending a Hacker: Amicus brief for U.S. v. Andrew Auernheimer

July 2013

In an amicus brief written in defense of computer expert and hacker Andrew Auernheimer, Jennifer Granick and Jonathan Mayer argue that independent security testing of websites strengthen user...

Weighing the Case For a Convention to Limit Cyberwarfare

November 2009

The United States must take steps to protect its critical national infrastructure against serious cyberattack.

Terror and Beauty - The European Institute for Mathematical Methods in Counterterrorism

September 2005

Concepts and techniques from mathematics--specifically, from lattice theory and reflexive theory--have already been applied to counterterrorism and computer security problems.

Proposal for an International Convention on Cyber Crime and Terrorism, A

August 2000

The information infrastructure is increasingly under attack by cyber criminals. The number, cost, and sophistication of attacks are increasing at alarming rates.

How Much Is Enough? A Risk-Management Approach to Computer Security

August 2000

How much security is enough? No one today can satisfactorily answer this question for computer-related risks.

Critical Infrastructures: The Path Ahead (Proceedings of: XIWT symposium on Cross-Industry Activities for Information Infrastructure Robustness)

February 1999

The Cross-Industry Working Team (XIWT), with the support of Stanford University Consortium for Research on Information Security and Policy (CRISP), sponsored a symposium on cross-industry...

Regional Interest Group on Information Security: Sharing Information and Exploring Collaborative Opportunities

December 1998

On December 7, 1998, a cross-industry group of professionals interested in information security met to discuss perspectives on information security and prospects for multilateral cooperative...

Workshop on Protecting and Assuring Critical National Infrastructure: Next Steps

June 1998

The third Stanford-Livermore workshop in the series examining the protection of critical national infrastructures against cyber attack was held at Lawrence Livermore National Laboratory on February...

Review and Analysis of the Report of the President's Commission on Critical Infrastructure Protection

January 1998

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection (PCCIP), with a charter to designate critical infrastructures, to assess their vulnerabilities, to...

Workshop on Protecting and Assuring Critical National Infrastructure: Setting the Research and Policy Agenda

October 1997

The July Workshop on Protecting and Assuring Critical National Infrastructure focused on three specific areas: international and legal issues relating to the control of network misuse and...

Workshop on Protecting and Assuring Critical National Infrastructure

July 1997

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection, with a charter to designate critical infrastructures and assess their vulnerabilities, to recommend...

Public and Private Roles in the Protection of Critical Information-Dependent Infrastructure

May 1997

The discussion begins with a conceptual framework for addressing the protection of infrastructure systems subject to attacks on their information subsystems.

Strategic Information Warfare - A New Arena for Arms Control?

October 1996

Information warfare is a relatively new rubric, which is receiving increasing attention within the United States from both the government and the general population.

Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s

November 1995

This paper reports the results of a study of the special export control regime for high-performance computers.

People

Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Herb Lin Herbert Lin Senior Research Scholar for Cyber Policy and Security
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Max Smeets Max Smeets Postdoctoral Fellow
Jesse Sowell Jesse Sowell Postdoctoral Fellow
Rachel Hirshman Rachel Hirshman CISAC Honors Student
Bradley Boyd Bradley L. Boyd Senior Military Fellow
Charles Perrow Visiting Scholar (in residence December-April)
John Villasenor John Villasenor Affiliate
Andreas Kuehn Andreas Kuehn Affiliate
Raj De Raj De Affiliate
John Maguire John Maguire Affiliate