Skip to:

Cybersecurity

Recent Scholarly Publications

Records 16 / 16

Office of the Director of National Intelligence: From Pariah and Piñata to Managing Partner

June 2017

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z.

An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems

March 2017

Safety-critical system domains such as critical infrastructures, aerospace, automotive, and industrial manufacturing and control are becoming increasingly dependent on the use of distributed...

Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems

January 2017

Modern distributed systems and networks, like those found in cyber-physical system domains such as critical infrastructures, contain many complex interactions among their constituent software and...

Attribution of Malicious Cyber Incidents: From Soup to Nuts

September 2016

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance.

Perspectives on Complex Global Challenges: Education, Energy, Healthcare, Security, and Resilience

July 2016

This book discusses issues in large-scale systems in the United States and around the world.

An Empirical Analysis of Cyber Security Incidents at a Large Organization

February 2016

Every day, security engineers cope with a flow of cyber security incidents.

Department of Energy Cyber Security Incidents

February 2016

Despite significant interest in cybersecurity, data on cyber security incidents remains scarce.

Documenting Cyber Security Incidents

December 2015

Organizations often record cybersecurity incidents to track employee workload, satisfy auditors, fulfil reporting requirements, or to analyze cyber risk.

Deterrence Stability in the Cyber Age

December 2015

Technical and operational realities make it prohibitively difficult to adapt a Cold War paradigm of “deterrence stability” to the new domain of cyber warfare.

Defending a Hacker: Amicus brief for U.S. v. Andrew Auernheimer

July 2013

In an amicus brief written in defense of computer expert and hacker Andrew Auernheimer, Jennifer Granick and Jonathan Mayer argue that independent security testing of websites strengthen user...

Weighing the Case For a Convention to Limit Cyberwarfare

November 2009

The United States must take steps to protect its critical national infrastructure against serious cyberattack.

Regional Interest Group on Information Security: Sharing Information and Exploring Collaborative Opportunities

December 1998

On December 7, 1998, a cross-industry group of professionals interested in information security met to discuss perspectives on information security and prospects for multilateral cooperative...

Workshop on Protecting and Assuring Critical National Infrastructure: Next Steps

June 1998

The third Stanford-Livermore workshop in the series examining the protection of critical national infrastructures against cyber attack was held at Lawrence Livermore National Laboratory on February...

Workshop on Protecting and Assuring Critical National Infrastructure: Setting the Research and Policy Agenda

October 1997

The July Workshop on Protecting and Assuring Critical National Infrastructure focused on three specific areas: international and legal issues relating to the control of network misuse and...

Workshop on Protecting and Assuring Critical National Infrastructure

July 1997

In July 1996, President Clinton established the Commission on Critical Infrastructure Protection, with a charter to designate critical infrastructures and assess their vulnerabilities, to recommend...

Strategic Information Warfare - A New Arena for Arms Control?

October 1996

Information warfare is a relatively new rubric, which is receiving increasing attention within the United States from both the government and the general population.

People

Herb Lin Herbert Lin Senior Research Scholar for Cyber Policy and Security
Jesse Sowell Jesse Sowell Postdoctoral Fellow
Max Smeets Max Smeets Fellow
Rachel Hirshman CISAC Honors Student
Raj De Raj De Affiliate
John Maguire John Maguire Affiliate
Mark Weatherford Mark Weatherford Affiliate
Bradley L. Boyd Senior Military Fellow
David Elliott Affiliate
John Villasenor John Villasenor Affiliate
Andreas Kuehn Andreas Kuehn Affiliate
Mim John Miriam "Mim" John Affiliate