101 results on '"Smeets, Max"'
Search Results
2. Unintentional Interstate Capability Transfers
3. A Typology of Cyber Actors
4. Not a Level Playing Field
5. Conducting Cyber Effect Operations
6. Intentional Interstate Capability Transfers
7. The Effect of Experience
8. The Elements of an Offensive Cyber Capability
9. Introduction
10. Mind the Gap
11. The Role of Non-State Actors
12. Conclusion
13. Mapping the Known Unknowns of Cybersecurity Education: A Review of Syllabi on Cyber Conflict and Security
14. Cyber Deterrence: The Past, Present, and Future
15. Operational Decision-Making for Cyber Operations : In Search of a Model
16. Going cyber : the dynamics of cyber proliferation and international security
17. Surgically assisted orthodontic alignment of impacted maxillary canines: A retrospective analysis of functional and esthetic outcomes and risk factors for failure
18. If it bleeps it leads? Media coverage on cyber conflict and misperception
19. Verboden vruchten in het (Binnen)hof : De opkomst van deepfakes
20. Cyberspace and Instability
21. Dutch cyber security strategy
22. Cyber Deterrence: The Past, Present, and Future
23. If it Bleeps it Leads? - Media Coverage on Cyber Conflict and Misperception
24. The Strategic Promise of Offensive Cyber Operations
25. Cyber: ‘People, people, people’ : Vragen over het DDC en het inzetten van cyberactiviteiten
26. Military Operations in Cyberspace
27. A US history of not conducting cyber attacks.
28. The challenges of military adaptation to the cyber domain: a case study of the Netherlands
29. Regulatory cybersecurity governance in the making: the formation of ENISA and its struggle for epistemic authority
30. Cyber hacktivists are busy undermining Putin's invasion
31. No Shortcuts
32. Introduction : A Re-examination of Private Military and Security Companies
33. Publicly attributing cyber attacks: a framework.
34. Cyber Operations During the 2022 Russian Invasion of Ukraine: Lessons Learned (so far)
35. The Role of Military Cyber Exercises: A Case Study of Locked Shields
36. Noblesse oblige: The transatlantic security dynamic and Dutch involvement in the Joint Strike Fighter program
37. What it Takes to Develop a Military Cyber-Force
38. Strategic Shifts and NATO’s New Strategic Concept
39. Bulletin 2022 zur schweizerischen Sicherheitspolitik
40. Cyber Campaigns and Strategic Outcomes
41. Warum sich Staaten schwer tun, eine militärische Cyber-Truppe aufzubauen
42. Cyber Arms Transfer: Meaning, Limits, and Implications
43. Cyberspace and Instability
44. Publicly attributing cyber attacks: a framework
45. The Dutch Cybersecurity Landscape: From Cyber ‘Air Castles’ to Concrete Building Blocks
46. Survival and success of autotransplanted impacted maxillary canines during short‐term follow‐up: A prospective case‐control study
47. Sandworm: a new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers
48. Cyber campaigns and strategic outcomes
49. Mapping the Known Unknowns of Cybersecurity Education: A Review of Syllabi on Cyber Conflict and Security
50. U.S. cyber strategy of persistent engagement & defend forward: implications for the alliance and intelligence collection
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.