关注
Jon R. Lindsay
Jon R. Lindsay
Associate Professor of International Relations, Georgia Institute of Technology
在 gatech.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Stuxnet and the limits of cyber warfare
JR Lindsay
Security studies 22 (3), 365-404, 2013
5672013
Weaving tangled webs: offense, defense, and deception in cyberspace
E Gartzke, JR Lindsay
Security Studies 24 (2), 316-348, 2015
2802015
The impact of China on cybersecurity: Fiction and friction
JR Lindsay
International Security 39 (3), 7-47, 2014
2272014
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack
JR Lindsay
Journal of Cybersecurity 1 (1), 53-67, 2015
1942015
China and cybersecurity: Espionage, strategy, and politics in the digital domain
JR Lindsay, TM Cheung, DS Reveron
Oxford University Press, USA, 2015
1782015
Cross-Domain Deterrence: Strategy in an Era of Complexity
E Gartzke, JR Lindsay
Oxford University Press, 2019
143*2019
Thermonuclear cyberwar
E Gartzke, JR Lindsay
Journal of cybersecurity 3 (1), 37-48, 2017
1002017
Coercion through cyberspace: the stability-instability paradox revisited
JR Lindsay, E Gartzke
Coercion: The Power to Hurt in International Politics, 179-203, 2018
832018
North Korea and the Sony hack: Exporting instability through cyberspace
S Haggard, JR Lindsay
Honolulu, HI: East-West Center, 2015
772015
Restrained by design: The political economy of cybersecurity
JR Lindsay
Digital Policy, Regulation and Governance 19 (6), 493-514, 2017
742017
Prediction and judgment: Why artificial intelligence increases the importance of humans in war
A Goldfarb, JR Lindsay
International Security 46 (3), 7-50, 2021
612021
A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society
L Maschmeyer, RJ Deibert, JR Lindsay
Journal of Information Technology & Politics 18 (1), 1-20, 2021
592021
Information technology and military power
JR Lindsay
Cornell University Press, 2020
552020
Reinventing the revolution: technological visions, counterinsurgent criticism, and the rise of special operations
JR Lindsay
Journal of Strategic Studies 36 (3), 422-453, 2013
462013
From Exploitation to Innovation: Acquisition, Absorption, and Application
JR Lindsay, TM Cheung
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital …, 2015
382015
Demystifying the quantum threat: infrastructure, institutions, and intelligence advantage
JR Lindsay
Security Studies 29 (2), 335-361, 2020
372020
The influence of sea power on politics: domain-and platform-specific attributes of material capabilities
E Gartzke, JR Lindsay
Security Studies in a New Era of Maritime Competition, 23-58, 2023
352023
Correspondence: a cyber disagreement
JR Lindsay, L Kello
International Security 39 (2), 181-192, 2014
352014
Politics by many other means: The comparative strategic advantages of operational domains
JR Lindsay, E Gartzke
Journal of Strategic Studies 45 (5), 743-776, 2022
322022
Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem
JR Lindsay
Intelligence and National security 36 (2), 260-278, 2021
302021
系统目前无法执行此操作,请稍后再试。
文章 1–20