Stuxnet and the limits of cyber warfare JR Lindsay Security studies 22 (3), 365-404, 2013 | 567 | 2013 |
Weaving tangled webs: offense, defense, and deception in cyberspace E Gartzke, JR Lindsay Security Studies 24 (2), 316-348, 2015 | 280 | 2015 |
The impact of China on cybersecurity: Fiction and friction JR Lindsay International Security 39 (3), 7-47, 2014 | 227 | 2014 |
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack JR Lindsay Journal of Cybersecurity 1 (1), 53-67, 2015 | 194 | 2015 |
China and cybersecurity: Espionage, strategy, and politics in the digital domain JR Lindsay, TM Cheung, DS Reveron Oxford University Press, USA, 2015 | 178 | 2015 |
Cross-Domain Deterrence: Strategy in an Era of Complexity E Gartzke, JR Lindsay Oxford University Press, 2019 | 143* | 2019 |
Thermonuclear cyberwar E Gartzke, JR Lindsay Journal of cybersecurity 3 (1), 37-48, 2017 | 100 | 2017 |
Coercion through cyberspace: the stability-instability paradox revisited JR Lindsay, E Gartzke Coercion: The Power to Hurt in International Politics, 179-203, 2018 | 83 | 2018 |
North Korea and the Sony hack: Exporting instability through cyberspace S Haggard, JR Lindsay Honolulu, HI: East-West Center, 2015 | 77 | 2015 |
Restrained by design: The political economy of cybersecurity JR Lindsay Digital Policy, Regulation and Governance 19 (6), 493-514, 2017 | 74 | 2017 |
Prediction and judgment: Why artificial intelligence increases the importance of humans in war A Goldfarb, JR Lindsay International Security 46 (3), 7-50, 2021 | 61 | 2021 |
A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society L Maschmeyer, RJ Deibert, JR Lindsay Journal of Information Technology & Politics 18 (1), 1-20, 2021 | 59 | 2021 |
Information technology and military power JR Lindsay Cornell University Press, 2020 | 55 | 2020 |
Reinventing the revolution: technological visions, counterinsurgent criticism, and the rise of special operations JR Lindsay Journal of Strategic Studies 36 (3), 422-453, 2013 | 46 | 2013 |
From Exploitation to Innovation: Acquisition, Absorption, and Application JR Lindsay, TM Cheung China and Cybersecurity: Espionage, Strategy, and Politics in the Digital …, 2015 | 38 | 2015 |
Demystifying the quantum threat: infrastructure, institutions, and intelligence advantage JR Lindsay Security Studies 29 (2), 335-361, 2020 | 37 | 2020 |
The influence of sea power on politics: domain-and platform-specific attributes of material capabilities E Gartzke, JR Lindsay Security Studies in a New Era of Maritime Competition, 23-58, 2023 | 35 | 2023 |
Correspondence: a cyber disagreement JR Lindsay, L Kello International Security 39 (2), 181-192, 2014 | 35 | 2014 |
Politics by many other means: The comparative strategic advantages of operational domains JR Lindsay, E Gartzke Journal of Strategic Studies 45 (5), 743-776, 2022 | 32 | 2022 |
Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem JR Lindsay Intelligence and National security 36 (2), 260-278, 2021 | 30 | 2021 |