Attributing cyber attacks

T Rid, B Buchanan - Journal of strategic studies, 2015 - Taylor & Francis
Who did it? Attribution is fundamental. Human lives and the security of the state may depend
on ascribing agency to an agent. In the context of computer network intrusions, attribution is …

[图书][B] Cyber operations and international law

F Delerue - 2020 - books.google.com
This book offers a comprehensive analysis of the international law applicable to cyber
operations, including a systematic examination of attribution, lawfulness and remedies. It …

Grey is the new black: covert action and implausible deniability

R Cormac, RJ Aldrich - International affairs, 2018 - academic.oup.com
For hundreds of years, states have sought to intervene in the affairs of others in a
surreptitious manner. Since the professionalization of intelligence services in the aftermath …

The law and politics of cyberattack attribution

KE Eichensehr - UCLA L. Rev., 2020 - HeinOnline
Attribution of cyberattacks requires identifying those responsible for bad acts, prominently
including states, and accurate attribution is a crucial predicate in contexts as diverse as …

Under false flag: using technical artifacts for cyber attack attribution

F Skopik, T Pahi - Cybersecurity, 2020 - Springer
The attribution of cyber attacks is often neglected. The consensus still is that little can be
done to prosecute the perpetrators–and unfortunately, this might be right in many cases …

Attribution of malicious cyber incidents: From soup to nuts

H Lin - Journal of International Affairs, 2016 - JSTOR
Attribution of malicious cyber activities is a deep issue about which confusion and disquiet
can be found in abundance. Attribution has many aspects—technical, political, legal, policy …

[图书][B] Research handbook on international law and cyberspace

N Tsagourias, R Buchan - 2021 - books.google.com
This revised and expanded edition of the Research Handbook on International Law and
Cyberspace brings together leading scholars and practitioners to examine how international …

[图书][B] The use of force and international law

C Henderson - 2018 - books.google.com
The Use of Force and International Law offers an authoritative overview of international law
governing the resort to force. Looking through the prism of the contemporary challenges that …

US cyber deterrence: Practice guiding theory

AS Wilner - Journal of Strategic Studies, 2020 - Taylor & Francis
When compared to advancements in conceptualising deterrence in other domains, cyber
deterrence is still in it messy infancy. In some ways cyber deterrence practice outpaces …

The law of attribution: Rules for attribution the source of a cyber-attack

D Tran - Yale JL & Tech., 2018 - HeinOnline
Long after the conclusion of the 2016 presidential election in the United States, the story of
Russian hacking has lived on. Public reports of Russian interference with the election first …