2017
DOI: 10.1007/s13347-016-0251-1
|View full text |Cite
|
Sign up to set email alerts
|

Five Kinds of Cyber Deterrence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…It is because high cost of initiating cyber attack to the attacker exceed the cost of expected gain and this concept are presented within the the Fig. [2].…”
Section: Cyber Deterrence By Denial Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…It is because high cost of initiating cyber attack to the attacker exceed the cost of expected gain and this concept are presented within the the Fig. [2].…”
Section: Cyber Deterrence By Denial Modelmentioning
confidence: 99%
“…The Fig. (2) drawing the core idea of cyber deterrence by denial in term of hardening (B) cyber defense and the expected outcome from different scenarios. In case State (A) attacking (B) the expected outcome for (A) E A = (n) is correlated to (B) cyber defense capacity against modeled and assumed cyber attack.…”
Section: Cyber Deterrence By Denial Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…A more attentive analysis reveals that they are simply different instances of deterrence by retaliation. One should think of them as tokens of the same type of deterrence strategy, insofar as each [strategy] occurs in a slightly different way, but all seek to punish and curb behaviour by adding a social cost (Ryan 2017). …”
Section: Deterrence Theorymentioning
confidence: 99%