I agree that this site is using cookies. You can find further informations
here
.
X
Login
Merkliste (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
zur Desktop-Version
Toggle navigation
Merkliste
1 Ergebnisse
1
Noisy Operations on the Silent Battlefield: Preparing for a..:
Hare, Forrest
;
Diehl, William
The Cyber Defense Review. 5 (2020) 1 - p. 153-168 , 2020
Link:
https://www.jstor.org/stable/26902668
RT Journal T1
Noisy Operations on the Silent Battlefield: Preparing for adversary use of unintrusive precision cyber weapons
UL https://suche.suub.uni-bremen.de/peid=jstor-26902668&Exemplar=1&LAN=DE A1 Hare, Forrest A1 Diehl, William PB Army Cyber Institute YR 2020 SN 2474-2120 SN 2474-2139 K1 Applied sciences K1 Technology K1 Weapons K1 Political science K1 Military science K1 Military operations K1 Computer science K1 Computer operations K1 Computer hacking K1 Denial of service attacks K1 Armed conflict K1 War K1 Warfare K1 Unconventional warfare K1 Electronic warfare K1 War theaters K1 Battlefields K1 Philosophy K1 Metaphysics K1 Philosophy of mind K1 Concept of mind K1 Consciousness theory K1 Privileged access K1 Economics K1 Economic disciplines K1 Labor economics K1 Employment K1 Computer engineering K1 Cybersecurity K1 Malware K1 Computer software K1 Linguistics K1 Language K1 Orthographies K1 Cryptography JF The Cyber Defense Review VO 5 IS 1 SP 153 OP 168 LK http://dx.doi.org/https://www.jstor.org/stable/26902668 DO https://www.jstor.org/stable/26902668 SF ELIB - SuUB Bremen
Export
RefWorks (nur Desktop-Version!)
Flow
(Zuerst in
Flow
einloggen, dann importieren)