Tallinn Manual on the International Law Applicable to Cyber Warfare EMN Schmitt Cambridge University Press, 2013 | 1273 | 2013 |
The Virtual Battlefield: Perspectives on Cyber Warfare K Geers, C Czosseck IOS Press, 2009 | 528* | 2009 |
Cyber War in Perspective: Russian Aggression against Ukraine K Geers NATO CCD COE Publications, 2015 | 511* | 2015 |
Strategic Cyber Security K Geers NATO Cyber Defence Centre of Excellence, 2011 | 251 | 2011 |
The challenge of cyber attack deterrence K Geers Computer Law & Security Review 26 (3), 298-303, 2010 | 154 | 2010 |
World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks K Geers, D Kindlund, N Moran, R Rachwald FireEye Labs White Paper, 25, 2013 | 100* | 2013 |
Cyberspace and the changing nature of warfare K Geers SC Magazine, Black Hat, 2008 | 94* | 2008 |
The cyber threat to national critical infrastructures: Beyond theory K Geers Information Security Journal: A Global Perspective 18 (1), 1-7, 2009 | 84 | 2009 |
Cyber weapons convention K Geers Computer law & security review 26 (5), 547-551, 2010 | 48 | 2010 |
Live fire exercise: preparing for cyber war K Geers Journal of Homeland Security and Emergency Management 7 (1), 2010 | 35 | 2010 |
Operation “Ke3chang”: Targeted Attacks Against Ministries of Foreign Affairs N Villeneuve, JT Bennett, N Moran, T Haq, M Scott, K Geers FireEye, 2013 | 29* | 2013 |
Strategic cyber defense: Which way forward? K Geers Journal of Homeland Security and Emergency Management 9 (1), 1-10, 2012 | 20 | 2012 |
A Brief Introduction to Cyber Warfare K Geers Common Defense Quarterly Spring 2010, 16-17, 2010 | 9 | 2010 |
Cyber War in Perspective: Russian Aggression against Ukraine. NATO CCD COE Publications, Tallinn, 175 р K Geers | 8* | 2015 |
The cyber threat to national critical infrastructures: beyond theory K Geers Journal of Digital Forensic Practice 3 (2-4), 124-130, 2010 | 7 | 2010 |
Coder, hacker, soldier, spy K Geers Cyber Security: Analytics, Technology and Automation, 73-87, 2015 | 6 | 2015 |
“When the Urgency of Time and Circumstances Clearly Does Not Permit...”: Predelegation in Nuclear and Cyber Scenarios P Feaver, K Geers Cyber Analogies, 33-45, 2014 | 6 | 2014 |
Pandemonium: Nation States, National Security, and the Internet K Geers The Tallinn Papers 1 (1), 1-14, 2014 | 6 | 2014 |
Foreign Interference in Ukraine’s Democracy UET Force May. https://www. atlanticcouncil. org/wp-conten t/uploads/2019/05 …, 2019 | 5* | 2019 |
Strategic Analysis: As Russia-Ukraine Conflict Continues, Malware Activity Rises K Geers Cyber Security. FireEye, May 28, 2014 | 5 | 2014 |