At Internet Conference, Signs of Agreement Appear Between U.S. and Russia ." The New York Times (2010). "
Russia’s Cybersecurity Plans." Technology Review (2010). "
Politically Motivated Denial of Service Attacks." In The Virtual Battlefield: Perspectives on Cyber Warfare., 2009. "
A Brief History of Cybercrime." Time (2009). "
Defending A New Domain: The Pentagon’s Cyberstrategy." Foreign Affairs (2010). "
Securing Our Digital Future., 2009.
Obama Seeks Big Boost in Cybersecurity Spending." Computer- world (2011). "
Comparing U.S., Russian and Chinese Information Operations Concepts. Fort Leavenworth, KS: Foreign Military Studies Office, 2004.
Scientific and Methodological Problems of Information Security . Moscow: Information Security Institute of Moscow State University, 2004.
Understanding Cybercrime: A Guide for Developing Countries. Geneva: International Telecommunication Union (ITU), Telecommunication Development Centre, 2009.
Military Aspects of Ensuring International In- formation Security in the Context of Elaborating Universally Acknowledged Principles of International Law. Geneva: United Nations Institute for Disarmament Research, 2007.
Last Minute Paper: An In-depth Look into Stuxnet." Virus Bulletin (2010). "
Cyberspace and the Use of Force . Falls Church, VA: Aegis Research Corporation, 1999.
The Council of Europe Convention on Cybercrime, Proceedings of the Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options. Washington, D.C.: National Academies Press, 2010.
Cyberdeterrence and Cyberwar . Santa Monica, CA: RAND, 2009.
Cyberwarfare: Surviving an Attack." Public Interest Report 63, no. 3 (2010). "