Page 226

REVISTA IEEE 9

228 Journal of the Spanish Institute for Strategic Studies Núm. 9 / 2017 BORGHARD, Erica D. and LONERGAN, Shawn W. “Can States Calculate the Risks of Using Cyber Proxies?”, Orbis, Vol. 60, No, 3 (2016), pp. 395-416. BRIGHT, Peter. “Independent Iranian Hacker Claims Responsibility for Comodo Hack”, Wired (March 28, 2011). http://www.wired.com/threatlevel/2011/03/ comodo_hack/. BRONK, Christopher yTIKK-RINGAS, Eneken. “The Cyber Attack on Saudi Aramco”, Survival, Vol. 55, No. 2 (April 2013), pp. 81-96. DEIBERT, Ronald J. Black Code: Inside the Battle for Cyberspace, Toronto: Signal/ McClelland & Stewart, 2013. GEERS, Kenneth (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallin: NATO CCD COE Publications, 2015. https://ccdcoe.org/sites/default/ files/multimedia/pdf/CyberWarinPerspective_full_book.pdf. GHOSH, Sumit, MALEK, Manu and STOHR, Edward A. (coord.) Guarding Your Business: A Management Approach to Security, Nueva York: Springer, 2004. GOLDMAN, Emily O. and ARQUILLA, John (eds.) Cyber Analogies, Monterey, CA: Department of Defense Information Operations Center for Research, 2014. GOMPERT, David C. and LIBICKI, Martin. Waging Cyber War the American Way, Survival: Global Politics and Strategy, Vol. 57, No. 4 (August–September 2015), pp. 7-28. GUITTON, Clement and KORZAK, Elaine. “The Sophistication Criterion for Attribution: Identifying the Perpetrators of Cyber-Attacks”, The RUSI Journal, Vol. 158, No. 4 (2013), pp. 62-68. HARRIS, Shane. @WAR: The Rise of the Military-Internet Complex, Boston: Mariner Books, 2015. INKSTER, Nigel. “Cyber Attacks in La-La Land”, Survival: Global Politics and Strategy, Vol. 57, No. 1 (February–March 2015), pp. 105-116. JONES, Sam. “Cyber warfare: Iran opens a new front”, Financial Times (April 26, 2016). http://www.ft.com/cms/s/0/15e1acf0-0a47-11e6-b0f1-61f222853ff3.html. KAPLAN, Fred. Dark Territory. The Secret History of Cyber War, New York: Simon http://revista.ieee.es/index.php/ieee & Schuster, 2016. KETTER, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon, Random House, New York, 2014. KOPSTEIN, Joshua. “Meet the Companies that Helped Hacking Team Sell Tools to Repressive Governments”, Mother Board, (July 9, 2015). https://motherboard. vice.com/read/meet-the-companies-that-helped-hacking-team-sell-tools-to-repressive- governments. LEE, Robert M. and RID, Thomas. “OMG Cyber!”, The RUSI Journal, Vol. 159, No. 5 (October-November 2014), pp. 4-12. http://www.tandfonline.com/doi/pdf/10 .1080/03071847.2014.969932.


REVISTA IEEE 9
To see the actual publication please follow the link above