Page 34

REVISTA IEEE 9

http://revista.ieee.es/index.php/ieee 34 Revista del Instituto Español de Estudios Estratégicos (IEEE) Núm. 9 / 2017 BIBLIOGRAFÍA ADELKHAH, Nima. «Iran and Its Cyber-Terrorism Strategies», Terrorism Monitor, vol. 14, núm. 10 (May 16, 2016), http://www.jamestown.org/single/?tx_ttnewstt_ news=45435&tx_ttnewsbackPid=7&cHash=fa0da141d63052f600aa6a7bffa1f625. BBC. «The Interview: A guide to the cyber attack on Hollywood», BBC News (December 29, 2014). http://www.bbc.com/news/entertainment-arts-30512032. BETZ, David y STEVENS, Tim. «Power and cyberspace», Adelphi Series, Vol. 51, núm. 424 (2011), pp. 9-34. BETZ, David. «Cyberpower in Strategic Affairs: Neither Unthinkable nor Blessed», Journal of Strategic Studies, vol. 35, núm. 5 (2012), pp. 689-711. BORGHARD, Erica D. y LONERGAN, Shawn W. «Can States Calculate the Risks of Using Cyber Proxies?», Orbis, vol. 60, núm, 3 (2016), pp. 395-416. BRIGHT, Peter. «Independent Iranian Hacker Claims Responsibility for Comodo Hack», Wired (March 28, 2011). http://www.wired.com/threatlevel/2011/03/ comodo_hack/. BRONK, Christopher y  TIKK-RINGAS, Eneken. «The Cyber Attack on Saudi Aramco», Survival, vol. 55, núm. 2 (April 2013), pp. 81-96. DEIBERT, Ronald J. Black Code: Inside the Battle for Cyberspace, Toronto: Signal/ McClelland & Stewart, 2013. GEERS, Kenneth (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallin: NATO CCD COE Publications, 2015. https://ccdcoe.org/sites/default/ files/multimedia/pdf/CyberWarinPerspective_full_book.pdf. GHOSH, Sumit, MALEK, Manu y STOHR, Edward A. (coord.) Guarding Your Business: A Management Approach to Security, Nueva Yok: Springer, 2004. GOLDMAN, Emily O. y ARQUILLA, John (eds.) Cyber Analogies, Monterey, CA: Departament of Defense Information Operations Center for Research, 2014. GOMPERT, David C. y LIBICKI, Martin. Waging Cyber War the American Way, Survival: Global Politics and Strategy, vol. 57, núm. 4 (August-September 2015), pp. 7-28. GUITTON, Clement y KORZAK, Elaine. «The Sophistication Criterion for Attribution: Identifying the Perpetrators of Cyber-Attacks», The RUSI Journal, vol. 158, núm. 4 (2013), pp. 62-68. HARRIS, Shane. @WAR: The Rise of the Military-Internet Complex, Boston: Mariner Books, 2015. INKSTER, Nigel. «Cyber Attacks in La-La Land», Survival: Global Politics and Strategy, vol. 57, núm. 1 (February-March 2015), pp. 105-116.


REVISTA IEEE 9
To see the actual publication please follow the link above