@drbvaler
amazon.com/Cyber-War-vers…
Libicki: rand.org/pubs/monograph…
@sekreps and I: academic.oup.com/cybersecurity/…
@jonrlindsay and erik gartzke: academic.oup.com/cybersecurity/…
@eborghard @Shawn_Lonergan: jstor.org/stable/2676013…
@PeterDombrowsk6 and Chris Demchak
jstor.org/stable/4313432…
@henryfarrell mitpressjournals.org/doi/abs/10.116…
Emily Goldman and Jon Arquilla:
apps.dtic.mil/dtic/tr/fullte…
@AmyZegart @HerbLinCyber
amazon.com/dp/B07JN4D721/…
More analogies:
carnegieendowment.org/2017/10/16/int…
mitpressjournals.org/doi/pdf/10.116…
@Joe_Nye
global.oup.com/academic/produ…
@jonrlindsay
belfercenter.org/sites/default/…
@BuchananBen
amazon.com/Cybersecurity-…
Rebecca Slayton:
mitpressjournals.org/doi/abs/10.116…
@adschina: warontherocks.com/2018/01/trust-…
@RidT @BuchananBen: tandfonline.com/doi/abs/10.108…
@sekreps @DebakD: journals.sagepub.com/doi/abs/10.117…
@JoshRovner1: warontherocks.com/2019/09/cyber-…