The early days of cyberattacks: the cases of Estonia, Georgia and Ukraine P Pernik, S Alatalu, I Borogan, E Chernenko, S Herpig, O Jonsson, ... Nicu Popescu und Stanislav Secrieru (Hg.): Hacks, Leaks and Disruptions …, 2018 | 31 | 2018 |
Toward a Cyber Weapons Assessment Model—Assessment of the Technical Features of Malicious Software T Reinhold, C Reuter IEEE Transactions on Technology and Society 3 (3), 226-239, 2021 | 20 | 2021 |
Arms control and its applicability to cyberspace T Reinhold, C Reuter Information Technology for Peace and Security: IT Applications and …, 2019 | 18 | 2019 |
Russian cyber activities in the EU J Limnell, S Alatalu, I Borogan, E Chernenko, S Herpig, O Jonsson, ... Hacks, leaks and disruptions: Russian cyber strategies, 65-74, 2018 | 18 | 2018 |
Verification in cyberspace T Reinhold, C Reuter Information Technology for Peace and Security: IT Applications and …, 2019 | 14 | 2019 |
Cyber weapons and artificial intelligence: Impact, influence and the challenges for arms control T Reinhold, C Reuter Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature …, 2022 | 13 | 2022 |
Spotting the bear: credible attribution and Russian operations in cyberspace S Herpig, T Reinhold Hacks, leaks and disruptions: Russian cyber strategies 148, 33-42, 2018 | 13 | 2018 |
From cyber war to cyber peace T Reinhold, C Reuter Information Technology for Peace and Security: IT Applications and …, 2019 | 12 | 2019 |
Wannacry about the tragedy of the commons? Game-theory and the failure of global vulnerability disclosure M Schulze, T Reinhold Proc. Eur. Conf. Cyber Warfare Security (ECCWS), 454-463, 2018 | 12 | 2018 |
Armament, Arms Control and Artificial Intelligence T Reinhold, N Schörnig Studies in Peace and Security. Springer International Publishing, 2022 | 11 | 2022 |
Cyberspace als Kriegsschauplatz? Herausforderungen für Völkerrecht und Sicherheitspolitik T Reinhold Aus Politik und Zeitgeschichte, 2016 | 11* | 2016 |
Threat intelligence application for cyber attribution T Riebe, MA Kaufhold, T Kumar, T Reinhold, C Reuter Science peace security ‘19—Proceedings of the interdisciplinary conference …, 2019 | 10 | 2019 |
The digital divide in state vulnerability to submarine communications cable failure J Franken, T Reinhold, L Reichert, C Reuter International Journal of Critical Infrastructure Protection 38, 100522, 2022 | 9 | 2022 |
Zur Debatte über die Einhegung eines Cyberwars: Analyse militärischer Cyberaktivitäten im Krieg Russlands gegen die Ukraine T Reinhold, C Reuter Zeitschrift für Friedens-und Konfliktforschung 12 (1), 135-149, 2023 | 7 | 2023 |
Cyberwar zwischen Fiktion und Realität–technologische Möglichkeiten C Reuter, T Riebe, L Aldehoff, MA Kaufhold, T Reinhold Cyberwar–die Digitalisierung der Kriegsführung: Fragen zur Gewalt• Band 6, 15-38, 2019 | 7 | 2019 |
Arms Control for Artificial Intelligence T Reinhold Armament, Arms Control and Artificial Intelligence: The Janus-faced Nature …, 2022 | 6 | 2022 |
Möglichkeiten und Grenzen zur Bestimmung von Cyberwaffen T Reinhold Gesellschaft für Informatik eV, 2015 | 6 | 2015 |
Challenges for Cyber Arms Control: A Qualitative Expert Interview Study T Reinhold, H Pleil, C Reuter Zeitschrift für Außen-und Sicherheitspolitik 16 (3), 289-310, 2023 | 5 | 2023 |
Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack T Reinhold, C Reuter Zeitschrift für Friedens-und Konfliktforschung 12 (1), 31-58, 2023 | 5 | 2023 |
Zur Schnittmenge von Informatik mit Friedens-und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik C Reuter, T Riebe, J Haunschild, T Reinhold, S Schmid Zeitschrift für Friedens-und Konfliktforschung 11 (2), 129-140, 2022 | 4 | 2022 |