Follow
Trey Herr
Trey Herr
American University - School of International Service
Verified email at american.edu - Homepage
Title
Cited by
Cited by
Year
PrEP: A Framework for Malware & Cyber Weapons
T Herr
The Journal of Information Warfare 13 (1), 87-106, 2014
672014
Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’
S Shackelford, B Schneier, M Sulmeyer, AE Boustead, B Buchanan, ...
58*2016
Cyber Weapons & Export Control: Incorporating Dual Use with the PrEP Model
T Herr, P Rosenzweig
Journal of National Security Law and Policy 8 (2), 2015
492015
Taking stock: Estimating vulnerability rediscovery
T Herr, B Schneier, C Morris
Belfer Cyber Security Project White Paper Series, 2017
242017
Breaking trust–shades of crisis across an insecure software supply chain
T Herr
232021
Malware Counter-Proliferation and the Wassenaar Arrangement
T Herr
Proceedings of the 8th International Conference on Cyber Conflict: Cyber Power, 2016
202016
Cyber insurance and private governance: The enforcement power of markets
T Herr
Regulation & Governance 15 (1), 98-114, 2021
182021
Bugs in the system
A Wilson, R Schulman, K Bankston, T Herr
Washington DC: New America, 2016
132016
Milware: Identification and Implications of State Authored Malicious Software
T Herr, E Armbrust
NSPW15 Proceedings of the 2015 New Security Paradigms Workshop, 29-43, 2015
122015
Countering cyber proliferation: Zeroing in on Access-as-a-Service
W DeSombre, J Shires, JD Work, R Morgus, PH O’NEILL, L Allodi, T Herr
Atlantic Council., 2022
112022
Analyzing the ethical implications of research using leaked data
AE Boustead, T Herr
PS: Political Science & Politics 53 (3), 505-509, 2020
112020
A primer on the proliferation of offensive cyber capabilities
W DeSombre, M Campobasso, L Allodi, J Shires, JD Work, R Morgus, ...
Atlantic Council, In-Depth Research & Reports, Issue Brief, 2021
102021
Four myths about the cloud: The geopolitics of cloud computing
T Herr
Atlantic Council, 2020
92020
Countering the proliferation of offensive cyber capabilities
R Morgus, M Smeets, T Herr
The Global Commission on the Stability of Cyberspace, 2017
92017
Cyber Insecurity: Navigating the Perils of the Next Information Age
R Harrison, T Herr
Rowman & Littlefield, 2016
8*2016
Broken Trust: Lessons from Sunburst
T Herr
JSTOR Security Studies Collection, 2021
72021
Russia’s hacking success shows how vulnerable the cloud is
B Schneier, T Herr
Foreign Policy, 2021
62021
Countering the Proliferation of Malware: Targeting the Vulnerability Lifecycle
T Herr
Belfer Cyber Security Project White Paper Series, 2017
52017
Combating complexity: Offensive cyber capabilities and integrated warfighting
D Herrick, T Herr
Available at SSRN 2845709, 2016
52016
Military cyber operations: A primer
T Herr, D Herrick
American Foreign Policy Council Defense Technology Program Brief, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20