Understanding the intelligence cycle M Phythian Routledge, 2013 | 155 | 2013 |
The Decision to Attack: Military and Intelligence Cyber Decision-making AF Brantly University of Georgia Press, 2016 | 80 | 2016 |
The Cyber Deterrence Problem A Brantly | 77 | 2020 |
Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia L Beehner, L Collins, S Ferenzi, R Person, A Brantly https://mwi.usma.edu/wp-content/uploads/2018/03/Analyzing-the-Russian-Way-of …, 2018 | 51 | 2018 |
Financing terror bit by bit A Brantly CTC Sentinel 7 (10), 1-5, 2014 | 49 | 2014 |
Cybersecurity: politics, governance and conflict in cyberspace D Van Puyvelde, AF Brantly John Wiley & Sons, 2019 | 41 | 2019 |
When everything becomes intelligence: machine learning and the connected world AF Brantly Developing Intelligence Theory, 96-107, 2020 | 38 | 2020 |
From cyberspace to independence square: understanding the impact of social media on physical protest mobilization during Ukraine’s Euromaidan revolution AF Brantly Journal of information technology & politics 16 (4), 360-378, 2019 | 35 | 2019 |
Developing intelligence theory P Gill, M Phythian Intelligence and National Security 33 (4), 467-471, 2018 | 34 | 2018 |
Information warfare in the age of cyber conflict C Whyte, AT Thrall, BM Mazanec Routledge, 2021 | 33 | 2021 |
Cyber actions by state actors: Motivation and utility AF Brantly International Journal of Intelligence and CounterIntelligence 27 (3), 465-484, 2014 | 32 | 2014 |
Subverting reality: The role of propaganda in 21st century intelligence CW Fitzgerald, AF Brantly International Journal of intelligence and Counterintelligence 30 (2), 215-240, 2017 | 30 | 2017 |
The cyber losers AF Brantly Democracy and Security 10 (2), 132-155, 2014 | 29 | 2014 |
Cyber security politics: Socio-technological transformations and political fragmentation M Dunn Cavelty, A Wenger Taylor & Francis, 2022 | 25 | 2022 |
Innovation and Adaptation in Jihadist Digital Security A Brantly Survival 59 (1), 79-102, 2017 | 25 | 2017 |
The violence of hacking: state violence and cyberspace AF Brantly The Cyber Defense Review 2 (1), 73-92, 2017 | 24 | 2017 |
Risk and uncertainty can be analyzed in cyberspace AF Brantly Journal of Cybersecurity 7 (1), tyab001, 2021 | 22 | 2021 |
Military operations in cyberspace A Brantly, M Smeets Handbook of military sciences, 1-16, 2020 | 20 | 2020 |
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise AF Brantly CTC Sentinel 10 (7), 29-33, 2017 | 19 | 2017 |
Aesop’s wolves: The deceptive appearance of espionage and attacks in cyberspace AF Brantly Intelligence and National Security 31 (5), 674-685, 2016 | 18 | 2016 |