Follow
Aaron Brantly
Title
Cited by
Cited by
Year
Understanding the intelligence cycle
M Phythian
Routledge, 2013
1482013
The Decision to Attack: Military and Intelligence Cyber Decision-making
AF Brantly
University of Georgia Press, 2016
742016
The Cyber Deterrence Problem
A Brantly
732020
Financing terror bit by bit
A Brantly
CTC Sentinel 7 (10), 1-5, 2014
502014
Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia
L Beehner, L Collins, S Ferenzi, R Person, A Brantly
https://mwi.usma.edu/wp-content/uploads/2018/03/Analyzing-the-Russian-Way-of …, 2018
472018
Cybersecurity: politics, governance and conflict in cyberspace
D Van Puyvelde, AF Brantly
John Wiley & Sons, 2019
382019
When everything becomes intelligence: machine learning and the connected world
AF Brantly
Developing Intelligence Theory, 96-107, 2020
372020
Cyber actions by state actors: Motivation and utility
AF Brantly
International Journal of Intelligence and CounterIntelligence 27 (3), 465-484, 2014
332014
From cyberspace to independence square: understanding the impact of social media on physical protest mobilization during Ukraine’s Euromaidan revolution
AF Brantly
Journal of information technology & politics 16 (4), 360-378, 2019
322019
Subverting reality: The role of propaganda in 21st century intelligence
CW Fitzgerald, AF Brantly
International Journal of intelligence and Counterintelligence 30 (2), 215-240, 2017
312017
Developing intelligence theory
P Gill, M Phythian
Intelligence and National Security 33 (4), 467-471, 2018
302018
The cyber losers
AF Brantly
Democracy and Security 10 (2), 132-155, 2014
292014
Cyber security politics: Socio-technological transformations and political fragmentation
M Dunn Cavelty, A Wenger
Taylor & Francis, 2022
282022
Information warfare in the age of cyber conflict
C Whyte, AT Thrall, BM Mazanec
Routledge, 2021
282021
Innovation and Adaptation in Jihadist Digital Security
A Brantly
Survival 59 (1), 79-102, 2017
242017
The violence of hacking: state violence and cyberspace
AF Brantly
The Cyber Defense Review 2 (1), 73-92, 2017
222017
Aesop’s wolves: The deceptive appearance of espionage and attacks in cyberspace
AF Brantly
Intelligence and National Security 31 (5), 674-685, 2016
192016
Risk and uncertainty can be analyzed in cyberspace
AF Brantly
Journal of Cybersecurity 7 (1), tyab001, 2021
182021
Military operations in cyberspace
A Brantly, M Smeets
Handbook of military sciences, 1-16, 2020
182020
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise
AF Brantly
CTC Sentinel 10 (7), 29-33, 2017
182017
The system can't perform the operation now. Try again later.
Articles 1–20