Follow
Aaron Brantly
Title
Cited by
Cited by
Year
Understanding the intelligence cycle
M Phythian
Routledge, 2013
1492013
The Decision to Attack: Military and Intelligence Cyber Decision-making
AF Brantly
University of Georgia Press, 2016
752016
The Cyber Deterrence Problem
A Brantly
742020
Financing terror bit by bit
A Brantly
CTC Sentinel 7 (10), 1-5, 2014
502014
Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia
L Beehner, L Collins, S Ferenzi, R Person, A Brantly
https://mwi.usma.edu/wp-content/uploads/2018/03/Analyzing-the-Russian-Way-of …, 2018
472018
When everything becomes intelligence: machine learning and the connected world
AF Brantly
Developing Intelligence Theory, 96-107, 2020
382020
Cybersecurity: politics, governance and conflict in cyberspace
D Van Puyvelde, AF Brantly
John Wiley & Sons, 2019
382019
From cyberspace to independence square: understanding the impact of social media on physical protest mobilization during Ukraine’s Euromaidan revolution
AF Brantly
Journal of information technology & politics 16 (4), 360-378, 2019
332019
Cyber actions by state actors: Motivation and utility
AF Brantly
International Journal of Intelligence and CounterIntelligence 27 (3), 465-484, 2014
332014
Developing intelligence theory
P Gill, M Phythian
Intelligence and National Security 33 (4), 467-471, 2018
312018
Subverting reality: The role of propaganda in 21st century intelligence
CW Fitzgerald, AF Brantly
International Journal of intelligence and Counterintelligence 30 (2), 215-240, 2017
312017
Cyber security politics: Socio-technological transformations and political fragmentation
M Dunn Cavelty, A Wenger
Taylor & Francis, 2022
292022
Information warfare in the age of cyber conflict
C Whyte, AT Thrall, BM Mazanec
Routledge, 2021
292021
The cyber losers
AF Brantly
Democracy and Security 10 (2), 132-155, 2014
292014
Innovation and Adaptation in Jihadist Digital Security
A Brantly
Survival 59 (1), 79-102, 2017
252017
The violence of hacking: state violence and cyberspace
AF Brantly
The Cyber Defense Review 2 (1), 73-92, 2017
222017
Military operations in cyberspace
A Brantly, M Smeets
Handbook of military sciences, 1-16, 2020
192020
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise
AF Brantly
CTC Sentinel 10 (7), 29-33, 2017
192017
Aesop’s wolves: The deceptive appearance of espionage and attacks in cyberspace
AF Brantly
Intelligence and National Security 31 (5), 674-685, 2016
192016
Risk and uncertainty can be analyzed in cyberspace
AF Brantly
Journal of Cybersecurity 7 (1), tyab001, 2021
182021
The system can't perform the operation now. Try again later.
Articles 1–20