Virginia Tech
    • Log in
    Search 
    •   VTechWorks Home
    • College of Liberal Arts and Human Sciences (CLAHS)
    • Search
    •   VTechWorks Home
    • College of Liberal Arts and Human Sciences (CLAHS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 17

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Analyzing the Russian Way of War: Evidence from the 2008 Conflict with Georgia 

    Beehner, Lionel; Collins, Liam; Ferenzi, Steve; Person, Robert; Brantly, Aaron F. (Modern War Institute, 2018-03-20)
    In the dog days of August 2008, a column of Russian tanks and troops rolled across the Republic of Georgia’s northern border and into South Ossetia, sparking a war that was over almost before it began. The war, while not ...
    Thumbnail

    The Cyber Deterrence Problem 

    Brantly, Aaron F. (Nato Ccd Coe, 2018-05-30)
    What is the role of deterrence in an age where adept hackers can credibly hold strategic assets at risk? Do conventional frameworks of deterrence maintain their applicability and meaning against state actors in cyberspace? ...
    Thumbnail

    Cyber Actions by State Actors: Motivation and Utility 

    Brantly, Aaron F. (2014-05-12)
    Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence ...
    Thumbnail

    The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in Cyberspace 

    Brantly, Aaron F. (2016)
    Winning wars in cyberspace might sound easy: the click of a mouse or the press of the enter key on a keyboard. Yet, the web of networks that constitutes cyberspace is imbued with challenges. Seemingly every day there is a ...
    Thumbnail

    Back to Reality: Cross domain deterrence and cyberspace 

    Brantly, Aaron F. (2018-09-01)
    This paper examines cross domain deterrence strategies involving cyber incidents. By focusing on efforts to halt Russian and Chinese cyber operations against the United States this paper examines the importance of developing, ...
    Thumbnail

    The Cyber Losers 

    Brantly, Aaron F. (2014-05-22)
    National security cyber activities harm human rights and democracy activists. With increasing state cyber capabilities comes heightened pressure on civil society and democracy activists.We often think of the cyber arms ...
    Thumbnail

    Bitcoin and Cryptocurrencies 

    Vasek, Marie; Jardine, Eric; Brantly, Aaron F. (Virginia Tech, 2018-05-18)
    This panel includes three presentations: “Cryptocurrencies and Financial Crimes” by Marie Vasek; “Cryptocurrencies and Specific Drug Types” by Eric Jardine; and “Bitcoin and OPSEC for Terrorists” by Aaron Brantly. (Please ...
    Thumbnail

    Conceptualizing Cyber Deterrence by Entanglement 

    Brantly, Aaron F. (2018-03-01)
    Dr. Brantly was invited to give one of three keynote lectures for the opening of the Cyber Governance and Policy Center at the University of Oklahoma.
    Thumbnail

    Subverting Reality: The Role of Propaganda in 21st Century Intelligence 

    Brantly, Aaron F. (2017-02-08)
    The digital era has placed most of humanity’s knowledge within a few clicks of a computer mouse or the touches of a smart phone screen. Yet in an age where knowledge is so readily available it is also seemingly elusive. ...
    Thumbnail

    When everything becomes intelligence: machine learning and the connected world 

    Brantly, Aaron F. (2018-06-01)
    By 2020, the number of IOT devices will surpass 20.1 billion, and these devices combined with user interactions will generate enormous data streams that will challenge analytic capabilities constrained by human faculties, ...
    • 1
    • 2

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us
     

     

    Browse

    All of VTechWorksCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    Log inRegister

    Discover

    Content TypeArticle - Refereed (9)Conference proceeding (3)Presentation (2)Report (2)Book chapter (1)... View MoreSubjectBitcoin (1)Conflict (1)Cryptocurrencies (1)Cyber (1)cyber operations (CO) (1)... View MoreDate Issued2022 (2)2021 (1)2018 (8)2017 (3)2016 (1)2014 (2)Author
    Brantly, Aaron F. (17)
    Beehner, Lionel (1)Cal, Nerea M. (1)Collins, Liam (1)Ferenzi, Steve (1)... View MoreHas File(s)Yes (17)

    If you believe that any material in VTechWorks should be removed, please see our policy and procedure for Requesting that Material be Amended or Removed. All takedown requests will be promptly acknowledged and investigated.

    Virginia Tech | University Libraries | Contact Us