{"title":"2 The Cyber-Nuclear Connection","authors":"","doi":"10.1515/9781503630406-003","DOIUrl":"https://doi.org/10.1515/9781503630406-003","url":null,"abstract":"","PeriodicalId":154087,"journal":{"name":"Cyber Threats and Nuclear Weapons","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131182659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"6 Designing the Cyber-Nuclear Future: Observations and Imperatives","authors":"","doi":"10.1515/9781503630406-007","DOIUrl":"https://doi.org/10.1515/9781503630406-007","url":null,"abstract":"","PeriodicalId":154087,"journal":{"name":"Cyber Threats and Nuclear Weapons","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117032787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3 The U.S. Nuclear Enterprise","authors":"","doi":"10.1515/9781503630406-004","DOIUrl":"https://doi.org/10.1515/9781503630406-004","url":null,"abstract":"","PeriodicalId":154087,"journal":{"name":"Cyber Threats and Nuclear Weapons","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124079583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"1 Introduction and Background","authors":"J. Goeree, Charles A. Holt, T. Palfrey","doi":"10.1515/9781400880928-002","DOIUrl":"https://doi.org/10.1515/9781400880928-002","url":null,"abstract":"","PeriodicalId":154087,"journal":{"name":"Cyber Threats and Nuclear Weapons","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}