Cyber security
Research topicReview and Analysis of the Report of the President's Commission on Critical Infrastructure Protection
Stephen J. Lukasik
CISAC (1998) 
High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century
Seymour E. Goodman, Peter Wolcott, Patrick Homer
CISAC (1998) 
Workshop on Protecting and Assuring Critical National Infrastructure
Kenneth B. Malpass, Kevin J. Harrington, David Elliott, Kevin J. Soo Hoo, Seymour E. Goodman
CISAC (1997) 
Workshop on Protecting and Assuring Critical National Infrastructure: Setting the Research and Policy Agenda
Kevin J. Soo Hoo, Kenneth B Malpass, Kevin Harrington, David Elliott, Seymour E. Goodman
CISAC (1997) 
Public and Private Roles in the Protection of Critical Information-Dependent Infrastructure
Stephen J. Lukasik
CISAC (1997) 
Old Law for a New World? The Applicability of International Law to Information Warfare
Lawrence T. Greenberg, Seymour E. Goodman, Kevin J. Soo Hoo
IIS (1997)
Strategic Information Warfare - A New Arena for Arms Control?
Kevin J. Soo Hoo, Lawrence Greenberg, David Elliott
CISAC (1996)
Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s
Seymour E. Goodman, Peter Wolcott, Grey Burkhart
CISAC (1995) 



About CISAC
Mailing List
@StanfordCISAC
Facebook