Martin C. Libicki — Publications
-
It Takes More than Offensive Capability to Have an Effective Cyberdeterrence Posture
2017
-
A Framework for Programming and Budgeting for Cybersecurity
2016
-
Getting to Yes with China in Cyberspace
2016
-
U.S.–Japan Alliance Conference: Strengthening Strategic Cooperation
2016
-
Acquisition of Space Systems, Volume 7: Past Problems and Future Challenges
2015
-
Chinese Attacks on U.S. Air Bases in Asia: An Assessment of Relative Capabilities, 1996–2017
2015
-
Chinese Threats to U.S. Surface Ships: An Assessment of Relative Capabilities, 1996–2017
2015
-
The Defender's Dilemma: Charting a Course Toward Cybersecurity
2015
-
Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals
2015
-
Sharing Information About Threats Is Not a Cybersecurity Panacea
2015
-
Tallying the U.S.-China Military Scorecard: Relative Capabilities and the Evolving Balance of Power, 1996–2017
2015
-
U.S. and Chinese Air Superiority Capabilities: An Assessment of Relative Advantage, 1996–2017
2015
-
The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996–2017
2015
-
Hackers Wanted: An Examination of the Cybersecurity Labor Market
2014
-
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
2014
-
Ramifications of DARPA's Programming Computation on Encrypted Data Program
2014
-
RAND Review: Vol. 38, No. 2, Summer 2014
2014
-
Brandishing Cyberattack Capabilities
2013
-
Internet Freedom and Political Space
2013
-
Managing September 12th in Cyberspace: Presented before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
2013
-
Managing September 12th in Cyberspace: Presented before the House Foreign Affairs Committee, Subcommittee on Europe, Eurasia, and Emerging Threats
2013
-
RAND Review: Vol. 37, No. 1, Summer 2013
2013
-
Crisis and Escalation in Cyberspace
2012
-
Cyberspace Is Not a Warfighting Domain
2012
-
Root Cause Analyses of Nunn-McCurdy Breaches, Volume 2: Excalibur Artillery Projectile and the Navy Enterprise Resource Planning Program, with an Approach to Analyzing Complexity and Risk
2012
-
Chinese Use of Cyberwar as an Anti-Access Strategy: Two Scenarios
2011
-
Global Demographic Change and Its Implications for Military Power
2011
-
Influences on the Adoption of Multifactor Authentication
2011
-
RAND Review: Vol. 35, No. 3, Winter 2011-2012
2011
-
Root Cause Analyses of Nunn-McCurdy Breaches, Volume 1: Zumwalt-Class Destroyer, Joint Strike Fighter, Longbow Apache, and Wideband Global Satellite
2011
-
Air Force Cyber Command (Provisional) Decision Support
2010
-
Assessing Living Conditions in Iraq's Anbar Province in 2009
2010
-
How Insurgencies End
2010
-
Should Global Force Management Information Be Classified?
2010
-
What Should Be Classified? A Framework with Application to the Global Force Management Data Initiative
2010
-
The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a U.S. Domestic Counterterrorism Intelligence Agency
2009
-
Cyberdeterrence and Cyberwar
2009
-
The Day After... in Jerusalem: A Strategic Planning Exercise on the Path to Achieving Peace in the Middle East
2009
-
Living Conditions in Anbar Province in June 2008
2009
-
Underkill: Scalable Capabilities for Military Operations amid Populations
2009
-
Countering Insurgency in the Muslim World: Rethinking U.S. Priorities and Capabilities
2008
-
Cybersecurity Economic Issues: Corporate Approaches and Challenges to Decisionmaking
2008
-
Design of the Qatar National Research Fund: An Overview of the Study Approach and Key Recommendations
2008
-
How Terrorist Groups End: Implications for Countering al Qa'ida
2008
-
How Terrorist Groups End: Lessons for Countering al Qa'ida
2008
-
War by Other Means -- Building Complete and Balanced Capabilities for Counterinsurgency: RAND Counterinsurgency Study -- Final Report
2008
-
Byting Back -- Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study -- Volume 1
2007
-
Can Publicly Available Information Be Used in Planning Terrorist Attacks?
2007
-
Conquest in Cyberspace: National Security and Information Warfare
2007
-
Exploring Terrorist Targeting Preferences
2007
-
Freedom and Information: Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security
2007
-
Getting Inside the Terrorist Mind
2007
-
Chinese Responses to U.S. Military Transformation and Implications for the Department of Defense
2006
-
Collecting the Dots: Problem Formulation and Solution Elements
2004
-
The Costs and Benefits of Moving to the ICD-10 Code Sets
2004
-
Enabling the Information Society by Stimulating the Creation of a Broadband Environment in Europe: Analyses of Evolution Scenarios for Future Networking Technologies and Networks in Europe
2003
-
New Challenges, New Tools for Defense Decisionmaking
2003
-
The Global Course of the Information Revolution: Political, Economic, and Social Consequences Proceedings of an International Conference
2000
-
The Role of Technical Standards in Today’s Society and in the Future
2000
-
Scaffolding the New Web: Standards and Standards Policy for the Digital Economy
2000
-
Who Runs What in the Global Information Grid: Ways to Share Local and Global Responsibility
2000
-
Strategic Appraisal: The Changing Role of Information in Warfare
1999