Cyberweapon (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Cyberweapon" in English language version.

refsWebsite
Global rank English rank
5th place
5th place
2nd place
2nd place
11th place
8th place
7th place
7th place
low place
low place
54th place
48th place
26th place
20th place
low place
low place
34th place
27th place
114th place
90th place
1st place
1st place
1,299th place
903rd place
146th place
110th place
175th place
137th place
2,435th place
1,699th place
28th place
26th place

bod.fi (Global: low place; English: low place)

cnn.com (Global: 28th place; English: 26th place)

money.cnn.com

discovery.com (Global: 1,299th place; English: 903rd place)

news.discovery.com

doi.org (Global: 2nd place; English: 2nd place)

forbes.com (Global: 54th place; English: 48th place)

infosecurity-magazine.com (Global: low place; English: low place)

jstor.org (Global: 26th place; English: 20th place)

  • Downes, Cathy (2018). "Strategic Blind–Spots on Cyber Threats, Vectors and Campaigns". The Cyber Defense Review. 3 (1): 79–104. ISSN 2474-2120. JSTOR 26427378.

newyorker.com (Global: 146th place; English: 110th place)

nytimes.com (Global: 7th place; English: 7th place)

nytimes.com

bits.blogs.nytimes.com

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

techtarget.com (Global: 2,435th place; English: 1,699th place)

searchsecurity.techtarget.com

theverge.com (Global: 114th place; English: 90th place)

vice.com (Global: 175th place; English: 137th place)

washingtonpost.com (Global: 34th place; English: 27th place)

web.archive.org (Global: 1st place; English: 1st place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

  • Downes, Cathy (2018). "Strategic Blind–Spots on Cyber Threats, Vectors and Campaigns". The Cyber Defense Review. 3 (1): 79–104. ISSN 2474-2120. JSTOR 26427378.
  • Stevens, Tim (10 January 2017). "Cyberweapons: an emerging global governance architecture". Palgrave Communications. 3 (1): 1–6. doi:10.1057/palcomms.2016.102. ISSN 2055-1045. S2CID 55150719.
  • Tepperman, Jonathan (9 February 2021). "The Most Serious Security Risk Facing the United States". The New York Times. ISSN 0362-4331. Retrieved 5 May 2022.
  • Farwell, James P.; Rohozinski, Rafal (1 September 2012). "The New Reality of Cyber War". Survival. 54 (4): 107–120. doi:10.1080/00396338.2012.709391. ISSN 0039-6338. S2CID 153574044.
  • Farwell, James P.; Rohozinski, Rafal (1 February 2011). "Stuxnet and the Future of Cyber War". Survival. 53 (1): 23–40. doi:10.1080/00396338.2011.555586. ISSN 0039-6338. S2CID 153709535.
  • Perlroth, Nicole; Sanger, David E.; Shane, Scott (6 May 2019). "How Chinese Spies Got the N.S.A.'s Hacking Tools, and Used Them for Attacks". The New York Times. ISSN 0362-4331. Retrieved 5 May 2022.