These are the sources and citations used to research lkh;lj. This bibliography was generated on Cite This For Me on
In-text: (Borghard and Lonergan, 2017)
Your Bibliography: Borghard, E. and Lonergan, S., 2017. The Logic of Coercion in Cyberspace. Security Studies, 26(3), pp.452-481.
In-text: (Borghard and Lonergan, 2021)
Your Bibliography: Borghard, E. and Lonergan, S., 2021. Deterrence by denial in cyberspace. Journal of Strategic Studies, [online] pp.1-36. Available at: <https://www.tandfonline.com/doi/pdf/10.1080/01402390.2021.1944856?needAccess=true>.
In-text: (Brantly, 2018)
Your Bibliography: Brantly, A., 2018. The Cyber Deterrence Problem. [online] Available at: <https://ccdcoe.org/uploads/2018/10/Art-02-The-Cyber-Deterrence-Problem.pdf>.
In-text: (Lindsay and Gartzke, 2019)
Your Bibliography: Lindsay, J. and Gartzke, E., 2019. Cross-domain deterrence: Strategy in an Era of Complexity. Oxford University Press.
In-text: (Schelling, 1967)
Your Bibliography: Schelling, T., 1967. Arms and influence, 3. printing. New Haven, conn., Yale University Press.
10,587 students joined last month!