Zacytuj

[1] Bobric G., Proliferation of the means and methods in the fifth operational domain, in the 25th Student’s International Conference SECOSAFT, Sibiu, 2020.Search in Google Scholar

[2] Krepinevich, A.F., Watts, B., Meeting the Anti-Access and Area-Denial Challenge, 2003, online at: https://csbaonline.org/research/publications/a2ad-anti-access-area-denialSearch in Google Scholar

[3] Cliff, R., et all, Entering the Dragon’s Lair. Chinese Antiaccess Strategies and Their Implications for the United States, Library of Congress Cataloging-in-Publication Data, 2007, p. 23.Search in Google Scholar

[4] Smura, T., Russian Anti-Access Area Denial (A2/AD) capabilities - implications for NATO, 2016, online at: https://pulaski.pl/en/russian-anti-access-area-denial-a2ad-capabilities-implications-for-nato/Search in Google Scholar

[5] ***, Use of Fancy Bear Android malware in tracking of ukrainian field artillery units, 2016, online at: https://www.crowdstrike.com/resources/reports/idc-vendor-profile-crowdstrike-2/Search in Google Scholar

[6] Delerue, F., Cyber Operations and International Law, Cambridge University Press, Cambridge, 2020, p. 489.10.1017/9781108780605Search in Google Scholar

[7] Cîmpanu, C., Russia successfully disconnected from the internet, 2019, online at: https://www.zdnet.com/article/russia-successfully-disconnected-from-the-internet/Search in Google Scholar

[8] Alcazar, V., Crisis Management and the Anti-Access/Area Denial Problem, in Strategic Studies Quaterly, Vol. 6, No. 4, Air University Press, 2012, pp. 50-52.Search in Google Scholar

[9] Dinicu, A., Cyber threats to national security. Specific features and actors involved, in the Scientific Bulletin of the “Nicolae Bălcescu” Land Forces Academy, No. 38, “Nicolae Bălcescu” Land Forces Academy Press, Sibiu, 2014, p. 111.Search in Google Scholar

eISSN:
2451-3113
ISSN:
1843-6722
Język:
Angielski