The cyber attack on Saudi Aramco C Bronk, E Tikk-Ringas Survival 55 (2), 81-96, 2013 | 274 | 2013 |
Cyber security and critical energy infrastructure I Onyeji, M Bazilian, C Bronk The Electricity Journal 27 (2), 52-60, 2014 | 130 | 2014 |
Cybersecurity: public sector threats and responses KJ Andreasson Taylor & Francis, 2011 | 80 | 2011 |
Hack or attack? Shamoon and the Evolution of Cyber Conflict C Bronk, E Tikk-Ringas Institute for Public Policy Rice University, 1-30, 2013 | 52 | 2013 |
Repression, education, and politically motivated cyberattacks V Asal, J Mauslein, A Murdie, J Young, K Cousins, C Bronk Journal of Global Security Studies 1 (3), 235-247, 2016 | 36 | 2016 |
Routledge handbook of defence studies DJ Galbreath, JR Deni Routledge, 2018 | 28 | 2018 |
Shadowy figures: tracking illicit financial transactions in the murky world of digital currencies, peer-to-peer networks, and mobile device payments J Villasenor, C Monk, C Bronk Brookings Institution, 2011 | 27 | 2011 |
Innovation for sustainability in information and communication technologies (ICT) C Bronk, A Lingamneni, K Palem James A Baker III Institute for Public Policy Rice University, 2010 | 24 | 2010 |
Diplopedia imagined: Building state's diplomacy wiki C Bronk, T Smith 2010 International Symposium on Collaborative Technologies and Systems, 593-602, 2010 | 24 | 2010 |
Hacking the nation-state: Security, information technology and policies of assurance C Bronk Information Security Journal: A Global Perspective 17 (3), 132-142, 2008 | 19 | 2008 |
The dark side of cyber finance C Bronk, C Monk, J Villasenor Survival 54 (2), 129-142, 2012 | 18 | 2012 |
Exploiting military OpSec through open-source vulnerabilities JC Dressler, C Bronk, DS Wallach MILCOM 2015-2015 IEEE Military Communications Conference, 450-458, 2015 | 17 | 2015 |
Critical energy infrastructure and the evolution of cybersecurity P Sanders, C Bronk, MD Bazilian The Electricity Journal 35 (10), 107224, 2022 | 16 | 2022 |
Cyber threat: The rise of information geopolitics in us national security C Bronk Bloomsbury Publishing USA, 2016 | 15 | 2016 |
Blown to Bits C Bronk Understanding Cybersecurity: Emerging Governance and Strategy, 109, 2018 | 13 | 2018 |
Hacks on gas: energy, cybersecurity, and us defense C Bronk James A. Baker III Institute for Public Policy, Rice University, 2014 | 13 | 2014 |
Mexico–United States border security: From a bilateral to a truly binational policy process C Bronk, B González‐Aréchiga Latin American Policy 2 (2), 152-181, 2011 | 13 | 2011 |
Who’s in charge and how does it work? US cybersecurity of critical infrastructure C Bronk, WA Conklin Journal of Cyber Policy 7 (2), 155-174, 2022 | 10 | 2022 |
Encounter Battle: Engaging ISIL in Cyberspace GSA C Bronk The Cyber Defense Review 2 (1), 93-108, 2017 | 9 | 2017 |
An analysis of chinese search engine filtering T Zhu, C Bronk, DS Wallach arXiv preprint arXiv:1107.3794, 2011 | 9 | 2011 |