Herbert Lin

Center for International Security and Cooperation

Senior Research Scholar for Cyber Policy and Security

Stanford, CA California 94305

United States

Hoover Institution

Research Fellow

Stanford, CA 94305-6010

United States

SCHOLARLY PAPERS

4

DOWNLOADS
Rank 31,588

SSRN RANKINGS

Top 31,588

in Total Papers Downloads

1,242

CITATIONS

0

Scholarly Papers (4)

1.

On Cyber-Enabled Information/Influence Warfare and Manipulation

in an Oxford Handbook of Cybersecurity, 2018 Forthcoming
Number of pages: 29 Posted: 11 Aug 2017 Last Revised: 14 Aug 2017
Herbert Lin and Jaclyn Kerr
Center for International Security and Cooperation and Georgetown University
Downloads 0 (102,280)

Abstract:

Loading...

cybersecurity, information warfare, influence operations, hybrid warfare, ambiguous warfare

2.

Attribution of Malicious Cyber Incidents: From Soup to Nuts

Columbia Journal of International Affairs, Forthcoming, Hoover Institution Aegis Paper Series on National Security, Technology, and Law, (2016)
Number of pages: 57 Posted: 09 Sep 2016 Last Revised: 02 Oct 2016
Herbert Lin
Center for International Security and Cooperation
Downloads 0 (40,734)

Abstract:

Loading...

cyberwar, cybersecurity, cyber conflict, cyber crime, attribution, cyber attack

3.

Rules of Engagement for Cyberspace Operations: A View from the United States

Journal of Cybersecurity 3(1), March 2017
Number of pages: 32 Posted: 08 Sep 2016 Last Revised: 09 Aug 2017
Robert Kehler, Herbert Lin and Michael Sulmeyer
U.S. Air Force (ret.), Center for International Security and Cooperation and Harvard University - Belfer Center for Science and International Affairs
Downloads 0 (196,345)

Abstract:

Loading...

Rules of Engagement, Command and Control, Escalation, Offensive Cyber Operations, Cyber Weapons

4.

Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

Number of pages: 24 Posted: 15 Jul 2016 Last Revised: 09 Aug 2017
Steven M. Bellovin, Susan Landau and Herbert Lin
Columbia University - Department of Computer Science, Worcester Polytechnic Institute (WPI) and Center for International Security and Cooperation
Downloads 0 (99,890)

Abstract:

Loading...

cyber target, cyber attack, laws of war, laws of armed conflict, proportionality, collateral damage, indiscriminate weapons Cyber Arms Control