Articles and Book Chapters

1. Abbassi, P., Kaul, M., Mohan, V., Shen, Y., and Winkelman, Z. (2013). Securing the Net: Global Governance in the Digital Domain. Berlin, Beijing, and Washington, D.C.: Report for Global Governance 2022. link
2. Anderson, E., Choucri, N., Goldsmith, D., Madnick, S., Siegel, M., and Sturtevant, D. (2010). System Dynamics Modeling for Proactive Intelligence. A publication of the Air Force Research Laboratory. pdf
3. Chen, J., & Micali, S. (2011). Mechanism Design with Set-Theoretic Beliefs. IEEE 52nd Annual Symposium on Foundations of Computer Science. link
4. Chen, J., & Micali, S. (2012). Collusive Dominant-Strategy Truthfulness. Journal of Economic Theory, 147(3), 1300-1312. link
5. Chen, J., & Micali, S. (2013). The Order Independence of Iterated Dominance in Extensive Games. Theoretical Economics, 8, 125–163. link
6. Chen, J., Micali, S. and Pass, R. (2015). Tight Revenue Bounds With Possibilistic Beliefs and Level-k Rationality. Econometrica, 83, 1619–1639 link
7. Choucri, N. (2012). The Convergence of Cyberspace and Sustainability. e-International Relations. link
8. Choucri, N. (2014). Cyberpolitics. In Krieger, J. (Ed.), The Oxford companion to international relations. New York: Oxford University Press. link
9. Choucri, N. (2016). Emerging Trends in Cyberspace: Dimensions and Dilemmas. In Williams, P., & Fiddner, D. (Eds.), Cyberspace: Malevolent actors, criminal opportunities, and strategic competition. Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press. link
10. Choucri, N., and Clark, D. D. (2013). Who controls cyberspace? Bulletin of the Atomic Scientists, 69(5), 21–31. link
11. Choucri, N., and Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security. Bulletin of the Atomic Scientists, 68(2), 70–77. link
12. Choucri, N., Madnick, S., and Ferwerda, J. (2014). Institutions for Cyber Security: International Responses and Global Imperatives. Information Technology for Development, 20(2), 96–121. link
13. Clark, D. D. (2011). Protecting the Internet as a Public Commons: Introduction. Daedalus, 140(4), 5-16. link
14. Ellis, R. (2014). Regulating Cybersecurity: Institutional Learning or a Lesson in Futility? IEEE Security & Privacy, 12(6), 48-54. link
15. Finlayson, M. (2011).  Report of the AAAI 2010 Fall Symposia: Computational Models of Narrative. AI Magazine, 32(1). 96-97 . link
16. Hathaway, M. (2011). Creating the Demand Curve for Cybersecurity. International Engagement on Cyber: Establishing International Norms and Improved Cybersecurity, Georgetown Journal of International Affairs, 163-170. link
17. Hathaway, M. E. (2012). Leadership and Responsibility for Cybersecurity.  International Engagement on Cyber 2012: Establishing Norms and Improving Security, Georgetown Journal of International Affairs, 71-80. link
18. Hathaway, M. E. (2012). Falling Prey to Cybercrime: Implications for Business and the Economy. In Burns, R. N., Price, J., Nye, J. S., Scowcroft, B., Aspen Institute., & Aspen Strategy Group (U.S.). Securing cyberspace: A new domain for national security. Washington, D.C: Aspen Institute. link
19. Hathaway, M. E. and Klimburg, A. (2012). Preliminary Considerations: On National Cyber Security. In Klimburg, A., & NATO Cooperative Cyber Defence Centre of Excellence. National cyber security framework manual. Tallinn, Estonia: NATO Cooperative Cyber Defense Center of Excellence. link
20. Hathaway, M. E. (2011). NATO and the EU in Cyberspace: The Power of Both for the Good of All. Security Europe. link
21. Henschel, A., Casagrande, E., Woon, W. L., Janajreh,I., and Madnick S. (2012). A Unified Approach for Taxonomy-Based Technology Forecasting. In Zorrilla, M. E.. Business intelligence applications and the web: Models, systems and technologies. Hershey PA: Business Science Reference. link
22. Hill  J.F. (2013). A Balkanized Internet? The Uncertain Future of Global Internet Standards. International Engagement on Cyber 2012: Establishing Norms and Improving Security (2012), Georgetown Journal of International Affairs, 49-58. link
23. Hurwitz, R. (2012). Depleted Trust in the Cyber Commons. Strategic Studies Quarterly, 6 (3), 20-45. link
24. Hurwitz, R. (2013). The Disunity of Cyberspace. In Kremer, J.-F., & Müller, B. Cyberspace and international relations: Theory, prospects and challenges. Heidelberg ; New York ; Dordrecht ; London : Springer. link
25. Hurwitz, R. (2014). A New Normal? The Cultivation of Global Norms as Part of a Cyber Security Strategy. In Yannakogeorgos, P. A., & Lowther, A. Conflict and cooperation in cyberspace: The challenge to national security. Boca Raton: Taylor & Francis. link
26. Goldsmith, J. (2010). Cyberthreat, Government Network Operations, and the Fourth Amendment. Government Studies at The Brookings Institute. link
27. Kello, L. (2013). The Meaning of the Cyber Revolution: Perils to Theory and Statecraft,” International Security, 38(2),7-40.  link
28. Kello, L. (2014). Security. In  Krieger, J. (Ed.), The Oxford companion to international relations. New York : Oxford University Press. link
29. Mallery, J., and Michael R. N. (Eds.). (2011). Cloud First, Cloud Fast: Recommendation for Innovation, Leadership & Job Creation.TechAmerica Foundation. link
30. Micali, S., Peikert, C., Sudan M., and Wilson D. A. (2010). Optimal Error Correction for Computationally Bounded Noise. IEEE Transactions on Information Theory, 56(11), 5673 - 5680. link
31. Mohan, V. and Villasenor J. (2012). Decrypting the Fifth Amendment: The Limits of Self-Incrimination. University of Pennsylvania Journal of Constitutional Law Heightened Scrutiny 15, 11-28. link
32. Nye, J. S. (2011). Soft Power. In Nye, J. S. (2011). The future of power (pp. 81-109). New York: PublicAffairs. link
33. Nye, J. S. (2011). Nuclear Lessons for Cyber Security? Strategic Studies Quarterly, 5(4), 18-38. link
34. Nye, J. S. (2012), The Twenty-First Century Will Not Be a “Post-American” World. International Studies Quarterly, 56, 215–217. link
35. Nye, J. S. and Goldsmith, J. L. (2011). The Future of Power. Bulletin of the American Academy of Arts and Sciences. link
36. Odumosu, T., and Narayanamurti, V. (2011). Perspectives: Towards a Common Wireless Market: Why the FCC should promote a single interoperable technological market for mobile devices. Issues in Science and Technology, XXVIII(2). link
37. Ramirez, R., & Choucri, N. (2016). Improving Interdisciplinary Communication with Standardized Cyber Security Terminology: A Literature Review. IEEE Access, 4, 2216-2243. link
38. Vaishnav, C., Choucri, N., and Clark, D. (2013). Environ Syst Decis, 33: 561.  link
39. Winston, P. H. (2011). The Strong Story Hypothesis and the Directed Perception Hypothesis. 2011 AAAI Fall Symposium Series. link
40. Winston, P. H. (2012). The Next 50 Years: A Personal View. Biologically Inspired Cognitive Architectures, 1, 92–99. link
41. Winston, P. H. (2012). The Right Way. Advances in Cognitive Systems, 1, 23–36. link
42. Woon, W.L. and Madnick, (2012). Semantic distances for technology landscape visualization. Journal of Intelligent Information Systems, 39(1), 29-58. link
43. Xitong, L., FanY.,  Madnick,  S., and Sheng, Q. Z. (2010). A pattern-based approach to protocol mediation for web services composition. Information and Software Technology, 52 (3), 304–323. link
44. Zittrain, J. (2010). The Fourth Quadrant. Fordham Law Review, 78(6). link