{"has_more":true,"total_items":25,"items":[{"vg_id":0,"published_date":2012,"journal":"J. OF CONFLICT & SEC. L","volume":187,"page_from":202,"title":"Cyber Security without Cyber War, 2","authors":[{"author_name":"Mary Ellen"},{"author_name":"O' Connell"}],"page_to":203},{"vg_id":0,"journal":"Military and Paramilitary Activities, supra note 12"},{"vg_id":0,"published_date":2010,"journal":"THE NEXT THREAT TO NATIONAL SECURITY AND WHAT TO DO ABOUT IT 287","title":"Defining a logic bomb as \"[a] software application or series of instruction that cause a system or network to shut down and","authors":[{"author_name":"Richard A See"},{"author_name":" Clarke & Robert K"},{"author_name":"Cyber Knake"},{"author_name":" War"}]},{"vg_id":0,"published_date":2009,"journal":"Íž See also Securing the Modern Electric Grid from Physical and Cyber Attacks: Hearing Before the Subcomm. on Emerging Threats, Cybersecurity, and Sci. and Tech. of the H. Comm. on Homeland Sec., 111th Cong","volume":2,"title":"If you believe intelligence sources, our grid is already compromised. An April 2009 article in the Wall Street Journal cited intelligence forces who claim that 'the grid has already been penetrated by cyber intruders from Russia and China"}]}