Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Martin C. Libicki is active.

Publication


Featured researches published by Martin C. Libicki.


Archive | 2016

A Framework for Programming and Budgeting for Cybersecurity

John Ii S Davis; Martin C. Libicki; Stuart E. Johnson; Jason Kumar; Michael Watson; Andrew Karode

Cybersecurity professionals are faced with the dilemma of selecting from a large set of cybersecurity defensive measures while operating with a limited set of resources with which to employ the measures. This report explains the menu of actions for defending an organization against cyberattack and recommends an approach for organizing the range of actions and evaluating cybersecurity defensive activities.


Archive | 2015

The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017

Eric Heginbotham; Michael Nixon; Forrest E. Morgan; Jacob Heim; Jeff Hagen; Sheng Li; Jeffrey Engstrom; Martin C. Libicki; Paul DeLuca; David A. Shlapak


Archive | 2007

Byting Back -- Regaining Information Superiority Against 21st-Century Insurgents

Martin C. Libicki; David C. Gompert; David R. Frelinger; Raymond C. Smith


Archive | 2009

Underkill. Scalable Capabilities for Military Operations Amid Populations

David C. Gompert; Stuart E. Johnson; Martin C. Libicki; David R. Frelinger; John Gordon; Raymond C. Smith; Camille A. Sawak


Archive | 2015

Acquisition of Space Systems. Volume 7. Past Problems and Future Challenges

Yool Kim; Elliot Axelband; Abby Doll; Mel Eisman; Myron Hura; Edward G Keating; Martin C. Libicki; Bradley Martin; Michael E McMahon; Jerry M. Sollinger


Archive | 2011

Root Cause Analyses of Nunn-McCurdy Breaches, Volume 1

Irv Blickstein; Michael Boito; Jeffrey A. Drezner; James Dryden; Kenneth Horn; James G. Kallimani; Martin C. Libicki; Megan McKernan; Roger C. Molander; Charles Nemfakos; Chad J. R. Ohlandt; Caroline R. Milne; Rena Rudavsky; Jerry M. Sollinger; Katharine Watkins Webb; Carolyn Wong


Archive | 2011

Influences on the Adoption of Multifactor Authentication

Martin C. Libicki; Edward Balkovich; Brian A. Jackson; Rena Rudavsky; Katharine Watkins Webb


Archive | 2011

Root Cause Analyses of Nunn-McCurdy Breaches, Volume 1: Zumwalt-Class Destroyer, Joint Strike Fighter, Longbow Apache and Wideband Global Satellite

Irv Blickstein; Michael Boito; Jeffrey A. Drezner; James Dryden; Kenneth Horn; James G. Kallimani; Martin C. Libicki; Megan McKernan; Roger C. Molander; Charles Nemfakos


Archive | 2010

What Should Be Classified? A Framework with Application to the Global Force Management Data Initiative

Martin C. Libicki; Brian A. Jackson; David R. Frelinger; Beth E. Lachman; Cesse Cameron Ip; Nidhi Kalra


Archive | 2015

Chinese Attacks on U.S. Air Bases in Asia

Eric Heginbotham; Michael Nixon; Forrest E. Morgan; Jacob Heim; Jeff Hagen; Sheng Tao Li; Jeffrey Engstrom; Martin C. Libicki; Paul DeLuca; David A. Shlapak; David R. Frelinger; Burgess Laird; Kyle Brady; Lyle J. Morris

Collaboration


Dive into the Martin C. Libicki's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge