![Cyber Operating Models](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
![Cyber Operating Models](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
![](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
![](/assets/artwork/1x1-42817eea7ade52607a760cbee00d1495.gif)
Cyber Operating Models
Publisher Description
This research focuses on the actual effects of offensive cyber tools in state and commercial infrastructure during dyadic cyber conflicts to determine if the conflict trends towards escalation or deescalation.