Skip to Main Content

Combatant Commands

Unified Geographic and Functional Combatant Commands of the United States Department of Defense

Introduction

US Cyber Command (USCYBERCOM or CYBERCOM) is headquartered in Fort Meade, Maryland and one of four functional combatant commands of the United States.

Cyber Command: Mission and Vision

Cyber Command:  History | News

Use this page to find selected resources on the study of the US Cyber Command and support operations in the space domain, including references, books, research reports, articles, journals and websites.

Background Research

Research Tools

Books

To look for an ebook, enter your search terms and click Search:

Print Collection:  Use Online Catalog to find printed book titles at the library, some also available in digital form.

Research Reports

Security Studies on JSTOR is an excellent resource to find research reports from different policy institutes in the field of security studies.  Keyword is the default search in JSTOR with the option to refine results by publication year, content type and subject.  Advanced Search allows more precise searching. 

Below are some reports from this collection:

A variety of quality, open access reports are also available from government and private research organizations.  Important sources include:

Below is a selected list of reports from different research and government institutions:

Journals

Enter Journal Title to check for full-text availability and coverage periods in all library collections:

Search Terms

There are many research topics for the study of military and security studies. Below is a selected list of search terms that may be helpful to find information on security issues or threats facing the United States in the cyberspace domain:

  • Artificial intelligence
  • Big data
  • Biosurveillance
  • Computer networks
  • Computer viruses
  • Counterterrorism
  • Cyber campaigns
  • Cyber deterrence
  • Cyber espionage
  • Cyber power
  • Cyber strategy
  • Cyber threat
  • Cyber war / warfare
  • Cyber weapons
  • Cybercrime
  • Cybersecurity
  • Cyberspace operations
  • Cyberspace threats
  • Data privacy
  • Data sharing
  • Deceptiion
  • Deterrence
  • Denial-of-service attacks
  • Digital infrastructure
  • Digital weapons
  • Disruption
  • DODIN operations
  • Electronic intelligence
  • Electronic warfare
  • Emerging technologies
  • Escalation
  • Exploitation
  • Global competition
  • Globalization
  • GPS signals
  • Great power competition
  • Hacking
  • Industrial espionage
  • Infiltration
  • Information advantage
  • Information network
  • Information security domain
  • Infrastructure protection
  • Infrastructure security
  • Internet of Things
  • ISR
  • Machine learning
  • Malicious activities
  • Malware
  • Military information
  • National security
  • Network warfare operations
  • Nuclear weapons
  • Online conflict
  • Power projection
  • Ransomware
  • Resource security
  • Security alliances
  • Security espionage
  • Situational awareness
  • Social engineering
  • Strategic intelligence
  • Terrorism
  • Thinking machines
  • Virtual battlefield
  • Virtual societal warfare
  • Viruses
  • Vulnerability assessment
  • Wargames
  • Worm (Stuxnet)
  • Zero-day attacks
  • Zero-day vulnerabilities