


default search action
CyCon U.S. 2016: Washington, DC, USA
- Aaron F. Brantly, Paul Maxwell:

2016 International Conference on Cyber Conflict, CyCon U.S. 2016, Washington, DC, USA, October 21-23, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5258-5 - Siim Alatalu:

NATO's new cyber domain challenge. 1-8 - Edwin L. Armistead:

Suggestions to measure cyber power and proposed metrics for cyber warfare operations (cyberdeterrence/cyber power). 9-15 - Michael J. Assante:

Implications of cyber in anti-access and area-denial counters. 16-21 - Nerea M. Cal:

Crossing the rubicon: identifying and responding to an armed cyber-attack. 22-28 - Jeronymo M. A. Carvalho, Paulo C. G. Costa

:
CMIDS: collaborative MANET intrusion detection system. 29-33 - Bruce D. Caulkins, Karla A. Badillo-Urquiola, Patricia Bockelman, Rebecca A. Leis:

Cyber workforce development using a behavioral cybersecurity paradigm. 34-39 - Alfonso De Gregorio:

Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sector. 40-43 - Josiah A. B. S. Dykstra, Stephen R. Orr:

Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making. 44-49 - V. A. Greiman:

Cyber attacks: the fog of identity. 50-62 - Elsa B. Kania:

Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking. 69-85 - H. Kantola, Margarita Levin Jaitner:

Cyber defence information sharing in a federated network. 86-93 - Clara Maathuis, Wolter Pieters, Jan van den Berg:

Cyber weapons: a profiling framework. 94-101 - Suzanne J. Matthews

, Raymond W. Blaine, Aaron F. Brantly
:
Evaluating single board computer clusters for cyber operations. 102-109 - Brian M. Mazanec, Patricia Shamai

:
Stigmatizing cyber war: mission impossible? 110-117 - Jose David Mireles, Jin-Hee Cho, Shouhuai Xu:

Extracting attack narratives from traffic datasets. 118-123 - Annachiara Rotondo:

Countering cyber threats: answers from international law. 124-130 - Char Sample, Jennifer Cowley, Tim Watson, Carsten Maple:

Re-thinking threat intelligence. 131-139 - Christopher M. Spirito:

Cyber norms for civilian nuclear power plants. 140-145 - Amaël Cattaruzza, Didier Danet, Stéphane Taillat

, Arthur Laudrain
:
Sovereignty in cyberspace: Balkanization or democratization. 146-154 - Ernest Y. Wong, Nicholas M. Sambaluk:

Disruptive innovations to help protect against future threats. 155-159 - Panayotis A. Yannakogeorgos, Eneken Tikk

:
Stuxnet as cyber-enabled sanctions enforcement. 160-165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














