default search action
CyCon U.S. 2016: Washington, DC, USA
- Aaron F. Brantly, Paul Maxwell:
2016 International Conference on Cyber Conflict, CyCon U.S. 2016, Washington, DC, USA, October 21-23, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5258-5 - Siim Alatalu:
NATO's new cyber domain challenge. 1-8 - Edwin L. Armistead:
Suggestions to measure cyber power and proposed metrics for cyber warfare operations (cyberdeterrence/cyber power). 9-15 - Michael J. Assante:
Implications of cyber in anti-access and area-denial counters. 16-21 - Nerea M. Cal:
Crossing the rubicon: identifying and responding to an armed cyber-attack. 22-28 - Jeronymo M. A. Carvalho, Paulo C. G. Costa:
CMIDS: collaborative MANET intrusion detection system. 29-33 - Bruce D. Caulkins, Karla A. Badillo-Urquiola, Patricia Bockelman, Rebecca A. Leis:
Cyber workforce development using a behavioral cybersecurity paradigm. 34-39 - Alfonso De Gregorio:
Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sector. 40-43 - Josiah A. B. S. Dykstra, Stephen R. Orr:
Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making. 44-49 - V. A. Greiman:
Cyber attacks: the fog of identity. 50-62 - Elsa B. Kania:
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking. 69-85 - H. Kantola, Margarita Levin Jaitner:
Cyber defence information sharing in a federated network. 86-93 - Clara Maathuis, Wolter Pieters, Jan van den Berg:
Cyber weapons: a profiling framework. 94-101 - Suzanne J. Matthews, Raymond W. Blaine, Aaron F. Brantly:
Evaluating single board computer clusters for cyber operations. 102-109 - Brian M. Mazanec, Patricia Shamai:
Stigmatizing cyber war: mission impossible? 110-117 - Jose David Mireles, Jin-Hee Cho, Shouhuai Xu:
Extracting attack narratives from traffic datasets. 118-123 - Annachiara Rotondo:
Countering cyber threats: answers from international law. 124-130 - Char Sample, Jennifer Cowley, Tim Watson, Carsten Maple:
Re-thinking threat intelligence. 131-139 - Christopher M. Spirito:
Cyber norms for civilian nuclear power plants. 140-145 - Amaël Cattaruzza, Didier Danet, Stéphane Taillat, Arthur Laudrain:
Sovereignty in cyberspace: Balkanization or democratization. 146-154 - Ernest Y. Wong, Nicholas M. Sambaluk:
Disruptive innovations to help protect against future threats. 155-159 - Panayotis A. Yannakogeorgos, Eneken Tikk:
Stuxnet as cyber-enabled sanctions enforcement. 160-165
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.