:facetid:toc:\"db/conf/cyconus/cyconus2016.bht\"OK:facetid:toc:db/conf/cyconus/cyconus2016.bhtSiim AlataluNATO's new cyber domain challenge.CyCon U.S.1-82016Conference and Workshop Papersclosedconf/cyconus/Alatalu1610.1109/CYCONUS.2016.7836609https://doi.org/10.1109/CYCONUS.2016.7836609https://dblp.org/rec/conf/cyconus/Alatalu16URL#3230766Edwin L. ArmisteadSuggestions to measure cyber power and proposed metrics for cyber warfare operations (cyberdeterrence/cyber power).CyCon U.S.9-152016Conference and Workshop Papersclosedconf/cyconus/Armistead1610.1109/CYCONUS.2016.7836610https://doi.org/10.1109/CYCONUS.2016.7836610https://dblp.org/rec/conf/cyconus/Armistead16URL#3230767Michael J. AssanteImplications of cyber in anti-access and area-denial counters.CyCon U.S.16-212016Conference and Workshop Papersclosedconf/cyconus/Assante1610.1109/CYCONUS.2016.7836611https://doi.org/10.1109/CYCONUS.2016.7836611https://dblp.org/rec/conf/cyconus/Assante16URL#3230768Nerea M. CalCrossing the rubicon: identifying and responding to an armed cyber-attack.CyCon U.S.22-282016Conference and Workshop Papersclosedconf/cyconus/Cal1610.1109/CYCONUS.2016.7836612https://doi.org/10.1109/CYCONUS.2016.7836612https://dblp.org/rec/conf/cyconus/Cal16URL#3230769Jeronymo M. A. CarvalhoPaulo C. G. CostaCMIDS: collaborative MANET intrusion detection system.CyCon U.S.29-332016Conference and Workshop Papersclosedconf/cyconus/CarvalhoC1610.1109/CYCONUS.2016.7836613https://doi.org/10.1109/CYCONUS.2016.7836613https://dblp.org/rec/conf/cyconus/CarvalhoC16URL#3230770Amaël CattaruzzaDidier DanetStéphane TaillatArthur LaudrainSovereignty in cyberspace: Balkanization or democratization.CyCon U.S.146-1542016Conference and Workshop Papersclosedconf/cyconus/CattaruzzaDTL1610.1109/CYCONUS.2016.7836628https://doi.org/10.1109/CYCONUS.2016.7836628https://dblp.org/rec/conf/cyconus/CattaruzzaDTL16URL#3230771Bruce D. CaulkinsKarla A. Badillo-UrquiolaPatricia BockelmanRebecca A. LeisCyber workforce development using a behavioral cybersecurity paradigm.CyCon U.S.34-392016Conference and Workshop Papersclosedconf/cyconus/CaulkinsBBL1610.1109/CYCONUS.2016.7836614https://doi.org/10.1109/CYCONUS.2016.7836614https://dblp.org/rec/conf/cyconus/CaulkinsBBL16URL#3230772Josiah A. B. S. DykstraStephen R. OrrActing in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making.CyCon U.S.44-492016Conference and Workshop Papersclosedconf/cyconus/DykstraO1610.1109/CYCONUS.2016.7836616https://doi.org/10.1109/CYCONUS.2016.7836616https://dblp.org/rec/conf/cyconus/DykstraO16URL#3230773Alfonso De GregorioVulnerabilities and their surrounding ethical questions: a code of ethics for the private sector.CyCon U.S.40-432016Conference and Workshop Papersclosedconf/cyconus/Gregorio1610.1109/CYCONUS.2016.7836615https://doi.org/10.1109/CYCONUS.2016.7836615https://dblp.org/rec/conf/cyconus/Gregorio16URL#3230774V. A. GreimanCyber attacks: the fog of identity.CyCon U.S.50-622016Conference and Workshop Papersclosedconf/cyconus/Greiman1610.1109/CYCONUS.2016.7836617https://doi.org/10.1109/CYCONUS.2016.7836617https://dblp.org/rec/conf/cyconus/Greiman16URL#3230775Elsa B. KaniaCyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking.CyCon U.S.69-852016Conference and Workshop Papersclosedconf/cyconus/Kania1610.1109/CYCONUS.2016.7836619https://doi.org/10.1109/CYCONUS.2016.7836619https://dblp.org/rec/conf/cyconus/Kania16URL#3230776H. KantolaMargarita Levin JaitnerCyber defence information sharing in a federated network.CyCon U.S.86-932016Conference and Workshop Papersclosedconf/cyconus/KantolaJ1610.1109/CYCONUS.2016.7836620https://doi.org/10.1109/CYCONUS.2016.7836620https://dblp.org/rec/conf/cyconus/KantolaJ16URL#3230777Clara MaathuisWolter PietersJan van den BergCyber weapons: a profiling framework.CyCon U.S.94-1012016Conference and Workshop Papersclosedconf/cyconus/MaathuisPB1610.1109/CYCONUS.2016.7836621https://doi.org/10.1109/CYCONUS.2016.7836621https://dblp.org/rec/conf/cyconus/MaathuisPB16URL#3230778Suzanne J. MatthewsRaymond W. BlaineAaron F. BrantlyEvaluating single board computer clusters for cyber operations.CyCon U.S.102-1092016Conference and Workshop Papersclosedconf/cyconus/MatthewsBB1610.1109/CYCONUS.2016.7836622https://doi.org/10.1109/CYCONUS.2016.7836622https://dblp.org/rec/conf/cyconus/MatthewsBB16URL#3230779Brian M. MazanecPatricia ShamaiStigmatizing cyber war: mission impossible?CyCon U.S.110-1172016Conference and Workshop Papersclosedconf/cyconus/MazanecS1610.1109/CYCONUS.2016.7836623https://doi.org/10.1109/CYCONUS.2016.7836623https://dblp.org/rec/conf/cyconus/MazanecS16URL#3230780Jose David MirelesJin-Hee ChoShouhuai XuExtracting attack narratives from traffic datasets.CyCon U.S.118-1232016Conference and Workshop Papersclosedconf/cyconus/MirelesCX1610.1109/CYCONUS.2016.7836624https://doi.org/10.1109/CYCONUS.2016.7836624https://dblp.org/rec/conf/cyconus/MirelesCX16URL#3230781Annachiara RotondoCountering cyber threats: answers from international law.CyCon U.S.124-1302016Conference and Workshop Papersclosedconf/cyconus/Rotondo1610.1109/CYCONUS.2016.7836625https://doi.org/10.1109/CYCONUS.2016.7836625https://dblp.org/rec/conf/cyconus/Rotondo16URL#3230782Char SampleJennifer CowleyTim WatsonCarsten MapleRe-thinking threat intelligence.CyCon U.S.131-1392016Conference and Workshop Papersclosedconf/cyconus/SampleCWM1610.1109/CYCONUS.2016.7836626https://doi.org/10.1109/CYCONUS.2016.7836626https://dblp.org/rec/conf/cyconus/SampleCWM16URL#3230783Christopher M. SpiritoCyber norms for civilian nuclear power plants.CyCon U.S.140-1452016Conference and Workshop Papersclosedconf/cyconus/Spirito1610.1109/CYCONUS.2016.7836627https://doi.org/10.1109/CYCONUS.2016.7836627https://dblp.org/rec/conf/cyconus/Spirito16URL#3230784Ernest Y. WongNicholas M. SambalukDisruptive innovations to help protect against future threats.CyCon U.S.155-1592016Conference and Workshop Papersclosedconf/cyconus/WongS1610.1109/CYCONUS.2016.7836629https://doi.org/10.1109/CYCONUS.2016.7836629https://dblp.org/rec/conf/cyconus/WongS16URL#3230785Panayotis A. YannakogeorgosEneken TikkStuxnet as cyber-enabled sanctions enforcement.CyCon U.S.160-1652016Conference and Workshop Papersclosedconf/cyconus/YannakogeorgosT1610.1109/CYCONUS.2016.7836630https://doi.org/10.1109/CYCONUS.2016.7836630https://dblp.org/rec/conf/cyconus/YannakogeorgosT16URL#3230786Aaron F. BrantlyPaul Maxwell2016 International Conference on Cyber Conflict, CyCon U.S. 2016, Washington, DC, USA, October 21-23, 2016CyCon U.S.IEEE Computer Society2016Editorshipconf/cyconus/2016https://ieeexplore.ieee.org/xpl/conhome/7836073/proceedinghttps://dblp.org/rec/conf/cyconus/2016URL#3358997