default search action
5th CyCon 2013: Tallinn, Estonia
- Karlis Podins, Jan Stinissen, Markus Maybaum:
5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013. IEEE 2013, ISBN 978-1-4799-0450-1 - Gabriel Jakobson, Rain Ottis:
Foreword. 1-3 - Karlis Podins, Jan Stinissen, Markus Maybaum:
Introduction. 1-4
Chapter 1. Cyber Space - Automatic Information Sharing and Access
- Luc Dandurand, Oscar Serrano Serrano:
Towards improved cyber security information sharing. 1-16 - Owen McCusker, Scott Brunza, Dipankar Dasgupta:
Deriving behavior primitives from aggregate network features using support vector machines. 1-18 - Alexander V. Smirnov, Alexey M. Kashevnik, Nikolay Shilov, Nikolay Teslya:
Context-based access control model for smart space. 1-15 - Jorge L. Hernandez-Ardieta, Juan E. Tapiador, Guillermo Suarez-Tangil:
Information sharing models for cooperative cyber defence. 1-28
Chapter 2. Attack Modeling - Washing Away the Borders between Cyber and Kinetic Attacks
- Kim Hartmann, Christoph Steup:
The vulnerability of UAVs to cyber attacks - An approach to the risk assessment. 1-23 - Igor V. Kotenko, Andrey Chechulin:
A Cyber Attack Modeling and Impact Assessment framework. 1-24 - Jeffrey L. Caton:
Exploring the prudent limits of automated cyber attack. 1-16 - Scott D. Applegate:
The dawn of Kinetic Cyber. 1-15
Chapter 3. Cyber Attack Threat Assessment and Impact Propagation
- David Raymond, Gregory J. Conti, Tom Cross, Robert Fanelli:
A control measure framework to limit collateral damage and propagation of cyber weapons. 1-16 - Barry Irwin:
A baseline study of potentially malicious activity across five network telescopes. 1-17 - Kaarel Kalm:
Illicit network structures in cyberspace. 1-13 - Michael J. Covington, Rush Carskadden:
Threat implications of the Internet of Things. 1-12 - William H. Boothby:
Cyber deception and autonomous attack - Is there a legal problem? 1-17 - Janine S. Hiller:
Legal aspects of a cyber immune system. 1-15 - Gregory J. Conti, John Nelson, David Raymond:
Towards a cyber common operating picture. 1-17
Chapter 4. Cyber Command - Towards Automatic Operations
- Jeffrey L. Caton:
Complexity and emergence in ultra-tactical cyberspace operations. 1-14 - Daniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla:
Patterns of a cooperative malware analysis workflow. 1-18 - Robert Koch, Mario Golling:
Architecture for evaluating and correlating NIDS in real - World networks. 1-20 - Gabriel Jakobson:
Mission-centricity in cyber security: Architecting cyber attack resilient missions. 1-18 - Alessandro Guarino:
Autonomous intelligent agents in cyber offence. 1-12 - Jody M. Prescott:
Autonomous decision-making processes and the responsible cyber commander. 1-18
Chapter 5. Cyber Conflict - Politics, Semantics, Ethics and Moral
- Keir Giles, William Hagestad:
Divided by a common language: Cyber definitions in Chinese, Russian and English. 1-17 - Scott D. Applegate, Angelos Stavrou:
Towards a Cyber Conflict Taxonomy. 1-18 - Emilio Iasiello:
Cyber attack: A dull tool to shape foreign policy. 1-18 - Shannon Vallor:
The future of military virtue: Autonomous systems and the moral deskilling of the military. 1-15 - John P. Sullins:
An ethical analysis of the case for robotic weapons arms control. 1-20
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.