default search action
12th CyCon 2020: Virtual event, Estonia
- 12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020. IEEE 2020, ISBN 9789-949-9904-7-4
- Jeff Kosseff:
Retorsion as a Response to Ongoing Malign Cyber Operations. 9-23 - Przemyslaw Roguski:
Collective Countermeasures in Cyberspace - Lex Lata, Progressive Development or a Bad Idea? 25-42 - Neal Kushwaha, Przemyslaw Roguski, Bruce W. Watson:
Up in the Air: Ensuring Government Data Sovereignty in the Cloud. 43-61 - Livinus Obiora Nweke, Stephen D. Wolthusen:
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection. 63-78 - Aleksi Kajander
, Agnes Kasper, Evhen Tsybulenko
:
Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva Conventions. 79-95 - Ivana Kudlácková, David Wallace, Jakub Harasta
:
Cyber Weapons Review in Situations Below the Threshold of Armed Conflict. 97-112 - Tina J. Park, Michael Switzer:
R2P & Cyberspace: Sovereignty as a Responsibility. 113-127 - Bilyana Lilly, Joe Cheravitch:
The Past, Present, and Future of Russia's Cyber Strategy and Forces. 129-155 - Frédérick Douzet, Louis Pétiniaud, Loqman Salamatian, Kévin Limonier, Kavé Salamatian
, Thibaut Alchus:
Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis. 157-182 - Matthias Schulze:
Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations. 183-197 - Martin C. Libicki:
Correlations Between Cyberspace Attacks and Kinetic Attacks. 199-213 - Christopher Whyte:
Problems of Poison: New Paradigms and "Agreed" Competition in the Era of AI-Enabled Cyber Operations. 215-232 - Kim Hartmann, Keir Giles:
The Next Generation of Cyber-Enabled Information Warfare. 233-250 - Jason Healey, Neil Jenkins, J. D. Work:
Defenders Disrupting Adversaries: Framework, Dataset, and Case Studies of Disruptive Counter-Cyber Operations. 251-274 - Michael Dodson, Alastair R. Beresford, Mikael Vingaard:
Using Global Honeypot Networks to Detect Targeted ICS Attacks. 275-291 - Gilberto Pires de Azevedo, Paulo César Pellanda
, Maxli Barroso Campos:
Addressing the Cybersecurity Challenges of Electrical Power Systems of the Future. 293-308 - Arturs Lavrenovs
, Roman Graf, Kimmo Heinäaro:
Towards Classifying Devices on the Internet Using Artificial Intelligence. 309-325 - Kim Hartmann, Christoph Steup:
Hacking the AI - the Next Generation of Hijacked Systems. 327-349 - Lubjana Beshaj, Andrew O. Hall
:
Recent Developments in Cryptography. 351-368
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.