default search action
CyCon U.S. 2017: Washington, DC, USA
- Edward Sobiesk, Daniel Bennett, Paul Maxwell:
2017 International Conference on Cyber Conflict, CyCon U.S. 2017, Washington, DC, USA, November 7-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2379-4
Mission Assurance Paper Track
- Daniel Trimble, Jonathon Monken, Alexander F. L. Sand:
A framework for cybersecurity assessments of critical port infrastructure. 1-7 - Antoine Lemay, Scott Knight:
A timing-based covert channel for SCADA networks. 8-15 - John M. Willis, Robert F. Mills, Logan O. Mailloux, Scott R. Graham:
Considerations for secure and resilient satellite architectures. 16-22
Cyber Policy Paper Track
- Rebecca K. Lively, Maj Sara Dayton Curran:
Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help. 23-28 - Jim Q. Chen:
Take the rein of cyber deterrence. 29-35 - Jason Healey:
What might be predominant form of cyber conflict? 36-44
International Cyber Issues Paper Track
- Monica M. Ruiz:
Establishing volunteer US cyber defense units: A holistic approach. 45-58 - Siim Alatalu:
One year after Warsaw: The growing need for a NATO cyber command. 59-66 - Peter Z. Stockburger:
The control & capabilities test: How a new legal regime is shaping attribution in cyberspace. 67-75
Emerging Technologies Paper Track
- Joey Rivera:
Cyber security via formal methods: A framework for implementing formal methods. 76-81 - Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian:
Proactive identification of exploits in the wild through vulnerability mentions online. 82-88 - Elsa B. Kania, John K. Costello:
Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability. 89-96
Cyber Operations Paper Track
- Stephen W. Hart, Mark C. Klink:
1st Troll Battalion: Influencing military and strategic operations through cyber-personas. 97-104 - Jeffrey Guion, Mark Reith:
Cyber terrain mission mapping: Tools and methodologies. 105-111 - Rock Stevens:
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems. 112-118
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.