


default search action
5th CyCon 2013: Tallinn, Estonia
- Karlis Podins, Jan Stinissen, Markus Maybaum:

5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013. IEEE 2013, ISBN 978-1-4799-0450-1 - Gabriel Jakobson, Rain Ottis:

Foreword. 1-3 - Karlis Podins, Jan Stinissen, Markus Maybaum:

Introduction. 1-4
Chapter 1. Cyber Space - Automatic Information Sharing and Access
- Luc Dandurand, Oscar Serrano Serrano:

Towards improved cyber security information sharing. 1-16 - Owen McCusker, Scott Brunza, Dipankar Dasgupta:

Deriving behavior primitives from aggregate network features using support vector machines. 1-18 - Alexander V. Smirnov, Alexey M. Kashevnik, Nikolay Shilov, Nikolay Teslya:

Context-based access control model for smart space. 1-15 - Jorge L. Hernandez-Ardieta, Juan E. Tapiador, Guillermo Suarez-Tangil:

Information sharing models for cooperative cyber defence. 1-28
Chapter 2. Attack Modeling - Washing Away the Borders between Cyber and Kinetic Attacks
- Kim Hartmann, Christoph Steup:

The vulnerability of UAVs to cyber attacks - An approach to the risk assessment. 1-23 - Igor V. Kotenko, Andrey Chechulin:

A Cyber Attack Modeling and Impact Assessment framework. 1-24 - Jeffrey L. Caton:

Exploring the prudent limits of automated cyber attack. 1-16 - Scott D. Applegate:

The dawn of Kinetic Cyber. 1-15
Chapter 3. Cyber Attack Threat Assessment and Impact Propagation
- David Raymond, Gregory J. Conti, Tom Cross, Robert Fanelli:

A control measure framework to limit collateral damage and propagation of cyber weapons. 1-16 - Barry Irwin:

A baseline study of potentially malicious activity across five network telescopes. 1-17 - Kaarel Kalm:

Illicit network structures in cyberspace. 1-13 - Michael J. Covington, Rush Carskadden:

Threat implications of the Internet of Things. 1-12 - William H. Boothby:

Cyber deception and autonomous attack - Is there a legal problem? 1-17 - Janine S. Hiller:

Legal aspects of a cyber immune system. 1-15 - Gregory J. Conti, John Nelson, David Raymond:

Towards a cyber common operating picture. 1-17
Chapter 4. Cyber Command - Towards Automatic Operations
- Jeffrey L. Caton:

Complexity and emergence in ultra-tactical cyberspace operations. 1-14 - Daniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla:

Patterns of a cooperative malware analysis workflow. 1-18 - Robert Koch, Mario Golling:

Architecture for evaluating and correlating NIDS in real - World networks. 1-20 - Gabriel Jakobson:

Mission-centricity in cyber security: Architecting cyber attack resilient missions. 1-18 - Alessandro Guarino:

Autonomous intelligent agents in cyber offence. 1-12 - Jody M. Prescott:

Autonomous decision-making processes and the responsible cyber commander. 1-18
Chapter 5. Cyber Conflict - Politics, Semantics, Ethics and Moral
- Keir Giles, William Hagestad:

Divided by a common language: Cyber definitions in Chinese, Russian and English. 1-17 - Scott D. Applegate, Angelos Stavrou:

Towards a Cyber Conflict Taxonomy. 1-18 - Emilio Iasiello:

Cyber attack: A dull tool to shape foreign policy. 1-18 - Shannon Vallor:

The future of military virtue: Autonomous systems and the moral deskilling of the military. 1-15 - John P. Sullins:

An ethical analysis of the case for robotic weapons arms control. 1-20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














