


default search action
8th CyCon 2016: Tallinn, Estonia
- Nikolaos Pissanidis, Henry Roigas, Matthijs Veenendaal:

8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016. IEEE 2016, ISBN 978-9-9499-5449-0 - Gabriel Jakobson, Rain Ottis

:
Foreword. 1 - Pascal Brangetto, Raik Jakschis, Mari Kert-St Aubyn, Lauri Lindström, Nikolaos Pissanidis, Henry Roigas, Teemu Uolevi Väisänen, Matthijs Veenendaal:

Introduction. 1-4 - Jelle van Haaster:

Assessing cyber power. 7-21 - Ragnhild Endresen Siedler:

Hard power in cyberspace: CNA as a political means. 23-36 - Jason Healey:

Winning and losing in cyberspace. 37-49 - Lior Tabansky:

Towards a theory of cyber power: The Israeli experience with innovation and strategy. 51-63 - Sean Lawson, Sara K. Yeo, Haoran Yu, Ethan Greene:

The cyber-doom effect: The impact of fear appeals in the US cyber security debate. 65-80 - Steve S. Sin, Laura A. Blackerby, Elvis Asiamah, Rhyner Washburn:

Determining extremist organisations' likelihood of conducting cyber attacks. 81-98 - Drew Herrick:

The social side of 'cyber power'? Social media and cyber operations. 99-111 - Pascal Brangetto, Matthijs A. Veenendaal:

Influence Cyber Operations: The use of cyberattacks in support of Influence Operations. 113-126 - Kubo Macak:

Is the international law of cyber security in crisis? 127-139 - Anthony Craig, Brandon Valeriano:

Conceptualising cyber arms races. 141-158 - Markus Maybaum, Jens Tölle:

Arms control in cyberspace - architecture for a trust-based implementation framework based on conventional arms control methods. 159-173 - Trey Herr:

Malware counter-proliferation and the Wassenaar Arrangement. 175-190 - Robert Koch, Mario Golling:

Weapons systems and cyber security - a challenging union. 191-203 - Kim Hartmann, Keir Giles:

UAV exploitation: A new domain for cyber power. 205-221 - Martin Strohmeier

, Matthias Schäfer, Matthew Smith, Vincent Lenders
, Ivan Martinovic:
Assessing the impact of aviation security on cyber power. 223-241 - Mirco Marchetti

, Fabio Pierazzi
, Alessandro Guido, Michele Colajanni:
Countering Advanced Persistent Threats through security intelligence and big data analytics. 243-261 - Paolo Palmieri

:
Anonymity networks and access to information during conflicts: Towards a distributed network organisation. 263-275 - Siddharth Prakash Rao

, Ian Oliver, Silke Holtmanns, Tuomas Aura
:
We know where you are! 277-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














