default search action
4th CyCon 2012: Tallinn, Estonia
- Christian Czosseck, Rain Ottis, Katharina Ziolkowski:
4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012. IEEE 2012, ISBN 978-1-4673-1270-7
Chapter 1: Cyberspace - The Role of States in the Global Structure
- Wolff Heintschel von Heinegg:
Legal implications of territorial sovereignty in cyberspace. 1-13 - Jason Healey:
When "not my problem" isn't enough: Political neutrality and national responsibility in cyber conflict. 1-13 - Wolff Heintschel von Heinegg:
Neutrality in cyberspace. 1-12 - Vittorio Fanchiotti, Jean Paul Pierini:
Impact of cyberspace on human rights and democracy. 1-12
Chapter 2: Cyber Policy & Strategic Options
- Keir Giles:
Russia's public stance on cyberspace issues. 1-13 - Patrice Tromparent:
French cyberdefence policy. 1-12 - Louise Arimatsu:
A treaty for governing cyber-weapons: Potential benefits and practical limitations. 1-19 - Assaf Y. Keren, Keren Elazari:
Internet as a CII - A framework to measure awareness in the cyber sphere. 1-13 - Forrest Hare:
The signifi cance of attribution to cyberspace coercion: A political perspective. 1-15 - Myriam Dunn Cavelty:
The militarisation of cyberspace: Why less may be better. 1-13
Chapter 3: Cyber Conflict - Theory & Principles
- Jeffrey L. Caton:
Beyond domains, beyond commons: Context and theory of conflict in cyberspace. 1-11 - Samuel Liles, J. Eric Dietz, Marcus K. Rogers, Dean Larson:
Applying traditional military principles to cyber warfare. 1-12 - Scott D. Applegate:
The principle of maneuver in cyber operations. 1-13 - Mariarosaria Taddeo:
An analysis for a just cyber warfare. 1-10
Chapter 4: Cyber Conflict - Actors
- Birgy Lorenz, Kaido Kikkas:
Socially engineered commoners as cyber warriors - Estonian future or present? 1-12 - Sean Watts:
The notion of combatancy in cyber warfare. 1-15 - Jody M. Prescott:
Direct participation in cyber hostilities: terms of reference for like-minded states? 1-16
Chapter 5: "Cyber-Attacks" - Trends, Methods & Legal Classification
- Robert Koch, Björn Stelte, Mario Golling:
Attack trends in present computer networks. 1-12 - Michael N. Schmitt:
"Attack" as a term of art in international law: The cyber operations context. 1-11 - Robert Fanelli, Gregory J. Conti:
A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict. 1-13 - Enn Tyugu:
Command and control of cyber weapons. 1-11 - Daniel Plohmann, Elmar Gerhards-Padilla:
Case study of the Miner Botnet. 1-16
Chapter 6: Cyber Defence - Methods & Tools
- Kim Hartmann, Christoph Steup:
Natural Privacy Preservation Protocol for electronic mail. 1-17 - Hiro Onishi:
Paradigm change of vehicle cyber security. 1-11 - Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning. 1-19 - Robert Koch, Gabi Dreo Rodosek:
The role of COTS products for high security systems. 1-14 - Diego Fernandez Vazquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid:
Conceptual framework for cyber defense information sharing within trust relationships. 1-17
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.