![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
11th CyCon 2019: Tallinn, Estonia
- Tomás Minárik, Siim Alatalu, S. Biondi, M. Signoretti, I. Tolga, G. Visky:
11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019. IEEE 2019, ISBN 978-9949-9904-5-0 - Max Smeets:
NATO Members' Organizational Path Towards Conducting Offensive Cyber Operations: A Framework for Analysis. 1-15 - Erwin Orye, Olaf Manuel Maennel:
Recommendations for Enhancing the Results of Cyber Effects. 1-19 - Gil Baram, Udi Sommer
:
Covert or not Covert: National Strategies During Cyber Conflict. 1-16 - Robert Koch:
Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations? 1-24 - Keir Giles, Kim Hartmann:
"Silent Battle" Goes Loud: Entering a New Era of State-Avowed Cyber Conflict. 1-13 - Martin Libicki:
For a Baltic Cyberspace Alliance? 1-14 - Nicolas Känzig, Roland Meier, Luca Gambazzi, Vincent Lenders
, Laurent Vanbever:
Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense Exercise. 1-19 - Alicia Bargar, Stephanie Pitts, Janis Butkevics, Ian McCulloh
:
Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory. 1-18 - Brad Bigelow:
What are Military Cyberspace Operations Other Than War? 1-17 - Matthias Schäfer, Markus Fuchs, Martin Strohmeier
, Markus Engel, Marc Liechti, Vincent Lenders
:
BlackWidow: Monitoring the Dark Web for Cyber Security Information. 1-21 - Arturs Lavrenovs
:
Towards Measuring Global DDoS Attack Capacity. 1-15 - Nikolas Ott, Anna-Maria Osula
:
The Rise of the Regionals: How Regional Organisations Contribute to International Cyber Stability Negotiations at the United Nations Level. 1-25 - Giovanni Apruzzese
, Michele Colajanni
, Luca Ferretti
, Mirco Marchetti
:
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning. 1-18 - Joe Burton
, Simona R. Soare:
Understanding the Strategic Implications of the Weaponization of Artificial Intelligence. 1-17 - Barrie Sander:
The Sound of Silence: International Law and the Governance of Peacetime Cyber Operations. 1-21 - Jason Healey, Neil Jenkins:
Rough-and-Ready: A Policy Framework to Determine if Cyber Deterrence is Working or Failing. 1-20 - Daniel Kapellmann, Rhyner Washburn:
Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical Infrastructure. 1-23 - Przemyslaw Roguski:
Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital Environment. 1-13 - Joonsoo Kim, Kyeongho Kim, Moonsu Jang:
Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises. 1-19 - James Pavur, Ivan Martinovic:
The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space. 1-18 - Bilyana Lilly, Lillian Ablon, Quentin E. Hodgson, Adam S. Moore:
Applying Indications and Warning Frameworks to Cyber Incidents. 1-21 - Ji-Young Kong, Jong-In Lim, Kyoung-Gon Kim
:
The All-Purpose Sword: North Korea's Cyber Operations and Strategies. 1-20 - Barls Egemen Özkan, Serol Bulkan:
Hidden Risks to Cyberspace Security from Obsolete COTS Software. 1-19 - Giuseppina Murino, Alessandro Armando
, Armando Tacchella
:
Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures. 1-19 - Kenneth Kraszewski:
SamSam and the Silent Battle of Atlanta. 1-16 - Jeff Kosseff:
The Contours of 'Defend Forward' Under International Law. 1-13 - Robert Koch, Mario Golling:
Silent Battles: Towards Unmasking Hidden Cyber Attack. 1-20 - Roman Graf, Leon Aaron Kaplan, Ross King:
Neural Network-Based Technique for Android Smartphone Applications Classification. 1-17 - Pierre Dumont, Roland Meier, David Gugelmann, Vincent Lenders
:
Detection of Malicious Remote Shell Sessions. 1-20
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.