default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2012
- Robert Koch, Gabi Dreo Rodosek:
The role of COTS products for high security systems. CyCon 2012: 1-14 - Robert Koch, Björn Stelte, Mario Golling:
Attack trends in present computer networks. CyCon 2012: 1-12 - Scott D. Applegate:
The principle of maneuver in cyber operations. CyCon 2012: 1-13 - Louise Arimatsu:
A treaty for governing cyber-weapons: Potential benefits and practical limitations. CyCon 2012: 1-19 - Jeffrey L. Caton:
Beyond domains, beyond commons: Context and theory of conflict in cyberspace. CyCon 2012: 1-11 - Myriam Dunn Cavelty:
The militarisation of cyberspace: Why less may be better. CyCon 2012: 1-13 - Vittorio Fanchiotti, Jean Paul Pierini:
Impact of cyberspace on human rights and democracy. CyCon 2012: 1-12 - Robert Fanelli, Gregory J. Conti:
A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict. CyCon 2012: 1-13 - Keir Giles:
Russia's public stance on cyberspace issues. CyCon 2012: 1-13 - Forrest Hare:
The signifi cance of attribution to cyberspace coercion: A political perspective. CyCon 2012: 1-15 - Kim Hartmann, Christoph Steup:
Natural Privacy Preservation Protocol for electronic mail. CyCon 2012: 1-17 - Jason Healey:
When "not my problem" isn't enough: Political neutrality and national responsibility in cyber conflict. CyCon 2012: 1-13 - Wolff Heintschel von Heinegg:
Legal implications of territorial sovereignty in cyberspace. CyCon 2012: 1-13 - Wolff Heintschel von Heinegg:
Neutrality in cyberspace. CyCon 2012: 1-12 - Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning. CyCon 2012: 1-19 - Assaf Y. Keren, Keren Elazari:
Internet as a CII - A framework to measure awareness in the cyber sphere. CyCon 2012: 1-13 - Samuel Liles, J. Eric Dietz, Marcus K. Rogers, Dean Larson:
Applying traditional military principles to cyber warfare. CyCon 2012: 1-12 - Birgy Lorenz, Kaido Kikkas:
Socially engineered commoners as cyber warriors - Estonian future or present? CyCon 2012: 1-12 - Hiro Onishi:
Paradigm change of vehicle cyber security. CyCon 2012: 1-11 - Daniel Plohmann, Elmar Gerhards-Padilla:
Case study of the Miner Botnet. CyCon 2012: 1-16 - Jody M. Prescott:
Direct participation in cyber hostilities: terms of reference for like-minded states? CyCon 2012: 1-16 - Michael N. Schmitt:
"Attack" as a term of art in international law: The cyber operations context. CyCon 2012: 1-11 - Mariarosaria Taddeo:
An analysis for a just cyber warfare. CyCon 2012: 1-10 - Patrice Tromparent:
French cyberdefence policy. CyCon 2012: 1-12 - Enn Tyugu:
Command and control of cyber weapons. CyCon 2012: 1-11 - Diego Fernandez Vazquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid:
Conceptual framework for cyber defense information sharing within trust relationships. CyCon 2012: 1-17 - Sean Watts:
The notion of combatancy in cyber warfare. CyCon 2012: 1-15 - Christian Czosseck, Rain Ottis, Katharina Ziolkowski:
4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012. IEEE 2012, ISBN 978-1-4673-1270-7 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-01 22:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint