


default search action
10th CyCon 2018: Tallinn, Estonia
- Tomás Minárik, Raik Jakschis, Lauri Lindström:
10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018. IEEE 2018, ISBN 978-9-9499-9042-9 - Christopher Whyte, Brandon Valeriano, Benjamin Jensen, Ryan Maness:
Rethinking the data wheel: Automating open-access, public data on cyber conflict. 9-30 - Aaron F. Brantly:
The cyber deterrence problem. 31-54 - Max Smeets, Herbert S. Lin:
Offensive cyber capabilities: To what ends? 55-72 - Quentin E. Hodgson:
Understanding and countering cyber coercion. 73-88 - Daniel Moore:
Targeting technology: Mapping military offensive network operations. 89-108 - Martin C. Libicki:
Drawing inferences from cyber espionage. 109-122 - Brad Bigelow:
The topography of cyberspace and its consequences for operations. 123-138 - Kim Hartmann, Keir Giles:
Net neutrality in the context of cyber warfare. 139-158 - Robert Koch, Mario Golling:
The cyber decade: Cyber defence at a X-ing point. 159-186 - Karlis Podins, Kenneth Geers:
Aladdin's lamp: The theft and re-weaponization of malicious code. 187-202 - Asaf Lubin
:
Cyber law and espionage law as communicating vessels. 203-226 - Krisztina Huszti-Orban:
Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement1. 227-244 - Peter Z. Stockburger:
From grey zone to customary international law: How adopting the precautionary principle may help crystallize the due diligence principle in cyberspace. 245-262 - Cedric Sabbah:
Pressing pause: A new approach for international cybersecurity norm development. 263-282 - Jeff Kosseff:
Developing collaborative and cohesive cybersecurity legal principles. 283-298 - Martin Strohmeier
, Matthew Smith, Daniel Moser, Matthias Schäfer, Vincent Lenders
, Ivan Martinovic:
Utilizing air traffic communications for OSINT on state and government aircraft. 299-320 - Roland Meier, Cornelia Scherrer, David Gugelmann, Vincent Lenders
, Laurent Vanbever:
FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feeds. 321-344 - Arturs Lavrenovs
, F. Jesus Rubio Melon:
HTTP security headers analysis of top one million websites. 345-370 - Giovanni Apruzzese
, Michele Colajanni
, Luca Ferretti
, Alessandro Guido, Mirco Marchetti
:
On the effectiveness of machine and deep learning for cyber security. 371-390 - David Gugelmann, David M. Sommer, Vincent Lenders
, Markus Happe
, Laurent Vanbever:
Screen watermarking for data theft investigation and attribution. 391-408 - Roman Graf, Ross King:
Neural network and blockchain based technique for cyber threat intelligence and situational awareness. 409-426 - Steven Noel, Paul D. Rowe, Stephen Purdy, Michael Limiero, Travis Lu, Will Mathews:
Mission-focused cyber situational understanding via graph analytics. 427-448

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.