


default search action
4th CyCon 2012: Tallinn, Estonia
- Christian Czosseck, Rain Ottis, Katharina Ziolkowski:

4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012. IEEE 2012, ISBN 978-1-4673-1270-7
Chapter 1: Cyberspace - The Role of States in the Global Structure
- Wolff Heintschel von Heinegg:

Legal implications of territorial sovereignty in cyberspace. 1-13 - Jason Healey:

When "not my problem" isn't enough: Political neutrality and national responsibility in cyber conflict. 1-13 - Wolff Heintschel von Heinegg:

Neutrality in cyberspace. 1-12 - Vittorio Fanchiotti, Jean Paul Pierini:

Impact of cyberspace on human rights and democracy. 1-12
Chapter 2: Cyber Policy & Strategic Options
- Keir Giles:

Russia's public stance on cyberspace issues. 1-13 - Patrice Tromparent:

French cyberdefence policy. 1-12 - Louise Arimatsu:

A treaty for governing cyber-weapons: Potential benefits and practical limitations. 1-19 - Assaf Y. Keren, Keren Elazari:

Internet as a CII - A framework to measure awareness in the cyber sphere. 1-13 - Forrest Hare:

The signifi cance of attribution to cyberspace coercion: A political perspective. 1-15 - Myriam Dunn Cavelty:

The militarisation of cyberspace: Why less may be better. 1-13
Chapter 3: Cyber Conflict - Theory & Principles
- Jeffrey L. Caton:

Beyond domains, beyond commons: Context and theory of conflict in cyberspace. 1-11 - Samuel Liles, J. Eric Dietz, Marcus K. Rogers, Dean Larson:

Applying traditional military principles to cyber warfare. 1-12 - Scott D. Applegate:

The principle of maneuver in cyber operations. 1-13 - Mariarosaria Taddeo:

An analysis for a just cyber warfare. 1-10
Chapter 4: Cyber Conflict - Actors
- Birgy Lorenz, Kaido Kikkas:

Socially engineered commoners as cyber warriors - Estonian future or present? 1-12 - Sean Watts:

The notion of combatancy in cyber warfare. 1-15 - Jody M. Prescott:

Direct participation in cyber hostilities: terms of reference for like-minded states? 1-16
Chapter 5: "Cyber-Attacks" - Trends, Methods & Legal Classification
- Robert Koch, Björn Stelte, Mario Golling:

Attack trends in present computer networks. 1-12 - Michael N. Schmitt:

"Attack" as a term of art in international law: The cyber operations context. 1-11 - Robert Fanelli, Gregory J. Conti:

A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict. 1-13 - Enn Tyugu:

Command and control of cyber weapons. 1-11 - Daniel Plohmann, Elmar Gerhards-Padilla:

Case study of the Miner Botnet. 1-16
Chapter 6: Cyber Defence - Methods & Tools
- Kim Hartmann, Christoph Steup:

Natural Privacy Preservation Protocol for electronic mail. 1-17 - Hiro Onishi:

Paradigm change of vehicle cyber security. 1-11 - Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:

Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning. 1-19 - Robert Koch, Gabi Dreo Rodosek:

The role of COTS products for high security systems. 1-14 - Diego Fernandez Vazquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid:

Conceptual framework for cyber defense information sharing within trust relationships. 1-17

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














