default search action
6th CyCon 2014: Tallinn, Estonia
- Pascal Brangetto, Markus Maybaum, Jan Stinissen:
6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014. IEEE 2014, ISBN 978-9949-9544-0-7 - Gabriel Jakobson, Rain Ottis:
Foreword. ii-iv - Pascal Brangetto, Markus Maybaum, Jan Stinissen:
Introduction. 1-3
Chapter 1. Active Cyber Defence: Concepts, Policy, and Legal Implications
- Robert S. Dewar:
The "triptych of cyber security": A classifi cation of active cyber defence. 7-21 - Keir Giles, Kim Hartmann:
Socio-political effects of Active Cyber Defence measures. 23-36 - Oona A. Hathaway:
The drawbacks and dangers of active defense. 39-50 - Caitriona H. Heinl:
Artificial (intelligent) agents and active cyber defence: Policy implications. 53-66
Chapter 2. Models of Active Cyber Defence
- Stephen Cobb, Andrew Lee:
Malware is called malicious for a reason: The risks of weaponizing code. 71-84 - Nikos Virvilis, Bart Vanautgaerden, Oscar Serrano Serrano:
Changing the game: The art of deceiving sophisticated attackers. 87-97 - Jason Rivera, Forrest Hare:
The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures. 99-116
Chapter 3. Cyber Situational Awareness
- Kevin Mepham, Panos Louvieris, Gheorghita Ghinea, Natalie Clewley:
Dynamic cyber-incident response. 121-136 - Andreas Kornmaier, Fabrice Jaouen:
Beyond technical data - a more comprehensive situational awareness fed by available intelligence information. 139-154 - Jussi Timonen, Lauri Laaperi, Lauri Rummukainen, Samir Puuska, Jouko Vankka:
Situational awareness and information collection from critical infrastructure. 157-173 - Judson C. Dressler, Calvert L. Bowen III, William Moody, Jason Koepke:
Operational data classes for establishing situational awareness in cyberspace. 175-186
Chapter 4. Detection and Deception
- Mario Golling, Rick Hofstede, Robert Koch:
Towards multi-layered intrusion detection in high-speed networks. 191-206 - Enrique de la Hoz, Gary Cochrane, Jose Manuel Moreira-Lemus, Rafael Paez-Reyes, Ivan Marsá-Maestre, Bernardo Alarcos:
Detecting and defeating advanced man-in-the-middle attacks against TLS. 209-221 - Matthias Wübbeling, Till Elsner, Michael Meier:
Inter-AS routing anomalies: Improved detection and classification. 223-238 - Bruce W. Watson, I. P. Blox:
Elastic deep packet inspection. 241-253 - Fatih Haltas, Erkam Uzun, Necati Siseci, Abdulkadir Posul, Bakir Emre:
An automated bot detection system through honeypots for large-scale. 255-270 - Matteo Casenove, Armando Miraglia:
Botnet over Tor: The illusion of hiding. 273-282
Chapter 5. Cyber Operational Activities
- David Raymond, Tom Cross, Gregory J. Conti, Michael Nowatkowski:
Key terrain in cyberspace: Seeking the high ground. 287-300 - Paul Ducheine, Jelle van Haaster:
Fighting power, targeting and cyber operations. 303-327 - Samuel Liles, Jacob Kambic:
Cyber fratricide. 329-338 - Karlis Podins, Varis Teivans, Iveta Skujina:
Low-cost active cyber defence. 1-16
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.