default search action
7th CyCon 2015: Tallinn, Estonia
- Markus Maybaum, Anna-Maria Osula, Lauri Lindström:
7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015. IEEE 2015, ISBN 978-9-9499-5442-1 - Bernhards Blumbergs, Pascal Brangetto, Lauri Lindström, Markus Maybaum, Anna-Maria Osula, Nikolaos Pissanidis, Henry Roigas, Matthijs Veenendaal, Teemu Uolevi Väisänen:
Introduction. 1-4 - Jason Rivera:
Achieving cyberdeterrence and the ability of small states to hold large states at risk. 7-24 - Robert Brose:
Cyberwar, Netwar, and the future of Cyberdefense. 25-38 - Margarita Jaitner, Peter Mattsson:
Russian Information Warfare of 2014. 39-52 - Tim Maurer, Isabel Skierka, Robert Morgus, Mirko Hohmann:
Technological sovereignty: Missing the point? 53-68 - Sergei Boeke, Caitriona H. Heinl, Matthijs A. Veenendaal:
Civil-military relations and international military cooperation in cyber security: Common challenges & state practices across Asia and Europe. 69-80 - Geoffrey S. DeWeese:
Anticipatory and preemptive self-defense in cyberspace: The challenge of imminence. 81-92 - Paul A. Walker:
Law of the horse to law of the submarine: The future of State behavior in cyberspace. 93-104 - Uchenna Jerome Orji:
Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation? 105-118 - Richard Hill:
Dealing with cyber security threats: International cooperation, ITU, and WCIT. 119-134 - Jennifer Stoll, Rainhard Z. Bengez:
Visual structures for seeing cyber policy strategies. 135-152 - Alison L. Russell:
Strategic anti-access/area denial in cyberspace. 153-168 - Robert Koch, Mario Golling:
Blackout and now? Network Centric Warfare in an anti-access area-denial theatre. 169-184 - Andrea Balboni, Mirco Marchetti, Michele Colajanni, Andrea Melegari:
Supporting sense-making and decision-making through time evolution analysis of open sources. 185-202 - Alexis Le Compte, David A. Elizondo, Tim Watson:
A renewed approach to serious games for cyber security. 203-216 - Matteo Casenove:
Exfiltrations using polymorphic blending techniques: Analysis and countermeasures. 217-230 - Christos Xenakis, Christoforos Ntantogian:
Attacking the baseband modem of mobile phones to breach the users' privacy and network security. 231-244
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.