


default search action
9th CyCon 2017: Tallinn, Estonia
- 9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017. IEEE 2017, ISBN 978-9949-9904-1-2
- Martin Strohmeier
, Matthew Smith, Matthias Schäfer, Vincent Lenders
, Ivan Martinovic:
Crowdsourcing security for wireless air traffic communications. 1-18 - Robert Koch, Teo Kuhn:
Defending the grid: Backfitting non-expandable control systems. 1-17 - Max Smeets:
Organisational integration of offensive cyber capabilities: A primer on the benefits and risks. 1-18 - Kubo Macak:
From the vanishing point back to the core: The impact of the development of the cyber law of war on general international law. 1-14 - Jeffrey Biller:
The misuse of protected indicators in cyberspace: Defending a core aspect of international humanitarian law. 1-14 - Tassilo V. P. Singer:
Update to revolving door 2.0: The extension of the period for direct participation in hostilities due to autonomous cyber weapons. 1-13 - Brad Bigelow:
Mission assurance: Shifting the focus of cyber defence. 1-12 - Fabio Pierazzi
, Giovanni Apruzzese
, Michele Colajanni
, Alessandro Guido, Mirco Marchetti
:
Scalable architecture for online prioritisation of cyber threats. 1-18 - Peter Z. Stockburger:
Control and capabilities test: Toward a new lex specialis governing state responsibility for third party cyber incidents. 1-14 - Eliza Watt:
The role of international human rights law in the protection of online privacy in the age of surveillance. 1-14 - Riccardo Longo
, Federico Pintore
, Giancarlo Rinaldo, Massimiliano Sala
:
On the security of the blockchain BIX protocol and certificates. 1-16 - Martin Libicki:
The coming of cyber espionage norms. 1-17 - Ido Sivan Sevilla:
Trading privacy for security in cyberspace: A study across the dynamics of US federal laws and regulations between 1967 and 2016. 1-19 - Kenneth Geers:
Core illumination: Traffic analysis in cyberspace. 1-18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.