default search action
14th CyCon 2022: Tallinn, Estonia
- Tat'ána Jancárková, Gábor Visky, I. Winther:
14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022. IEEE 2022, ISBN 978-9916-9789-1-7 - Max Smeets:
The Role of Military Cyber Exercises: A Case Study of Locked Shields. 9-25 - Lee A. Bygrave:
Cyber Resilience versus Cybersecurity as Legal Aspiration. 27-43 - John Morgan Salomon:
Public-Private Partnerships and Collective Cyber Defence. 45-63 - Martin C. Libicki:
Obnoxious Deterrence. 65-77 - Erica D. Lonergan, Mark Montgomery:
The Promise and Perils of Allied Offensive Cyber Operations. 79-92 - Michael Bátrla, Jakub Harasta:
'Releasing the Hounds?'1 Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations. 93-115 - Miguel Alberto Gomez, Gregory Winger:
Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations. 117-134 - Christopher E. Whyte:
Machine Expertise in the Loop: Artificial Intelligence Decision-Making Inputs and Cyber Conflict. 135-154 - Lennart Maschmeyer:
Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation. 155-171 - Arun Mohan Sukumar:
'Responsibility to Detect?': Autonomous Threat Detection and its Implications for Due Diligence in Cyberspace. 173-187 - Tsvetelina J. van Benthem:
Exploring Changing Battlefields: Autonomous Weapons, Unintended Engagements and the Law of Armed Conflict. 190-204 - Petr Stejskal, Martin Faix:
Legal Aspects of Misattribution Caused by Cyber Deception. 205-218 - Sebastian Cymutta, Marten Zwanenburg, Paul Oling:
Military Data and Information Sharing - a European Union Perspective. 219-234 - Seth W. Dilworth, D. Daniel Osborne:
Cyber Threats Against and in the Space Domain: Legal Remedies. 235-247 - Michael L. Thomas:
Maritime Hacking Using Land-Based Skills. 249-263 - Mikko Kiviharju, Christina Lassfolk, Sanna Rikkonen, Hannu H. Kari:
A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System. 265-284 - Georg Baselt, Martin Strohmeier, James Pavur, Vincent Lenders, Ivan Martinovic:
Security and Privacy Issues of Satellite Communication in the Avlatlon Domain. 285-307 - Sampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Garikayi Madzudzo, Andrei V. Petrovski:
Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security. 309-330 - Joseph A. J. Ross, Kimberly Tam, David J. Walker, Kevin D. Jones:
Towards a Digital Twin of a Complex Maritime Site for Multi-Objective Optimization. 331-345 - Siddhant Shrivastava, Francisco Furtado, Mark Goh, Aditya Mathur:
The Design of Cyber-Physical Exercises (CPXS). 348-366 - Emre Halisdemir, Hacer Karacan, Mauno Pihelgas, Toomas Lepik, Sungbaek Cho:
Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal. 367-383 - Christopher Molloy, Philippe Charland, Steven H. H. Ding, Benjamin C. M. Fung:
JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence. 385-403 - Keir Giles, Kim Hartmann:
Emergence of 5G Networks and Implications for Cyber Conflict. 405-419
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.