default search action
Search dblp for Publications
export results for "stream:conf/cycon:"
@inproceedings{DBLP:conf/cycon/Ashdown24, author = {Neil Ashdown}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Unity or Coherence: Shaping Future Civil-Military Intelligence Collaboration in the Cyber Domain}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {311--325}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685631}, doi = {10.23919/CYCON62501.2024.10685631}, timestamp = {Thu, 17 Oct 2024 16:09:58 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Ashdown24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BeningerCDF24, author = {Max Beninger and Philippe Charland and Steven H. H. Ding and Benjamin C. M. Fung}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {{ERS0:} Enhancing Military Cybersecurity with AI-Driven {SBOM} for Firmware Vulnerability Detection and Asset Management}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {141--160}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685598}, doi = {10.23919/CYCON62501.2024.10685598}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BeningerCDF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BlechovaHK24, author = {Anna Blechov{\'{a}} and Jakub Harasta and Frantisek Kasl}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {From Space Debris to Space Weaponry: {A} Legal Examination of Space Debris as a Weapon}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {263--279}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685616}, doi = {10.23919/CYCON62501.2024.10685616}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BlechovaHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BogdanovEKS24, author = {Dan Bogdanov and Paula Etti and Liina Kamm and Fedor Stomakhin}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Artificial Intelligence System Risk Management Methodology Based on Generalized Blueprints}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {123--140}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685644}, doi = {10.23919/CYCON62501.2024.10685644}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BogdanovEKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ChanK24, author = {Kristy Chan and Joseph Khaw}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Not All Those Who Wander (Over the Horizon) Are Lost: The Applicability of Existing Paradigms of International Law to Cyberspace and the Interpretation of Customary International Law}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {177--190}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685595}, doi = {10.23919/CYCON62501.2024.10685595}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ChanK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DzogovicH24, author = {Bruno Dzogovic and Silke Holtmanns}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Securing 5G Communication in Joint Operations Between {NATO} Partners}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {29--46}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685610}, doi = {10.23919/CYCON62501.2024.10685610}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DzogovicH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Grote24, author = {Tatjana Grote}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Reflections on the Afterlife: Which Rules Govern the Post-Occupation Retention and Use of Personal Data Collected by the Military?}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {297--310}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685632}, doi = {10.23919/CYCON62501.2024.10685632}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Grote24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Jarnecki24, author = {Joseph Jarnecki}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Innovations in International Cyber Support: Comparing Approaches and Mechanisms for Cyber Capability Support}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {327--346}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685576}, doi = {10.23919/CYCON62501.2024.10685576}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Jarnecki24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kosseff24, author = {Jeff Kosseff}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {The International Legal Framework for Hunt Forward and the Case for Collective Countermeasures}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {221--234}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685559}, doi = {10.23919/CYCON62501.2024.10685559}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kosseff24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kwik24, author = {Jonathan Kwik}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {The Scope of an Autonomous Attack}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {191--206}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685635}, doi = {10.23919/CYCON62501.2024.10685635}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kwik24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MerkliMSL24, author = {Yannick Merkli and Roland Meier and Martin Strohmeier and Vincent Lenders}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Defeating and Improving Network Flow Classifiers Through Adversarial Machine Learning}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {103--121}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685592}, doi = {10.23919/CYCON62501.2024.10685592}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MerkliMSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Novo24, author = {Lisandra Novo}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Specially Affected States' Push for Collective Countermeasures}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {235--248}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685582}, doi = {10.23919/CYCON62501.2024.10685582}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Novo24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/OMeara24, author = {Chris O'Meara}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Anti-Satellite Weapons and Self-Defence: Law and Limitations}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {249--262}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685637}, doi = {10.23919/CYCON62501.2024.10685637}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/OMeara24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/OryeVRM24, author = {Erwin Orye and Gabor Visky and Alexander Rohl and Olaf Maennel}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Enhancing the Cyber Resilience of Sea Drones}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {83--102}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685581}, doi = {10.23919/CYCON62501.2024.10685581}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/OryeVRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PaikensN24, author = {Peteris Paikens and Krisjanis Nesenbergs}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Resilience and Vulnerability of Consumer Wireless Devices to Cyber Attacks}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {47--62}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685620}, doi = {10.23919/CYCON62501.2024.10685620}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PaikensN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RobertsV24, author = {Anastasia Roberts and Adrian Venables}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Military Psychological Operations in the Digital Battlespace: {A} Practical Application of the Legal Framework}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {281--296}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685605}, doi = {10.23919/CYCON62501.2024.10685605}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RobertsV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/SullivanR24, author = {Scott Sullivan and Iben Ricket}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Targeting in the Black Box}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {207--220}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685575}, doi = {10.23919/CYCON62501.2024.10685575}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/SullivanR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/VakarjukSL24, author = {Jelizaveta Vakarjuk and Nikita Snetkov and Peeter Laud}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Identifying Obstacles of {PQC} Migration in E-Estonia}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {63--81}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685570}, doi = {10.23919/CYCON62501.2024.10685570}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/VakarjukSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Wang24, author = {Wei{-}Che Wang}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {Legal, Policy, and Compliance Issues in Using {AI} for Security: Using Taiwan's Cybersecurity Management Act and Penetration Testing as Examples}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {161--176}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685586}, doi = {10.23919/CYCON62501.2024.10685586}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Wang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/WyssMAKPL24, author = {Marc Wyss and Roland Meier and Lloren{\c{c}} Rom{\'{a}} {\'{A}}lvarez and Cyrill Kr{\"{a}}henb{\"{u}}hl and Adrian Perrig and Vincent Lenders}, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {On Building Secure Wide-Area Networks over Public Internet Service Providers}, booktitle = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, pages = {7--27}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024.10685599}, doi = {10.23919/CYCON62501.2024.10685599}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/WyssMAKPL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2024, editor = {Claire Kwan and Lauri Lindstr{\"{o}}m and Davide Giovannelli and Karlis Podins and Damjan Strucl}, title = {16th International Conference on Cyber Conflict: Over the Horizon, CyCon 2024, Tallinn, Estonia, May 28-31, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/CyCon62501.2024}, doi = {10.23919/CYCON62501.2024}, isbn = {978-9916-9789-5-5}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BeachWestmoreland23, author = {Nate Beach{-}Westmoreland}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Sharpening the Spear: China's Information Warfare Lessons from Ukraine}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {399--415}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181559}, doi = {10.23919/CYCON58705.2023.10181559}, timestamp = {Mon, 31 Jul 2023 13:56:42 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BeachWestmoreland23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BenderS23, author = {Conner Bender and Jason Staggs}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Leveling the Playing Field: Equipping Ukrainian Freedom Fighters with Low-Cost Drone Detection Capabilities}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {287--312}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181421}, doi = {10.23919/CYCON58705.2023.10181421}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BenderS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Benthem23, author = {Tsvetelina J. van Benthem}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Privatized Frontlines: Private-Sector Contributions in Armed Conflict}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {55--69}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182177}, doi = {10.23919/CYCON58705.2023.10182177}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Benthem23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DavydiukZ23, author = {Andrii Davydiuk and Vitalii Zubok}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Analytical Review of the Resilience of Ukraine's Critical Energy Infrastructure to Cyber Threats in Times of War}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {121--139}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181813}, doi = {10.23919/CYCON58705.2023.10181813}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DavydiukZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DevannyD23, author = {Joe Devanny and Andrew C. Dwyer}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {From Cyber Security to Cyber Power: Appraising the Emergence of 'Responsible, Democratic Cyber Power' in {UK} Strategy}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {381--397}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181804}, doi = {10.23919/CYCON58705.2023.10181804}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DevannyD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Dias23, author = {Talita Dias}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Limits on Information Operations Under International Law}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {345--363}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181348}, doi = {10.23919/CYCON58705.2023.10181348}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Dias23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Freeman23, author = {Lindsay Freeman}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Seeing Through the Fog: The Impact of Information Operations on War Crimes Investigations in Ukraine}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {365--379}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181846}, doi = {10.23919/CYCON58705.2023.10181846}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Freeman23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GehriMHL23, author = {Lina Gehri and Roland Meier and Daniel Hulliger and Vincent Lenders}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {253--271}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182001}, doi = {10.23919/CYCON58705.2023.10182001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GehriMHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GjesvikKBAS23, author = {Lars Gjesvik and Azan Latif Khanyari and Haakon Bryhni and Alfred Arouna and Niels Nagelhus Schia}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Digital Supply Chain Dependency and Resilience}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {141--160}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181978}, doi = {10.23919/CYCON58705.2023.10181978}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GjesvikKBAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HoltrupBSMCL23, author = {Gerrit Holtrup and William Blonay and Martin Strohmeier and Alain Mermoud and Jean{-}Pascal Chavanne and Vincent Lenders}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Modeling 5G Threat Scenarios for Critical Infrastructure Protection}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {161--180}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182173}, doi = {10.23919/CYCON58705.2023.10182173}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HoltrupBSMCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/IzyckiNR23, author = {Eduardo Izycki and Brett van Niekerk and Trishana Ramluckan}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Cyber Diplomacy: {NATO/EU} Engaging with the Global South}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {417--435}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182095}, doi = {10.23919/CYCON58705.2023.10182095}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/IzyckiNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kajander23, author = {Aleksi Kajander}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Russian Invasion of Ukraine 2022: Time to Reconsider Small Drones?}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {313--327}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181494}, doi = {10.23919/CYCON58705.2023.10181494}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kajander23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LillyGRK23, author = {Bilyana Lilly and Kenneth Geers and Greg Rattray and Robert Koch}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Business@War: The {IT} Companies Helping to Defend Ukraine}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {71--83}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181980}, doi = {10.23919/CYCON58705.2023.10181980}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LillyGRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LinkovSSGKTKBT23, author = {Igor Linkov and Kelsey Stoddard and Andrew Strelzoff and Stephanie Elisabeth Galaitsi and Jeffrey M. Keisler and Benjamin D. Trump and Alexander Kott and Pavol Bielik and Petar Tsankov}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Toward Mission-Critical {AI:} Interpretable, Actionable, and Resilient {AI}}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {181--197}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181349}, doi = {10.23919/CYCON58705.2023.10181349}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LinkovSSGKTKBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LonerganSM23, author = {Erica D. Lonergan and Margaret W. Smith and Grace B. Mueller}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine\({}^{\mbox{*}}\)}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {85--102}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182101}, doi = {10.23919/CYCON58705.2023.10182101}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LonerganSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MaengP23, author = {YoungJae Maeng and Mauno Pihelgas}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {239--252}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182014}, doi = {10.23919/CYCON58705.2023.10182014}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MaengP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Malone23, author = {Matt Malone}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Weaponizing Cross-Border Data Flows: An Opportunity for NATO?}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {329--343}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181730}, doi = {10.23919/CYCON58705.2023.10181730}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Malone23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/OzkanT23, author = {Baris Egemen Ozkan and Ihsan B. Tolga}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Zero-Day Operational Cyber Readiness}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {199--215}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181814}, doi = {10.23919/CYCON58705.2023.10181814}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/OzkanT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Schmuki23, author = {Yann L. Schmuki}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {25--38}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181885}, doi = {10.23919/CYCON58705.2023.10181885}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Schmuki23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/SmithD23, author = {Margaret W. Smith and Thomas Dean}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {The Irregulars: Third-Party Cyber Actors and Digital Resistance Movements in the Ukraine Conflict}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {103--119}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182061}, doi = {10.23919/CYCON58705.2023.10182061}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/SmithD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/StricksonWB23, author = {Benjamin Strickson and Cameron Worsley and Stewart Bertram}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Human-centered Assessment of Automated Tools for Improved Cyber Situational Awareness}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {273--286}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181567}, doi = {10.23919/CYCON58705.2023.10181567}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/StricksonWB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Sullivan23, author = {Scott Sullivan}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Unpacking Cyber Neutrality}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {9--23}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181864}, doi = {10.23919/CYCON58705.2023.10181864}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Sullivan23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Thogersen23, author = {Marie Th{\o}gersen}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {39--54}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10182021}, doi = {10.23919/CYCON58705.2023.10182021}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Thogersen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ZacharisGPI23, author = {Alexandros Zacharis and Razvan Gavrila and Constantinos Patsakis and Demosthenes Ikonomou}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict}, booktitle = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, pages = {217--238}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023.10181930}, doi = {10.23919/CYCON58705.2023.10181930}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ZacharisGPI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2023, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and D. Giovannelli and Karlis Podins and I. Winther}, title = {15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/CyCon58705.2023}, doi = {10.23919/CYCON58705.2023}, isbn = {978-9916-9789-3-1}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BaseltSPLM22, author = {Georg Baselt and Martin Strohmeier and James Pavur and Vincent Lenders and Ivan Martinovic}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Security and Privacy Issues of Satellite Communication in the Avlatlon Domain}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {285--307}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811060}, doi = {10.23919/CYCON55549.2022.9811060}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BaseltSPLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BatrlaH22, author = {Michael B{\'{a}}trla and Jakub Harasta}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {'Releasing the Hounds?'\({}^{\mbox{1}}\) Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {93--115}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811074}, doi = {10.23919/CYCON55549.2022.9811074}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BatrlaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Benthem22, author = {Tsvetelina J. van Benthem}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Exploring Changing Battlefields: Autonomous Weapons, Unintended Engagements and the Law of Armed Conflict}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {190--204}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811070}, doi = {10.23919/CYCON55549.2022.9811070}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Benthem22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Bygrave22, author = {Lee A. Bygrave}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Cyber Resilience versus Cybersecurity as Legal Aspiration}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {27--43}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811084}, doi = {10.23919/CYCON55549.2022.9811084}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Bygrave22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/CymuttaZO22, author = {Sebastian Cymutta and Marten Zwanenburg and Paul Oling}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Military Data and Information Sharing - a European Union Perspective}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {219--234}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811028}, doi = {10.23919/CYCON55549.2022.9811028}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/CymuttaZO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DilworthO22, author = {Seth W. Dilworth and D. Daniel Osborne}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Cyber Threats Against and in the Space Domain: Legal Remedies}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {235--247}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811057}, doi = {10.23919/CYCON55549.2022.9811057}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DilworthO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GilesH22, author = {Keir Giles and Kim Hartmann}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Emergence of 5G Networks and Implications for Cyber Conflict}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {405--419}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9810903}, doi = {10.23919/CYCON55549.2022.9810903}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GilesH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GomezW22, author = {Miguel Alberto Gomez and Gregory Winger}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {117--134}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811075}, doi = {10.23919/CYCON55549.2022.9811075}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GomezW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HalisdemirKPLC22, author = {Emre Halisdemir and Hacer Karacan and Mauno Pihelgas and Toomas Lepik and Sungbaek Cho}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {367--383}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811014}, doi = {10.23919/CYCON55549.2022.9811014}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HalisdemirKPLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KiviharjuLRK22, author = {Mikko Kiviharju and Christina Lassfolk and Sanna Rikkonen and Hannu H. Kari}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {265--284}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811081}, doi = {10.23919/CYCON55549.2022.9811081}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KiviharjuLRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Libicki22, author = {Martin C. Libicki}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Obnoxious Deterrence}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {65--77}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811024}, doi = {10.23919/CYCON55549.2022.9811024}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Libicki22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LonerganM22, author = {Erica D. Lonergan and Mark Montgomery}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {The Promise and Perils of Allied Offensive Cyber Operations}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {79--92}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811090}, doi = {10.23919/CYCON55549.2022.9811090}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LonerganM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Maschmeyer22, author = {Lennart Maschmeyer}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {155--171}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811008}, doi = {10.23919/CYCON55549.2022.9811008}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Maschmeyer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MolloyCDF22, author = {Christopher Molloy and Philippe Charland and Steven H. H. Ding and Benjamin C. M. Fung}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {{JARV1S:} Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {385--403}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811078}, doi = {10.23919/CYCON55549.2022.9811078}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MolloyCDF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RajapakshaKAMP22, author = {Sampath Rajapaksha and Harsha K. Kalutarage and M. Omar Al{-}Kadri and Garikayi Madzudzo and Andrei V. Petrovski}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle {CAN} Bus Security}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {309--330}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811048}, doi = {10.23919/CYCON55549.2022.9811048}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RajapakshaKAMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RossTWJ22, author = {Joseph A. J. Ross and Kimberly Tam and David J. Walker and Kevin D. Jones}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Towards a Digital Twin of a Complex Maritime Site for Multi-Objective Optimization}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {331--345}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811082}, doi = {10.23919/CYCON55549.2022.9811082}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RossTWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Salomon22, author = {John Morgan Salomon}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Public-Private Partnerships and Collective Cyber Defence}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {45--63}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9810912}, doi = {10.23919/CYCON55549.2022.9810912}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Salomon22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ShrivastavaFGM22, author = {Siddhant Shrivastava and Francisco Furtado and Mark Goh and Aditya Mathur}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {The Design of Cyber-Physical Exercises {(CPXS)}}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {348--366}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811000}, doi = {10.23919/CYCON55549.2022.9811000}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ShrivastavaFGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Smeets22, author = {Max Smeets}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {The Role of Military Cyber Exercises: {A} Case Study of Locked Shields}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {9--25}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811018}, doi = {10.23919/CYCON55549.2022.9811018}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Smeets22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/StejskalF22, author = {Petr Stejskal and Martin Faix}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Legal Aspects of Misattribution Caused by Cyber Deception}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {205--218}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9810910}, doi = {10.23919/CYCON55549.2022.9810910}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/StejskalF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Sukumar22, author = {Arun Mohan Sukumar}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {'Responsibility to Detect?': Autonomous Threat Detection and its Implications for Due Diligence in Cyberspace}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {173--187}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811012}, doi = {10.23919/CYCON55549.2022.9811012}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Sukumar22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Thomas22, author = {Michael L. Thomas}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Maritime Hacking Using Land-Based Skills}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {249--263}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811049}, doi = {10.23919/CYCON55549.2022.9811049}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Thomas22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Whyte22, author = {Christopher E. Whyte}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {Machine Expertise in the Loop: Artificial Intelligence Decision-Making Inputs and Cyber Conflict}, booktitle = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, pages = {135--154}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022.9811076}, doi = {10.23919/CYCON55549.2022.9811076}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Whyte22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2022, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and G{\'{a}}bor Visky and I. Winther}, title = {14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/CyCon55549.2022}, doi = {10.23919/CYCON55549.2022}, isbn = {978-9916-9789-1-7}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BaroniCFGGGS21, author = {Pietro Baroni and Federico Cerutti and Daniela Fogli and Massimiliano Giacomin and Francesco Gringoli and Giovanni Guida and Paul Sullivan}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Self-Aware Effective Identification and Response to Viral Cyber Threats}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {353--370}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468294}, doi = {10.23919/CYCON51939.2021.9468294}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/BaroniCFGGGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Blessing21, author = {Jason Blessing}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {The Global Spread of Cyber Forces, 2000-2018}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {233--255}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9467807}, doi = {10.23919/CYCON51939.2021.9467807}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Blessing21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Delerue21, author = {Fran{\c{c}}ois Delerue}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Covid-19 and the Cyber Pandemic: {A} Plea for International Law and the Rule of Sovereignty in Cyberspace}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {9--24}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468306}, doi = {10.23919/CYCON51939.2021.9468306}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Delerue21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GilesH21, author = {Keir Giles and Kim Hartmann}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Adversary Targeting of Civilian Telecommunications Infrastructure}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {133--150}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468303}, doi = {10.23919/CYCON51939.2021.9468303}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GilesH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HarryV21, author = {Charles Harry and Skanda Vivek}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Strategic Cyber Effects in Complex Systems: Understanding the {US} Air Transportation Sector}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {111--131}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468293}, doi = {10.23919/CYCON51939.2021.9468293}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HarryV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KaminskaBC21, author = {Monica Kaminska and Dennis Broeders and Fabio Cristiano}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {59--72}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468290}, doi = {10.23919/CYCON51939.2021.9468290}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KaminskaBC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KlickKB21, author = {Johannes Klick and Robert Koch and Thomas Brandstetter}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Epidemic? The Attack Surface of German Hospitals during the {COVID-19} Pandemic}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {73--94}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468304}, doi = {10.23919/CYCON51939.2021.9468304}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KlickKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KrasznayG21, author = {Csaba Krasznay and Gerg{\"{o}} Gyebn{\'{a}}r}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Possibilities and Limitations of Cyber Threat Intelligence in Energy Systems}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {171--188}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468289}, doi = {10.23919/CYCON51939.2021.9468289}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KrasznayG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KushwahaGSW21, author = {Neal Kushwaha and Keir Giles and Tassilo Singer and Bruce W. Watson}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Cyber Personhood}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {275--289}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468299}, doi = {10.23919/CYCON51939.2021.9468299}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KushwahaGSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LavrenovsG21, author = {Arturs Lavrenovs and Roman Graf}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Explainable {AI} for Classifying Devices on the Internet}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {291--308}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9467804}, doi = {10.23919/CYCON51939.2021.9467804}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LavrenovsG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LibickiG21, author = {Martin C. Libicki and David Gompert}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Quantum Communication for Post-Pandemic Cybersecurity}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {371--386}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468295}, doi = {10.23919/CYCON51939.2021.9468295}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LibickiG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MavroeidisHCJ21, author = {Vasileios Mavroeidis and Ryan Hohimer and Tim Casey and Audun J{\o}sang}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Threat Actor Type Inference and Characterization within Cyber Threat Intelligence}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {327--352}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468305}, doi = {10.23919/CYCON51939.2021.9468305}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MavroeidisHCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MeierLHGL21, author = {Roland Meier and Arturs Lavrenovs and Kimmo Hein{\"{a}}aro and Luca Gambazzi and Vincent Lenders}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Towards an AI-powered Player in Cyber Defence Exercises}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {309--326}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9467801}, doi = {10.23919/CYCON51939.2021.9467801}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MeierLHGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PavurSLM21, author = {James Pavur and Martin Strohmeier and Vincent Lenders and Ivan Martinovic}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {151--169}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468300}, doi = {10.23919/CYCON51939.2021.9468300}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PavurSLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Pijovic21, author = {Nikola Pijovic}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {The Cyberspace 'Great Game'. The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {215--231}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468296}, doi = {10.23919/CYCON51939.2021.9468296}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Pijovic21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RadunovicGM21, author = {Vladimir Radunovic and Jonas Gr{\"{a}}tz{-}Hoffmann and Marilia Maciel}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Impact of Good Corporate Practices for Security of Digital Products on Global Cyber Stability}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {25--42}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9467805}, doi = {10.23919/CYCON51939.2021.9467805}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RadunovicGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RobertsV21, author = {Anastasia Roberts and Adrian Venables}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {The Role of Artificial Intelligence in Kinetic Targeting from the Perspective of International Humanitarian Law}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {43--57}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468301}, doi = {10.23919/CYCON51939.2021.9468301}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RobertsV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Shires21, author = {James Shires}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Windmills of the Mind: Higher-Order Forms of Disinformation in International Politics}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {257--273}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468292}, doi = {10.23919/CYCON51939.2021.9468292}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Shires21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ValerianoJ21, author = {Brandon Valeriano and Benjamin Jensen}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {Building a National Cyber Strategy: The Process and Implications of the Cyberspace Solarium Commission Report}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {189--214}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9467806}, doi = {10.23919/CYCON51939.2021.9467806}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ValerianoJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Vedral21, author = {Bobby Vedral}, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {The Vulnerability of the Financial System to a Systemic Cyberattack}, booktitle = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, pages = {95--110}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021.9468291}, doi = {10.23919/CYCON51939.2021.9468291}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Vedral21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2021, editor = {Tat'{\'{a}}na Janc{\'{a}}rkov{\'{a}} and Lauri Lindstr{\"{o}}m and G{\'{a}}bor Visky and Philippe Zotz}, title = {13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/CyCon51939.2021}, doi = {10.23919/CYCON51939.2021}, isbn = {978-9916-9565-5-7}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/AzevedoPC20, author = {Gilberto Pires de Azevedo and Paulo C{\'{e}}sar Pellanda and Maxli Barroso Campos}, title = {Addressing the Cybersecurity Challenges of Electrical Power Systems of the Future}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {293--308}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131732}, doi = {10.23919/CYCON49761.2020.9131732}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/AzevedoPC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BeshajH20, author = {Lubjana Beshaj and Andrew O. Hall}, title = {Recent Developments in Cryptography}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {351--368}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131714}, doi = {10.23919/CYCON49761.2020.9131714}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/BeshajH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DodsonBV20, author = {Michael Dodson and Alastair R. Beresford and Mikael Vingaard}, title = {Using Global Honeypot Networks to Detect Targeted {ICS} Attacks}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {275--291}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131734}, doi = {10.23919/CYCON49761.2020.9131734}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DodsonBV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DouzetPSLSA20, author = {Fr{\'{e}}d{\'{e}}rick Douzet and Louis P{\'{e}}tiniaud and Loqman Salamatian and K{\'{e}}vin Limonier and Kav{\'{e}} Salamatian and Thibaut Alchus}, title = {Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol {(BGP)} During the Ukrainian Crisis}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {157--182}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131726}, doi = {10.23919/CYCON49761.2020.9131726}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/DouzetPSLSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HartmannG20, author = {Kim Hartmann and Keir Giles}, title = {The Next Generation of Cyber-Enabled Information Warfare}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {233--250}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131716}, doi = {10.23919/CYCON49761.2020.9131716}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HartmannG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HartmannS20, author = {Kim Hartmann and Christoph Steup}, title = {Hacking the {AI} - the Next Generation of Hijacked Systems}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {327--349}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131724}, doi = {10.23919/CYCON49761.2020.9131724}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HartmannS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HealeyJW20, author = {Jason Healey and Neil Jenkins and J. D. Work}, title = {Defenders Disrupting Adversaries: Framework, Dataset, and Case Studies of Disruptive Counter-Cyber Operations}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {251--274}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131725}, doi = {10.23919/CYCON49761.2020.9131725}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HealeyJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KajanderKT20, author = {Aleksi Kajander and Agnes Kasper and Evhen Tsybulenko}, title = {Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva Conventions}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {79--95}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131722}, doi = {10.23919/CYCON49761.2020.9131722}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KajanderKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kosseff20, author = {Jeff Kosseff}, title = {Retorsion as a Response to Ongoing Malign Cyber Operations}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {9--23}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131730}, doi = {10.23919/CYCON49761.2020.9131730}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kosseff20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KudlackovaWH20, author = {Ivana Kudl{\'{a}}ckov{\'{a}} and David Wallace and Jakub Harasta}, title = {Cyber Weapons Review in Situations Below the Threshold of Armed Conflict}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {97--112}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131728}, doi = {10.23919/CYCON49761.2020.9131728}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KudlackovaWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KushwahaRW20, author = {Neal Kushwaha and Przemyslaw Roguski and Bruce W. Watson}, title = {Up in the Air: Ensuring Government Data Sovereignty in the Cloud}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {43--61}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131718}, doi = {10.23919/CYCON49761.2020.9131718}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KushwahaRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LavrenovsGH20, author = {Arturs Lavrenovs and Roman Graf and Kimmo Hein{\"{a}}aro}, title = {Towards Classifying Devices on the Internet Using Artificial Intelligence}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {309--325}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131713}, doi = {10.23919/CYCON49761.2020.9131713}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LavrenovsGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Libicki20, author = {Martin C. Libicki}, title = {Correlations Between Cyberspace Attacks and Kinetic Attacks}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {199--213}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131731}, doi = {10.23919/CYCON49761.2020.9131731}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Libicki20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LillyC20, author = {Bilyana Lilly and Joe Cheravitch}, title = {The Past, Present, and Future of Russia's Cyber Strategy and Forces}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {129--155}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131723}, doi = {10.23919/CYCON49761.2020.9131723}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LillyC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/NwekeW20, author = {Livinus Obiora Nweke and Stephen D. Wolthusen}, title = {Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {63--78}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131721}, doi = {10.23919/CYCON49761.2020.9131721}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/NwekeW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ParkS20, author = {Tina J. Park and Michael Switzer}, title = {{R2P} {\&} Cyberspace: Sovereignty as a Responsibility}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {113--127}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131729}, doi = {10.23919/CYCON49761.2020.9131729}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ParkS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Roguski20, author = {Przemyslaw Roguski}, title = {Collective Countermeasures in Cyberspace - Lex Lata, Progressive Development or a Bad Idea?}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {25--42}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131715}, doi = {10.23919/CYCON49761.2020.9131715}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Roguski20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Schulze20, author = {Matthias Schulze}, title = {Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber Operations}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {183--197}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131733}, doi = {10.23919/CYCON49761.2020.9131733}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Schulze20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Whyte20, author = {Christopher Whyte}, title = {Problems of Poison: New Paradigms and "Agreed" Competition in the Era of AI-Enabled Cyber Operations}, booktitle = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, pages = {215--232}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CyCon49761.2020.9131717}, doi = {10.23919/CYCON49761.2020.9131717}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Whyte20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2020, title = {12th International Conference on Cyber Conflict, CyCon 2020, Virtual event, Estonia, May 26-29, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9129668/proceeding}, isbn = {9789-949-9904-7-4}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002FSELL19, author = {Matthias Sch{\"{a}}fer and Markus Fuchs and Martin Strohmeier and Markus Engel and Marc Liechti and Vincent Lenders}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {BlackWidow: Monitoring the Dark Web for Cyber Security Information}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--21}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756845}, doi = {10.23919/CYCON.2019.8756845}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002FSELL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G19, author = {Robert Koch and Mario Golling}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Silent Battles: Towards Unmasking Hidden Cyber Attack}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757146}, doi = {10.23919/CYCON.2019.8757146}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ApruzzeseCFM19, author = {Giovanni Apruzzese and Michele Colajanni and Luca Ferretti and Mirco Marchetti}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Addressing Adversarial Attacks Against Security Systems Based on Machine Learning}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--18}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756865}, doi = {10.23919/CYCON.2019.8756865}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/ApruzzeseCFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BaramS19, author = {Gil Baram and Udi Sommer}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Covert or not Covert: National Strategies During Cyber Conflict}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756682}, doi = {10.23919/CYCON.2019.8756682}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BaramS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BargarPBM19, author = {Alicia Bargar and Stephanie Pitts and Janis Butkevics and Ian McCulloh}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--18}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756832}, doi = {10.23919/CYCON.2019.8756832}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BargarPBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Bigelow19, author = {Brad Bigelow}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {What are Military Cyberspace Operations Other Than War?}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--17}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756835}, doi = {10.23919/CYCON.2019.8756835}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Bigelow19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BurtonS19, author = {Joe Burton and Simona R. Soare}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Understanding the Strategic Implications of the Weaponization of Artificial Intelligence}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--17}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756866}, doi = {10.23919/CYCON.2019.8756866}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BurtonS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DumontMGL19, author = {Pierre Dumont and Roland Meier and David Gugelmann and Vincent Lenders}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Detection of Malicious Remote Shell Sessions}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757163}, doi = {10.23919/CYCON.2019.8757163}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DumontMGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GilesH19, author = {Keir Giles and Kim Hartmann}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {"Silent Battle" Goes Loud: Entering a New Era of State-Avowed Cyber Conflict}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--13}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756713}, doi = {10.23919/CYCON.2019.8756713}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GilesH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GrafKK19, author = {Roman Graf and Leon Aaron Kaplan and Ross King}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Neural Network-Based Technique for Android Smartphone Applications Classification}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--17}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757162}, doi = {10.23919/CYCON.2019.8757162}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GrafKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HealeyJ19, author = {Jason Healey and Neil Jenkins}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Rough-and-Ready: {A} Policy Framework to Determine if Cyber Deterrence is Working or Failing}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756890}, doi = {10.23919/CYCON.2019.8756890}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HealeyJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KanzigMGLV19, author = {Nicolas K{\"{a}}nzig and Roland Meier and Luca Gambazzi and Vincent Lenders and Laurent Vanbever}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Machine Learnin{\c{g}}-based Detection of C{\&}C Channels with a Focus on the Locked Shields Cyber Defense Exercise}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756814}, doi = {10.23919/CYCON.2019.8756814}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KanzigMGLV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KapellmannW19, author = {Daniel Kapellmann and Rhyner Washburn}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical Infrastructure}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--23}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756895}, doi = {10.23919/CYCON.2019.8756895}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KapellmannW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KimKJ19, author = {Joonsoo Kim and Kyeongho Kim and Moonsu Jang}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756901}, doi = {10.23919/CYCON.2019.8756901}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KimKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Koch19, author = {Robert Koch}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Hidden in the Shadow: The Dark Web - {A} Growing Risk for Military Operations?}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--24}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756708}, doi = {10.23919/CYCON.2019.8756708}, timestamp = {Thu, 18 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Koch19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KongLK19, author = {Ji{-}Young Kong and Jong{-}In Lim and Kyoung{-}Gon Kim}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {The All-Purpose Sword: North Korea's Cyber Operations and Strategies}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--20}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756954}, doi = {10.23919/CYCON.2019.8756954}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/KongLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kosseff19, author = {Jeff Kosseff}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {The Contours of 'Defend Forward' Under International Law}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--13}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757141}, doi = {10.23919/CYCON.2019.8757141}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kosseff19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kraszewski19, author = {Kenneth Kraszewski}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {SamSam and the Silent Battle of Atlanta}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--16}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757090}, doi = {10.23919/CYCON.2019.8757090}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kraszewski19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Lavrenovs19, author = {Arturs Lavrenovs}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Towards Measuring Global DDoS Attack Capacity}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--15}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756851}, doi = {10.23919/CYCON.2019.8756851}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Lavrenovs19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Libicki19, author = {Martin Libicki}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {For a Baltic Cyberspace Alliance?}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--14}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756758}, doi = {10.23919/CYCON.2019.8756758}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Libicki19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LillyAHM19, author = {Bilyana Lilly and Lillian Ablon and Quentin E. Hodgson and Adam S. Moore}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Applying Indications and Warning Frameworks to Cyber Incidents}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--21}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756949}, doi = {10.23919/CYCON.2019.8756949}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LillyAHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MurinoAT19, author = {Giuseppina Murino and Alessandro Armando and Armando Tacchella}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757010}, doi = {10.23919/CYCON.2019.8757010}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MurinoAT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/OryeM19, author = {Erwin Orye and Olaf Manuel Maennel}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Recommendations for Enhancing the Results of Cyber Effects}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756649}, doi = {10.23919/CYCON.2019.8756649}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/OryeM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/OttO19, author = {Nikolas Ott and Anna{-}Maria Osula}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {The Rise of the Regionals: How Regional Organisations Contribute to International Cyber Stability Negotiations at the United Nations Level}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--25}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756863}, doi = {10.23919/CYCON.2019.8756863}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/OttO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/OzkanB19, author = {Barls Egemen {\"{O}}zkan and Serol Bulkan}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Hidden Risks to Cyberspace Security from Obsolete {COTS} Software}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756990}, doi = {10.23919/CYCON.2019.8756990}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/OzkanB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PavurM19, author = {James Pavur and Ivan Martinovic}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--18}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756904}, doi = {10.23919/CYCON.2019.8756904}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PavurM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Roguski19, author = {Przemyslaw Roguski}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital Environment}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--13}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756900}, doi = {10.23919/CYCON.2019.8756900}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Roguski19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Sander19, author = {Barrie Sander}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {The Sound of Silence: International Law and the Governance of Peacetime Cyber Operations}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--21}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756882}, doi = {10.23919/CYCON.2019.8756882}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Sander19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Smeets19, author = {Max Smeets}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {{NATO} Members' Organizational Path Towards Conducting Offensive Cyber Operations: {A} Framework for Analysis}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--15}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8756634}, doi = {10.23919/CYCON.2019.8756634}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Smeets19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2019, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8751947/proceeding}, isbn = {978-9949-9904-5-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G18, author = {Robert Koch and Mario Golling}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {The cyber decade: Cyber defence at a X-ing point}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {159--186}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405016}, doi = {10.23919/CYCON.2018.8405016}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ApruzzeseCFGM18, author = {Giovanni Apruzzese and Michele Colajanni and Luca Ferretti and Alessandro Guido and Mirco Marchetti}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {On the effectiveness of machine and deep learning for cyber security}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {371--390}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405026}, doi = {10.23919/CYCON.2018.8405026}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/ApruzzeseCFGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Bigelow18, author = {Brad Bigelow}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {The topography of cyberspace and its consequences for operations}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {123--138}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405014}, doi = {10.23919/CYCON.2018.8405014}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Bigelow18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Brantly18, author = {Aaron F. Brantly}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {The cyber deterrence problem}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {31--54}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405009}, doi = {10.23919/CYCON.2018.8405009}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Brantly18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GrafK18, author = {Roman Graf and Ross King}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Neural network and blockchain based technique for cyber threat intelligence and situational awareness}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {409--426}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405028}, doi = {10.23919/CYCON.2018.8405028}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GrafK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GugelmannSLHV18, author = {David Gugelmann and David M. Sommer and Vincent Lenders and Markus Happe and Laurent Vanbever}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Screen watermarking for data theft investigation and attribution}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {391--408}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405027}, doi = {10.23919/CYCON.2018.8405027}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/GugelmannSLHV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HartmannG18, author = {Kim Hartmann and Keir Giles}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Net neutrality in the context of cyber warfare}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {139--158}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405015}, doi = {10.23919/CYCON.2018.8405015}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HartmannG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Hodgson18, author = {Quentin E. Hodgson}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Understanding and countering cyber coercion}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {73--88}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405011}, doi = {10.23919/CYCON.2018.8405011}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Hodgson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Huszti-Orban18, author = {Krisztina Huszti{-}Orban}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement\({}^{\mbox{1}}\)}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {227--244}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405019}, doi = {10.23919/CYCON.2018.8405019}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Huszti-Orban18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kosseff18, author = {Jeff Kosseff}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Developing collaborative and cohesive cybersecurity legal principles}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {283--298}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405022}, doi = {10.23919/CYCON.2018.8405022}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kosseff18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LavrenovsM18, author = {Arturs Lavrenovs and F. Jesus Rubio Melon}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {{HTTP} security headers analysis of top one million websites}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {345--370}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405025}, doi = {10.23919/CYCON.2018.8405025}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LavrenovsM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Libicki18, author = {Martin C. Libicki}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Drawing inferences from cyber espionage}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {109--122}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405013}, doi = {10.23919/CYCON.2018.8405013}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Libicki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Lubin18, author = {Asaf Lubin}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Cyber law and espionage law as communicating vessels}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {203--226}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405018}, doi = {10.23919/CYCON.2018.8405018}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Lubin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MeierSGLV18, author = {Roland Meier and Cornelia Scherrer and David Gugelmann and Vincent Lenders and Laurent Vanbever}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {FeedRank: {A} tamper- resistant method for the ranking of cyber threat intelligence feeds}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {321--344}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405024}, doi = {10.23919/CYCON.2018.8405024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MeierSGLV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Moore18, author = {Daniel Moore}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Targeting technology: Mapping military offensive network operations}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {89--108}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405012}, doi = {10.23919/CYCON.2018.8405012}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Moore18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/NoelRPLLM18, author = {Steven Noel and Paul D. Rowe and Stephen Purdy and Michael Limiero and Travis Lu and Will Mathews}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Mission-focused cyber situational understanding via graph analytics}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {427--448}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405029}, doi = {10.23919/CYCON.2018.8405029}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/NoelRPLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PodinsG18, author = {Karlis Podins and Kenneth Geers}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Aladdin's lamp: The theft and re-weaponization of malicious code}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {187--202}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405017}, doi = {10.23919/CYCON.2018.8405017}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PodinsG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Sabbah18, author = {Cedric Sabbah}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Pressing pause: {A} new approach for international cybersecurity norm development}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {263--282}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405021}, doi = {10.23919/CYCON.2018.8405021}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Sabbah18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/SmeetsL18, author = {Max Smeets and Herbert S. Lin}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Offensive cyber capabilities: To what ends?}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {55--72}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405010}, doi = {10.23919/CYCON.2018.8405010}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/SmeetsL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Stockburger18, author = {Peter Z. Stockburger}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {From grey zone to customary international law: How adopting the precautionary principle may help crystallize the due diligence principle in cyberspace}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {245--262}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405020}, doi = {10.23919/CYCON.2018.8405020}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Stockburger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Strohmeier0M0LM18, author = {Martin Strohmeier and Matthew Smith and Daniel Moser and Matthias Sch{\"{a}}fer and Vincent Lenders and Ivan Martinovic}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Utilizing air traffic communications for {OSINT} on state and government aircraft}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {299--320}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405023}, doi = {10.23919/CYCON.2018.8405023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Strohmeier0M0LM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/WhyteVJM18, author = {Christopher Whyte and Brandon Valeriano and Benjamin Jensen and Ryan Maness}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Rethinking the data wheel: Automating open-access, public data on cyber conflict}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {9--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405008}, doi = {10.23919/CYCON.2018.8405008}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/WhyteVJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2018, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8399711/proceeding}, isbn = {978-9-9499-9042-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002K17, author = {Robert Koch and Teo Kuhn}, title = {Defending the grid: Backfitting non-expandable control systems}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--17}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240335}, doi = {10.23919/CYCON.2017.8240335}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002K17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Bigelow17, author = {Brad Bigelow}, title = {Mission assurance: Shifting the focus of cyber defence}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--12}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240327}, doi = {10.23919/CYCON.2017.8240327}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Bigelow17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Biller17, author = {Jeffrey Biller}, title = {The misuse of protected indicators in cyberspace: Defending a core aspect of international humanitarian law}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--14}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240331}, doi = {10.23919/CYCON.2017.8240331}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Biller17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Geers17, author = {Kenneth Geers}, title = {Core illumination: Traffic analysis in cyberspace}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--18}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240328}, doi = {10.23919/CYCON.2017.8240328}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Geers17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Libicki17, author = {Martin Libicki}, title = {The coming of cyber espionage norms}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--17}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240325}, doi = {10.23919/CYCON.2017.8240325}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Libicki17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LongoPRS17, author = {Riccardo Longo and Federico Pintore and Giancarlo Rinaldo and Massimiliano Sala}, title = {On the security of the blockchain {BIX} protocol and certificates}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--16}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240338}, doi = {10.23919/CYCON.2017.8240338}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LongoPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Macak17, author = {Kubo Macak}, title = {From the vanishing point back to the core: The impact of the development of the cyber law of war on general international law}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--14}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240333}, doi = {10.23919/CYCON.2017.8240333}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Macak17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PierazziACGM17, author = {Fabio Pierazzi and Giovanni Apruzzese and Michele Colajanni and Alessandro Guido and Mirco Marchetti}, title = {Scalable architecture for online prioritisation of cyber threats}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--18}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240337}, doi = {10.23919/CYCON.2017.8240337}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PierazziACGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Sevilla17, author = {Ido Sivan Sevilla}, title = {Trading privacy for security in cyberspace: {A} study across the dynamics of {US} federal laws and regulations between 1967 and 2016}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--19}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240329}, doi = {10.23919/CYCON.2017.8240329}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Sevilla17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Singer17, author = {Tassilo V. P. Singer}, title = {Update to revolving door 2.0: The extension of the period for direct participation in hostilities due to autonomous cyber weapons}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--13}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240332}, doi = {10.23919/CYCON.2017.8240332}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Singer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Smeets17, author = {Max Smeets}, title = {Organisational integration of offensive cyber capabilities: {A} primer on the benefits and risks}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--18}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240326}, doi = {10.23919/CYCON.2017.8240326}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Smeets17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Stockburger17, author = {Peter Z. Stockburger}, title = {Control and capabilities test: Toward a new lex specialis governing state responsibility for third party cyber incidents}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--14}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240334}, doi = {10.23919/CYCON.2017.8240334}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Stockburger17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/StrohmeierS0LM17, author = {Martin Strohmeier and Matthew Smith and Matthias Sch{\"{a}}fer and Vincent Lenders and Ivan Martinovic}, title = {Crowdsourcing security for wireless air traffic communications}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--18}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240336}, doi = {10.23919/CYCON.2017.8240336}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/StrohmeierS0LM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Watt17, author = {Eliza Watt}, title = {The role of international human rights law in the protection of online privacy in the age of surveillance}, booktitle = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, pages = {1--14}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/CYCON.2017.8240330}, doi = {10.23919/CYCON.2017.8240330}, timestamp = {Fri, 05 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/Watt17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2017, title = {9th International Conference on Cyber Conflict, CyCon 2017, Tallinn, Estonia, May 30 - June 2, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8211420/proceeding}, isbn = {978-9949-9904-1-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/000116, author = {Paolo Palmieri}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Anonymity networks and access to information during conflicts: Towards a distributed network organisation}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {263--275}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529439}, doi = {10.1109/CYCON.2016.7529439}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/000116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G16, author = {Robert Koch and Mario Golling}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Weapons systems and cyber security - a challenging union}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {191--203}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529435}, doi = {10.1109/CYCON.2016.7529435}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BrangettoJALPRV16, author = {Pascal Brangetto and Raik Jakschis and Mari Kert{-}St Aubyn and Lauri Lindstr{\"{o}}m and Nikolaos Pissanidis and Henry Roigas and Teemu Uolevi V{\"{a}}is{\"{a}}nen and Matthijs Veenendaal}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Introduction}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529421}, doi = {10.1109/CYCON.2016.7529421}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BrangettoJALPRV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BrangettoV16, author = {Pascal Brangetto and Matthijs A. Veenendaal}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Influence Cyber Operations: The use of cyberattacks in support of Influence Operations}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {113--126}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529430}, doi = {10.1109/CYCON.2016.7529430}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BrangettoV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/CraigV16, author = {Anthony Craig and Brandon Valeriano}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Conceptualising cyber arms races}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {141--158}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529432}, doi = {10.1109/CYCON.2016.7529432}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/CraigV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Haaster16, author = {Jelle van Haaster}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Assessing cyber power}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {7--21}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529423}, doi = {10.1109/CYCON.2016.7529423}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Haaster16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HartmannG16, author = {Kim Hartmann and Keir Giles}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {{UAV} exploitation: {A} new domain for cyber power}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {205--221}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529436}, doi = {10.1109/CYCON.2016.7529436}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HartmannG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Healey16, author = {Jason Healey}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Winning and losing in cyberspace}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {37--49}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529425}, doi = {10.1109/CYCON.2016.7529425}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Healey16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Herr16, author = {Trey Herr}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Malware counter-proliferation and the Wassenaar Arrangement}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {175--190}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529434}, doi = {10.1109/CYCON.2016.7529434}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Herr16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Herrick16, author = {Drew Herrick}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {The social side of 'cyber power'? Social media and cyber operations}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {99--111}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529429}, doi = {10.1109/CYCON.2016.7529429}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Herrick16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/JakobsonO16, author = {Gabriel Jakobson and Rain Ottis}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Foreword}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {1}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529419}, doi = {10.1109/CYCON.2016.7529419}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/JakobsonO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LawsonYYG16, author = {Sean Lawson and Sara K. Yeo and Haoran Yu and Ethan Greene}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {The cyber-doom effect: The impact of fear appeals in the {US} cyber security debate}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {65--80}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529427}, doi = {10.1109/CYCON.2016.7529427}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LawsonYYG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Macak16, author = {Kubo Macak}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Is the international law of cyber security in crisis?}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {127--139}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529431}, doi = {10.1109/CYCON.2016.7529431}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Macak16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MarchettiGPC16, author = {Mirco Marchetti and Fabio Pierazzi and Alessandro Guido and Michele Colajanni}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Countering Advanced Persistent Threats through security intelligence and big data analytics}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {243--261}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529438}, doi = {10.1109/CYCON.2016.7529438}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MarchettiGPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MaybaumT16, author = {Markus Maybaum and Jens T{\"{o}}lle}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Arms control in cyberspace - architecture for a trust-based implementation framework based on conventional arms control methods}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {159--173}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529433}, doi = {10.1109/CYCON.2016.7529433}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MaybaumT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RaoOHA16, author = {Siddharth Prakash Rao and Ian Oliver and Silke Holtmanns and Tuomas Aura}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {We know where you are!}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {277--293}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529440}, doi = {10.1109/CYCON.2016.7529440}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RaoOHA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Siedler16, author = {Ragnhild Endresen Siedler}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Hard power in cyberspace: {CNA} as a political means}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {23--36}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529424}, doi = {10.1109/CYCON.2016.7529424}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Siedler16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/SinBAW16, author = {Steve S. Sin and Laura A. Blackerby and Elvis Asiamah and Rhyner Washburn}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Determining extremist organisations' likelihood of conducting cyber attacks}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {81--98}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529428}, doi = {10.1109/CYCON.2016.7529428}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/SinBAW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Strohmeier0SLM16, author = {Martin Strohmeier and Matthias Sch{\"{a}}fer and Matthew Smith and Vincent Lenders and Ivan Martinovic}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Assessing the impact of aviation security on cyber power}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {223--241}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529437}, doi = {10.1109/CYCON.2016.7529437}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Strohmeier0SLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Tabansky16, author = {Lior Tabansky}, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {Towards a theory of cyber power: The Israeli experience with innovation and strategy}, booktitle = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, pages = {51--63}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CYCON.2016.7529426}, doi = {10.1109/CYCON.2016.7529426}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Tabansky16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2016, editor = {Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal}, title = {8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7524181/proceeding}, isbn = {978-9-9499-5449-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G15, author = {Robert Koch and Mario Golling}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Blackout and now? Network Centric Warfare in an anti-access area-denial theatre}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {169--184}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158476}, doi = {10.1109/CYCON.2015.7158476}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BalboniMCM15, author = {Andrea Balboni and Mirco Marchetti and Michele Colajanni and Andrea Melegari}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Supporting sense-making and decision-making through time evolution analysis of open sources}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {185--202}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158477}, doi = {10.1109/CYCON.2015.7158477}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/BalboniMCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BlumbergsBLMOPR15, author = {Bernhards Blumbergs and Pascal Brangetto and Lauri Lindstr{\"{o}}m and Markus Maybaum and Anna{-}Maria Osula and Nikolaos Pissanidis and Henry Roigas and Matthijs Veenendaal and Teemu Uolevi V{\"{a}}is{\"{a}}nen}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Introduction}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158463}, doi = {10.1109/CYCON.2015.7158463}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BlumbergsBLMOPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BoekeHV15, author = {Sergei Boeke and Caitriona H. Heinl and Matthijs A. Veenendaal}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Civil-military relations and international military cooperation in cyber security: Common challenges {\&} state practices across Asia and Europe}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {69--80}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158469}, doi = {10.1109/CYCON.2015.7158469}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BoekeHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Brose15, author = {Robert Brose}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Cyberwar, Netwar, and the future of Cyberdefense}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {25--38}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158466}, doi = {10.1109/CYCON.2015.7158466}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Brose15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Casenove15, author = {Matteo Casenove}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Exfiltrations using polymorphic blending techniques: Analysis and countermeasures}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {217--230}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158479}, doi = {10.1109/CYCON.2015.7158479}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Casenove15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/CompteEW15, author = {Alexis Le Compte and David A. Elizondo and Tim Watson}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {A renewed approach to serious games for cyber security}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {203--216}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158478}, doi = {10.1109/CYCON.2015.7158478}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/CompteEW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DeWeese15, author = {Geoffrey S. DeWeese}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Anticipatory and preemptive self-defense in cyberspace: The challenge of imminence}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {81--92}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158470}, doi = {10.1109/CYCON.2015.7158470}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DeWeese15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Hill15, author = {Richard Hill}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Dealing with cyber security threats: International cooperation, ITU, and {WCIT}}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {119--134}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158473}, doi = {10.1109/CYCON.2015.7158473}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Hill15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/JaitnerM15, author = {Margarita Jaitner and Peter Mattsson}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Russian Information Warfare of 2014}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {39--52}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158467}, doi = {10.1109/CYCON.2015.7158467}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/JaitnerM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MaurerSMH15, author = {Tim Maurer and Isabel Skierka and Robert Morgus and Mirko Hohmann}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Technological sovereignty: Missing the point?}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {53--68}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158468}, doi = {10.1109/CYCON.2015.7158468}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MaurerSMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Orji15, author = {Uchenna Jerome Orji}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation?}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {105--118}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158472}, doi = {10.1109/CYCON.2015.7158472}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Orji15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Rivera15, author = {Jason Rivera}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Achieving cyberdeterrence and the ability of small states to hold large states at risk}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {7--24}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158465}, doi = {10.1109/CYCON.2015.7158465}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Rivera15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Russell15, author = {Alison L. Russell}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Strategic anti-access/area denial in cyberspace}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {153--168}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158475}, doi = {10.1109/CYCON.2015.7158475}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Russell15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/StollB15, author = {Jennifer Stoll and Rainhard Z. Bengez}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Visual structures for seeing cyber policy strategies}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {135--152}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158474}, doi = {10.1109/CYCON.2015.7158474}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/StollB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Walker15, author = {Paul A. Walker}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Law of the horse to law of the submarine: The future of State behavior in cyberspace}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {93--104}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158471}, doi = {10.1109/CYCON.2015.7158471}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Walker15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/XenakisN15, author = {Christos Xenakis and Christoforos Ntantogian}, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {Attacking the baseband modem of mobile phones to breach the users' privacy and network security}, booktitle = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, pages = {231--244}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CYCON.2015.7158480}, doi = {10.1109/CYCON.2015.7158480}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/XenakisN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2015, editor = {Markus Maybaum and Anna{-}Maria Osula and Lauri Lindstr{\"{o}}m}, title = {7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7153097/proceeding}, isbn = {978-9-9499-5442-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BrangettoMS14, author = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Introduction}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {1--3}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916390}, doi = {10.1109/CYCON.2014.6916390}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BrangettoMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/CasenoveM14, author = {Matteo Casenove and Armando Miraglia}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Botnet over Tor: The illusion of hiding}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {273--282}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916408}, doi = {10.1109/CYCON.2014.6916408}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/CasenoveM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/CobbL14, author = {Stephen Cobb and Andrew Lee}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Malware is called malicious for a reason: The risks of weaponizing code}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {71--84}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916396}, doi = {10.1109/CYCON.2014.6916396}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/CobbL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Dewar14, author = {Robert S. Dewar}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {The "triptych of cyber security": {A} classifi cation of active cyber defence}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {7--21}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916392}, doi = {10.1109/CYCON.2014.6916392}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Dewar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DresslerBMK14, author = {Judson C. Dressler and Calvert L. Bowen III and William Moody and Jason Koepke}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Operational data classes for establishing situational awareness in cyberspace}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {175--186}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916402}, doi = {10.1109/CYCON.2014.6916402}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DresslerBMK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DucheineH14, author = {Paul Ducheine and Jelle van Haaster}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Fighting power, targeting and cyber operations}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {303--327}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916410}, doi = {10.1109/CYCON.2014.6916410}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DucheineH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GilesH14, author = {Keir Giles and Kim Hartmann}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Socio-political effects of Active Cyber Defence measures}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {23--36}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916393}, doi = {10.1109/CYCON.2014.6916393}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GilesH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GollingH014, author = {Mario Golling and Rick Hofstede and Robert Koch}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Towards multi-layered intrusion detection in high-speed networks}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {191--206}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916403}, doi = {10.1109/CYCON.2014.6916403}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GollingH014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HaltasUSPE14, author = {Fatih Haltas and Erkam Uzun and Necati Siseci and Abdulkadir Posul and Bakir Emre}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {An automated bot detection system through honeypots for large-scale}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {255--270}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916407}, doi = {10.1109/CYCON.2014.6916407}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HaltasUSPE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Hathaway14, author = {Oona A. Hathaway}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {The drawbacks and dangers of active defense}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {39--50}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916394}, doi = {10.1109/CYCON.2014.6916394}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Hathaway14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Heinl14, author = {Caitriona H. Heinl}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Artificial (intelligent) agents and active cyber defence: Policy implications}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {53--66}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916395}, doi = {10.1109/CYCON.2014.6916395}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Heinl14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HozCMPMA14, author = {Enrique de la Hoz and Gary Cochrane and Jose Manuel Moreira{-}Lemus and Rafael Paez{-}Reyes and Ivan Mars{\'{a}}{-}Maestre and Bernardo Alarcos}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Detecting and defeating advanced man-in-the-middle attacks against {TLS}}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {209--221}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916404}, doi = {10.1109/CYCON.2014.6916404}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HozCMPMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/JakobsonO14, author = {Gabriel Jakobson and Rain Ottis}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Foreword}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {ii--iv}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916388}, doi = {10.1109/CYCON.2014.6916388}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/JakobsonO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KornmaierJ14, author = {Andreas Kornmaier and Fabrice Jaouen}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Beyond technical data - a more comprehensive situational awareness fed by available intelligence information}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {139--154}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916400}, doi = {10.1109/CYCON.2014.6916400}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KornmaierJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LilesK14, author = {Samuel Liles and Jacob Kambic}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Cyber fratricide}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {329--338}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916411}, doi = {10.1109/CYCON.2014.6916411}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LilesK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MephamLGC14, author = {Kevin Mepham and Panos Louvieris and Gheorghita Ghinea and Natalie Clewley}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Dynamic cyber-incident response}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {121--136}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916399}, doi = {10.1109/CYCON.2014.6916399}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/MephamLGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PodinsTS14, author = {Karlis Podins and Varis Teivans and Iveta Skujina}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Low-cost active cyber defence}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {1--16}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916412}, doi = {10.1109/CYCON.2014.6916412}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PodinsTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RaymondCCN14, author = {David Raymond and Tom Cross and Gregory J. Conti and Michael Nowatkowski}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Key terrain in cyberspace: Seeking the high ground}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {287--300}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916409}, doi = {10.1109/CYCON.2014.6916409}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RaymondCCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RiveraH14, author = {Jason Rivera and Forrest Hare}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasures}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {99--116}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916398}, doi = {10.1109/CYCON.2014.6916398}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RiveraH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/TimonenLRPV14, author = {Jussi Timonen and Lauri Laaperi and Lauri Rummukainen and Samir Puuska and Jouko Vankka}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Situational awareness and information collection from critical infrastructure}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {157--173}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916401}, doi = {10.1109/CYCON.2014.6916401}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/TimonenLRPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/VirvilisVS14, author = {Nikos Virvilis and Bart Vanautgaerden and Oscar Serrano Serrano}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Changing the game: The art of deceiving sophisticated attackers}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {87--97}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916397}, doi = {10.1109/CYCON.2014.6916397}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/VirvilisVS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/WatsonB14, author = {Bruce W. Watson and I. P. Blox}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Elastic deep packet inspection}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {241--253}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916406}, doi = {10.1109/CYCON.2014.6916406}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/WatsonB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/WubbelingEM14, author = {Matthias W{\"{u}}bbeling and Till Elsner and Michael Meier}, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {Inter-AS routing anomalies: Improved detection and classification}, booktitle = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, pages = {223--238}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CYCON.2014.6916405}, doi = {10.1109/CYCON.2014.6916405}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/WubbelingEM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2014, editor = {Pascal Brangetto and Markus Maybaum and Jan Stinissen}, title = {6th International Conference on Cyber Conflict, CyCon 2014, Tallinn, Estonia, June 3-6, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6876058/proceeding}, isbn = {978-9949-9544-0-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002G13, author = {Robert Koch and Mario Golling}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Architecture for evaluating and correlating {NIDS} in real - World networks}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--20}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568386/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Applegate13, author = {Scott D. Applegate}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {The dawn of Kinetic Cyber}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--15}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568376/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Applegate13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ApplegateS13, author = {Scott D. Applegate and Angelos Stavrou}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Towards a Cyber Conflict Taxonomy}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--18}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568391/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ApplegateS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Boothby13, author = {William H. Boothby}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Cyber deception and autonomous attack - Is there a legal problem?}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--17}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568381/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Boothby13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Caton13, author = {Jeffrey L. Caton}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Exploring the prudent limits of automated cyber attack}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--16}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568375/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Caton13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Caton13a, author = {Jeffrey L. Caton}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Complexity and emergence in ultra-tactical cyberspace operations}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--14}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568384/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Caton13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ContiNR13, author = {Gregory J. Conti and John Nelson and David Raymond}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Towards a cyber common operating picture}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--17}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568383/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/ContiNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/CovingtonC13, author = {Michael J. Covington and Rush Carskadden}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Threat implications of the Internet of Things}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--12}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568380/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/CovingtonC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DandurandS13, author = {Luc Dandurand and Oscar Serrano Serrano}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Towards improved cyber security information sharing}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--16}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568369/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DandurandS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GilesH13, author = {Keir Giles and William Hagestad}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Divided by a common language: Cyber definitions in Chinese, Russian and English}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--17}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568390/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GilesH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Guarino13, author = {Alessandro Guarino}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Autonomous intelligent agents in cyber offence}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--12}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568388/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Guarino13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HartmannS13, author = {Kim Hartmann and Christoph Steup}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {The vulnerability of UAVs to cyber attacks - An approach to the risk assessment}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--23}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568373/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HartmannS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Hernandez-Ardieta13, author = {Jorge L. Hernandez{-}Ardieta and Juan E. Tapiador and Guillermo Suarez{-}Tangil}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Information sharing models for cooperative cyber defence}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--28}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568372/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Hernandez-Ardieta13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Hiller13, author = {Janine S. Hiller}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Legal aspects of a cyber immune system}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--15}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568382/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Hiller13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Iasiello13, author = {Emilio Iasiello}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Cyber attack: {A} dull tool to shape foreign policy}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--18}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568392/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Iasiello13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Irwin13, author = {Barry Irwin}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {A baseline study of potentially malicious activity across five network telescopes}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--17}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568378/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Irwin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Jakobson13, author = {Gabriel Jakobson}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Mission-centricity in cyber security: Architecting cyber attack resilient missions}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--18}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568387/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Jakobson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/JakobsonO13, author = {Gabriel Jakobson and Rain Ottis}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Foreword}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--3}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568366/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/JakobsonO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kalm13, author = {Kaarel Kalm}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Illicit network structures in cyberspace}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--13}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568379/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kalm13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KotenkoC13, author = {Igor V. Kotenko and Andrey Chechulin}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {A Cyber Attack Modeling and Impact Assessment framework}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--24}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568374/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KotenkoC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/McCuskerBD13, author = {Owen McCusker and Scott Brunza and Dipankar Dasgupta}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Deriving behavior primitives from aggregate network features using support vector machines}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--18}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568370/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/McCuskerBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PlohmannEG13, author = {Daniel Plohmann and Sebastian Eschweiler and Elmar Gerhards{-}Padilla}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Patterns of a cooperative malware analysis workflow}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--18}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568385/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PlohmannEG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PodinsSM13, author = {Karlis Podins and Jan Stinissen and Markus Maybaum}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Introduction}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--4}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568368/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PodinsSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Prescott13, author = {Jody M. Prescott}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Autonomous decision-making processes and the responsible cyber commander}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--18}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568389/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Prescott13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/RaymondCCF13, author = {David Raymond and Gregory J. Conti and Tom Cross and Robert Fanelli}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {A control measure framework to limit collateral damage and propagation of cyber weapons}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--16}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568377/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/RaymondCCF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/SmirnovKST13, author = {Alexander V. Smirnov and Alexey M. Kashevnik and Nikolay Shilov and Nikolay Teslya}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {Context-based access control model for smart space}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--15}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568371/}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/SmirnovKST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Sullins13, author = {John P. Sullins}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {An ethical analysis of the case for robotic weapons arms control}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--20}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568394/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Sullins13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Vallor13, author = {Shannon Vallor}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {The future of military virtue: Autonomous systems and the moral deskilling of the military}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--15}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568393/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Vallor13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2013, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6560495/proceeding}, isbn = {978-1-4799-0450-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002R12, author = {Robert Koch and Gabi Dreo Rodosek}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {The role of {COTS} products for high security systems}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--14}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243989/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002R12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/0002SG12, author = {Robert Koch and Bj{\"{o}}rn Stelte and Mario Golling}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Attack trends in present computer networks}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243980/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002SG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Applegate12, author = {Scott D. Applegate}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {The principle of maneuver in cyber operations}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--13}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243974/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Applegate12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Arimatsu12, author = {Louise Arimatsu}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {A treaty for governing cyber-weapons: Potential benefits and practical limitations}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--19}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243968/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Arimatsu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Caton12, author = {Jeffrey L. Caton}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Beyond domains, beyond commons: Context and theory of conflict in cyberspace}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--11}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243972/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Caton12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Cavelty12, author = {Myriam Dunn Cavelty}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {The militarisation of cyberspace: Why less may be better}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--13}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243971/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Cavelty12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/FanchiottiP12, author = {Vittorio Fanchiotti and Jean Paul Pierini}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Impact of cyberspace on human rights and democracy}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243965/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/FanchiottiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/FanelliC12, author = {Robert Fanelli and Gregory J. Conti}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--13}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243983/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/FanelliC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Giles12, author = {Keir Giles}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Russia's public stance on cyberspace issues}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--13}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243966/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Giles12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Hare12, author = {Forrest Hare}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {The signifi cance of attribution to cyberspace coercion: {A} political perspective}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--15}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243970/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Hare12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HartmannS12, author = {Kim Hartmann and Christoph Steup}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Natural Privacy Preservation Protocol for electronic mail}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--17}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243986/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HartmannS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Healey12, author = {Jason Healey}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {When "not my problem" isn't enough: Political neutrality and national responsibility in cyber conflict}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--13}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243963/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Healey12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Heinegg12, author = {Wolff Heintschel von Heinegg}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Legal implications of territorial sovereignty in cyberspace}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--13}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243962/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Heinegg12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Heinegg12a, author = {Wolff Heintschel von Heinegg}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Neutrality in cyberspace}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243964/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Heinegg12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KalutarageSZJ12, author = {Harsha K. Kalutarage and Siraj A. Shaikh and Qin Zhou and Anne E. James}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Sensing for suspicion at scale: {A} Bayesian approach for cyber conflict attribution and reasoning}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--19}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243988/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KalutarageSZJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KerenE12, author = {Assaf Y. Keren and Keren Elazari}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Internet as a {CII} - {A} framework to measure awareness in the cyber sphere}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--13}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243969/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KerenE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LilesDRL12, author = {Samuel Liles and J. Eric Dietz and Marcus K. Rogers and Dean Larson}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Applying traditional military principles to cyber warfare}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243973/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LilesDRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LorenzK12, author = {Birgy Lorenz and Kaido Kikkas}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Socially engineered commoners as cyber warriors - Estonian future or present?}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243977/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LorenzK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Onishi12, author = {Hiro Onishi}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Paradigm change of vehicle cyber security}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--11}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243987/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Onishi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PlohmannG12, author = {Daniel Plohmann and Elmar Gerhards{-}Padilla}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Case study of the Miner Botnet}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--16}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243985/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PlohmannG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Prescott12, author = {Jody M. Prescott}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Direct participation in cyber hostilities: terms of reference for like-minded states?}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--16}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243979/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Prescott12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Schmitt12, author = {Michael N. Schmitt}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {"Attack" as a term of art in international law: The cyber operations context}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--11}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243981/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Schmitt12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Taddeo12, author = {Mariarosaria Taddeo}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {An analysis for a just cyber warfare}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243976/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Taddeo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Tromparent12, author = {Patrice Tromparent}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {French cyberdefence policy}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--12}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243967/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Tromparent12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Tyugu12, author = {Enn Tyugu}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Command and control of cyber weapons}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--11}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243984/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Tyugu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/VazquezASBR12, author = {Diego Fernandez Vazquez and Oscar Pastor Acosta and Christopher Spirito and Sarah Brown and Emily Reid}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {Conceptual framework for cyber defense information sharing within trust relationships}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--17}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243990/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/VazquezASBR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Watts12, author = {Sean Watts}, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {The notion of combatancy in cyber warfare}, booktitle = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, pages = {1--15}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6243978/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Watts12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2012, editor = {Christian Czosseck and Rain Ottis and Katharina Ziolkowski}, title = {4th International Conference on Cyber Conflict, CyCon 2012, Tallinn, Estonia, June 5-8, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6233114/proceeding}, isbn = {978-1-4673-1270-7}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/000211, author = {Robert Koch}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Towards next-generation Intrusion Detection}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--18}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954707/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/000211.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Alperovitch11, author = {Dmitri Alperovitch}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Towards establishment of cyberspace deterrence strategy}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954702/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Alperovitch11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BahsiL11, author = {Hayretdin Bahsi and Albert Levi}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Preserving organizational privacy in intrusion detection log sharing}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--14}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954705/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BahsiL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BilarS11, author = {Daniel Bilar and Brendan Saltaformaggio}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Using a novel behavioral stimuli-response framework to Defend against Adversarial Cyberspace Participants}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--16}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954708/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BilarS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/BrennerC11, author = {Susan W. Brenner and Leo L. Clarke}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Conscription and cyber conflict: Legal issues}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--12}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954696/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/BrennerC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/CzosseckKL11, author = {Christian Czosseck and Gabriel Klein and Felix Leder}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {On the arms race around botnets - Setting up and taking down botnets}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--14}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954704/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/CzosseckKL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Dandurand11, author = {Luc Dandurand}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Rationale and blueprint for a cyber Red Team Within {NATO:} An essential component of the alliance's cyber forces}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--16}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954701/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Dandurand11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/DogrulAC11, author = {Murat Dogrul and Adil Aslan and Eyyup Celik}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Developing an international cooperation on cyber defense and deterrence against Cyber terrorism}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--15}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954698/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/DogrulAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Ekstedt11, author = {Victoria Ekstedt}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Is the Swedish Territorial Defence Ordinance applicable on the fourth arena?}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--9}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954700/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Ekstedt11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Giles11, author = {Keir Giles}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {"Information Troops" - {A} Russian Cyber Command?}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--16}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954699/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Giles11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GollingS11, author = {Mario Golling and Bj{\"{o}}rn Stelte}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Requirements for a future {EWS} - Cyber Defence in the internet of the future}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--16}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954706/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GollingS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MulazzaniS11, author = {Fabio Mulazzani and Salvatore Alessandro Sarci{\`{a}}}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Cyber security on military deployed networks}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--15}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954697/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MulazzaniS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Tyugu11, author = {Enn Tyugu}, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {Artificial intelligence in cyber defense}, booktitle = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, pages = {1--11}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5954703/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Tyugu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2011, editor = {Christian Czosseck and Enn Tyugu and Thomas C. Wingfield}, title = {3rd International Conference on Cyber Conflict, CyCon 2011, Tallinn, Estonia, June 7-10, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/5945935/proceeding}, isbn = {978-1-61284-245-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.