Search dblp for Publications

export results for "stream:conf/cyconus:"

 download as .bib file

@inproceedings{DBLP:conf/cyconus/Brooks18,
  author       = {Colin Brooks},
  title        = {Critical Infrastructure Protection at the Local Level},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--11},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session1-Paper3.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Brooks18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/DavisL18,
  author       = {John A. Davis and
                  Charlie Lewis},
  title        = {Beyond the United Nations Group of Governmental Experts: Norms of
                  Responsible Nation State Behavior in Cyberspace},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--6},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session3-Paper3.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/DavisL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/FischerkellerH18,
  author       = {Michael P. Fischerkeller and
                  Richard J. Harknett},
  title        = {Persistent Engagement, Agreed Competition, Cyberspace Interaction
                  Dynamics and Escalation},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--13},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session5-Paper3.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/FischerkellerH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Flynn18,
  author       = {Matthew J. Flynn},
  title        = {Strategic Cyber: Responding to Russian Online Information Warfare},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--22},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session4-Paper2.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Flynn18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/HealeyK18,
  author       = {Jason Healey and
                  Erik B. Korn},
  title        = {Defense Support to the Private Sector: New Concepts for DoD's National
                  Cyber Defense Mission},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--8},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session5-Paper1.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/HealeyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/KlemasLC18,
  author       = {Thomas Klemas and
                  Rebecca K. Lively and
                  Nazli Choucri},
  title        = {Cyber Acquisition},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--9},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session2-Paper3.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/KlemasLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/KollarsP18,
  author       = {Nina A. Kollars and
                  Michael B. Petersen},
  title        = {Feed the Bears, Starve the Trolls},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--8},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session3-Paper2.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/KollarsP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Perlman18,
  author       = {David M. Perlman},
  title        = {Applies computational social choice theory as a framework for new
                  cyber-threats},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--9},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session2-Paper1.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Perlman18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/RighiN18,
  author       = {Marcelo Antonio Righi and
                  Raul Ceretta Nunes},
  title        = {Combining Recurrence Quantification Analysis and Adaptive Clustering
                  to Detect DDoS Attacks},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--7},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session1-Paper1.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/RighiN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/RotondoS18,
  author       = {Annachiara Rotondo and
                  Pierluigi Salvati},
  title        = {Fake news, (dis)information and principle of non-intervention},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--9},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session4-Paper3.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/RotondoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/SampleJD18,
  author       = {Char Sample and
                  Connie Justice and
                  Emily Darraj},
  title        = {A Model for Evaluating Fake News},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--11},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session4-Paper1.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/SampleJD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/SarkarASS18,
  author       = {Soumajyoti Sarkar and
                  Mohammad Almukaynizi and
                  Jana Shakarian and
                  Paulo Shakarian},
  title        = {Predicting enterprise cyber incidents using social network analysis
                  on the darkweb hacker forums},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--7},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session2-Paper2.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/SarkarASS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/StandleyE18,
  author       = {Vaughn H. Standley and
                  Roxanne Everetts},
  title        = {The Calculus of Protecting Interstate Competition from Cyber Attack},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--7},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session1-Paper2.pdf},
  timestamp    = {Wed, 11 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cyconus/StandleyE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Vecino18,
  author       = {Jobel Kyle P. Vecino},
  title        = {United By Necessity: Conditions for Institutional Cooperation against
                  Cybercrime},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--11},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session3-Paper1.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Vecino18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Warner18,
  author       = {Michael Warner},
  title        = {Borders in Cyberspace: Stratigive Information Conflict since 9/11},
  booktitle    = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  pages        = {1--19},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session5-Paper2.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Warner18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cyconus/2018,
  title        = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018,
                  Washington, DC, USA, November 14-15, 2018},
  publisher    = {{U.S.} Army},
  year         = {2018},
  url          = {https://cyberdefensereview.army.mil/CDR-Content/CyCon-US-2018-Conference-Papers/},
  timestamp    = {Wed, 10 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cyconus/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Alatalu17,
  author       = {Siim Alatalu},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {One year after Warsaw: The growing need for a {NATO} cyber command},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {59--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167513},
  doi          = {10.1109/CYCONUS.2017.8167513},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Alatalu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/AlmukayniziNDSS17,
  author       = {Mohammed Almukaynizi and
                  Eric Nunes and
                  Krishna Dharaiya and
                  Manoj Senguttuvan and
                  Jana Shakarian and
                  Paulo Shakarian},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Proactive identification of exploits in the wild through vulnerability
                  mentions online},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {82--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167501},
  doi          = {10.1109/CYCONUS.2017.8167501},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/AlmukayniziNDSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Chen17,
  author       = {Jim Q. Chen},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Take the rein of cyber deterrence},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {29--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167510},
  doi          = {10.1109/CYCONUS.2017.8167510},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Chen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/GuionR17,
  author       = {Jeffrey Guion and
                  Mark Reith},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Cyber terrain mission mapping: Tools and methodologies},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {105--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167504},
  doi          = {10.1109/CYCONUS.2017.8167504},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/GuionR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/HartK17,
  author       = {Stephen W. Hart and
                  Mark C. Klink},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {1st Troll Battalion: Influencing military and strategic operations
                  through cyber-personas},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {97--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167503},
  doi          = {10.1109/CYCONUS.2017.8167503},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/HartK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Healey17,
  author       = {Jason Healey},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {What might be predominant form of cyber conflict?},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {36--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167511},
  doi          = {10.1109/CYCONUS.2017.8167511},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Healey17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/KaniaC17,
  author       = {Elsa B. Kania and
                  John K. Costello},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Quantum technologies, U.S.-China strategic competition, and future
                  dynamics of cyber stability},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {89--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167502},
  doi          = {10.1109/CYCONUS.2017.8167502},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/KaniaC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/LemayK17,
  author       = {Antoine Lemay and
                  Scott Knight},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {A timing-based covert channel for {SCADA} networks},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {8--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167507},
  doi          = {10.1109/CYCONUS.2017.8167507},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/LemayK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/LivelyC17,
  author       = {Rebecca K. Lively and
                  Maj Sara Dayton Curran},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Solving the fiscal challenge of real-time cyber capability development:
                  How low-cost cyber capability development can be accelerated through
                  the use of Operations and Maintenance funds and what congress can
                  do to help},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {23--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167509},
  doi          = {10.1109/CYCONUS.2017.8167509},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/LivelyC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Rivera17,
  author       = {Joey Rivera},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Cyber security via formal methods: {A} framework for implementing
                  formal methods},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {76--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167500},
  doi          = {10.1109/CYCONUS.2017.8167500},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Rivera17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Ruiz17,
  author       = {Monica M. Ruiz},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Establishing volunteer {US} cyber defense units: {A} holistic approach},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {45--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167512},
  doi          = {10.1109/CYCONUS.2017.8167512},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Ruiz17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Stevens17,
  author       = {Rock Stevens},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Identifying self-inflicted vulnerabilities: The operational implications
                  of technology within {U.S.} combat systems},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {112--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167505},
  doi          = {10.1109/CYCONUS.2017.8167505},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Stevens17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Stockburger17,
  author       = {Peter Z. Stockburger},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {The control {\&} capabilities test: How a new legal regime is
                  shaping attribution in cyberspace},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {67--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167514},
  doi          = {10.1109/CYCONUS.2017.8167514},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Stockburger17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/TrimbleMS17,
  author       = {Daniel Trimble and
                  Jonathon Monken and
                  Alexander F. L. Sand},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {A framework for cybersecurity assessments of critical port infrastructure},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167506},
  doi          = {10.1109/CYCONUS.2017.8167506},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/TrimbleMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/WillisMMG17,
  author       = {John M. Willis and
                  Robert F. Mills and
                  Logan O. Mailloux and
                  Scott R. Graham},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Considerations for secure and resilient satellite architectures},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {16--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167508},
  doi          = {10.1109/CYCONUS.2017.8167508},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/WillisMMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cyconus/2017,
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8119418/proceeding},
  isbn         = {978-1-5386-2379-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cyconus/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Alatalu16,
  author       = {Siim Alatalu},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {NATO's new cyber domain challenge},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836609},
  doi          = {10.1109/CYCONUS.2016.7836609},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Alatalu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Armistead16,
  author       = {Edwin L. Armistead},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Suggestions to measure cyber power and proposed metrics for cyber
                  warfare operations (cyberdeterrence/cyber power)},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {9--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836610},
  doi          = {10.1109/CYCONUS.2016.7836610},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Armistead16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Assante16,
  author       = {Michael J. Assante},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Implications of cyber in anti-access and area-denial counters},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {16--21},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836611},
  doi          = {10.1109/CYCONUS.2016.7836611},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Assante16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Cal16,
  author       = {Nerea M. Cal},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Crossing the rubicon: identifying and responding to an armed cyber-attack},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {22--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836612},
  doi          = {10.1109/CYCONUS.2016.7836612},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Cal16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/CarvalhoC16,
  author       = {Jeronymo M. A. Carvalho and
                  Paulo C. G. Costa},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {{CMIDS:} collaborative {MANET} intrusion detection system},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {29--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836613},
  doi          = {10.1109/CYCONUS.2016.7836613},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/CarvalhoC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/CattaruzzaDTL16,
  author       = {Ama{\"{e}}l Cattaruzza and
                  Didier Danet and
                  St{\'{e}}phane Taillat and
                  Arthur Laudrain},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Sovereignty in cyberspace: Balkanization or democratization},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {146--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836628},
  doi          = {10.1109/CYCONUS.2016.7836628},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/CattaruzzaDTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/CaulkinsBBL16,
  author       = {Bruce D. Caulkins and
                  Karla A. Badillo{-}Urquiola and
                  Patricia Bockelman and
                  Rebecca A. Leis},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Cyber workforce development using a behavioral cybersecurity paradigm},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {34--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836614},
  doi          = {10.1109/CYCONUS.2016.7836614},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/CaulkinsBBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/DykstraO16,
  author       = {Josiah A. B. S. Dykstra and
                  Stephen R. Orr},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Acting in the unknown: the cynefin framework for managing cybersecurity
                  risk in dynamic decision making},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {44--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836616},
  doi          = {10.1109/CYCONUS.2016.7836616},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/DykstraO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Gregorio16,
  author       = {Alfonso De Gregorio},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Vulnerabilities and their surrounding ethical questions: a code of
                  ethics for the private sector},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {40--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836615},
  doi          = {10.1109/CYCONUS.2016.7836615},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Gregorio16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Greiman16,
  author       = {V. A. Greiman},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Cyber attacks: the fog of identity},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {50--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836617},
  doi          = {10.1109/CYCONUS.2016.7836617},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Greiman16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Kania16,
  author       = {Elsa B. Kania},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Cyber deterrence in times of cyber anarchy - evaluating the divergences
                  in {U.S.} and Chinese strategic thinking},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {69--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836619},
  doi          = {10.1109/CYCONUS.2016.7836619},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Kania16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/KantolaJ16,
  author       = {H. Kantola and
                  Margarita Levin Jaitner},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Cyber defence information sharing in a federated network},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {86--93},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836620},
  doi          = {10.1109/CYCONUS.2016.7836620},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/KantolaJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/MaathuisPB16,
  author       = {Clara Maathuis and
                  Wolter Pieters and
                  Jan van den Berg},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Cyber weapons: a profiling framework},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {94--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836621},
  doi          = {10.1109/CYCONUS.2016.7836621},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/MaathuisPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/MatthewsBB16,
  author       = {Suzanne J. Matthews and
                  Raymond W. Blaine and
                  Aaron F. Brantly},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Evaluating single board computer clusters for cyber operations},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {102--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836622},
  doi          = {10.1109/CYCONUS.2016.7836622},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/MatthewsBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/MazanecS16,
  author       = {Brian M. Mazanec and
                  Patricia Shamai},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Stigmatizing cyber war: mission impossible?},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {110--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836623},
  doi          = {10.1109/CYCONUS.2016.7836623},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cyconus/MazanecS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/MirelesCX16,
  author       = {Jose David Mireles and
                  Jin{-}Hee Cho and
                  Shouhuai Xu},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Extracting attack narratives from traffic datasets},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {118--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836624},
  doi          = {10.1109/CYCONUS.2016.7836624},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/MirelesCX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Rotondo16,
  author       = {Annachiara Rotondo},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Countering cyber threats: answers from international law},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {124--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836625},
  doi          = {10.1109/CYCONUS.2016.7836625},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Rotondo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/SampleCWM16,
  author       = {Char Sample and
                  Jennifer Cowley and
                  Tim Watson and
                  Carsten Maple},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Re-thinking threat intelligence},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {131--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836626},
  doi          = {10.1109/CYCONUS.2016.7836626},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/SampleCWM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Spirito16,
  author       = {Christopher M. Spirito},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Cyber norms for civilian nuclear power plants},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {140--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836627},
  doi          = {10.1109/CYCONUS.2016.7836627},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Spirito16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/WongS16,
  author       = {Ernest Y. Wong and
                  Nicholas M. Sambaluk},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Disruptive innovations to help protect against future threats},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {155--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836629},
  doi          = {10.1109/CYCONUS.2016.7836629},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/WongS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/YannakogeorgosT16,
  author       = {Panayotis A. Yannakogeorgos and
                  Eneken Tikk},
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {Stuxnet as cyber-enabled sanctions enforcement},
  booktitle    = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  pages        = {160--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CYCONUS.2016.7836630},
  doi          = {10.1109/CYCONUS.2016.7836630},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/YannakogeorgosT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cyconus/2016,
  editor       = {Aaron F. Brantly and
                  Paul Maxwell},
  title        = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016,
                  Washington, DC, USA, October 21-23, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7836073/proceeding},
  isbn         = {978-1-5090-5258-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cyconus/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}