default search action
Search dblp for Publications
export results for "stream:conf/cyconus:"
@inproceedings{DBLP:conf/cyconus/Brooks18, author = {Colin Brooks}, title = {Critical Infrastructure Protection at the Local Level}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--11}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session1-Paper3.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Brooks18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/DavisL18, author = {John A. Davis and Charlie Lewis}, title = {Beyond the United Nations Group of Governmental Experts: Norms of Responsible Nation State Behavior in Cyberspace}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--6}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session3-Paper3.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/DavisL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/FischerkellerH18, author = {Michael P. Fischerkeller and Richard J. Harknett}, title = {Persistent Engagement, Agreed Competition, Cyberspace Interaction Dynamics and Escalation}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--13}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session5-Paper3.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/FischerkellerH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Flynn18, author = {Matthew J. Flynn}, title = {Strategic Cyber: Responding to Russian Online Information Warfare}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--22}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session4-Paper2.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Flynn18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/HealeyK18, author = {Jason Healey and Erik B. Korn}, title = {Defense Support to the Private Sector: New Concepts for DoD's National Cyber Defense Mission}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--8}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session5-Paper1.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/HealeyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/KlemasLC18, author = {Thomas Klemas and Rebecca K. Lively and Nazli Choucri}, title = {Cyber Acquisition}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--9}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session2-Paper3.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/KlemasLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/KollarsP18, author = {Nina A. Kollars and Michael B. Petersen}, title = {Feed the Bears, Starve the Trolls}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--8}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session3-Paper2.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/KollarsP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Perlman18, author = {David M. Perlman}, title = {Applies computational social choice theory as a framework for new cyber-threats}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--9}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session2-Paper1.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Perlman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/RighiN18, author = {Marcelo Antonio Righi and Raul Ceretta Nunes}, title = {Combining Recurrence Quantification Analysis and Adaptive Clustering to Detect DDoS Attacks}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--7}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session1-Paper1.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/RighiN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/RotondoS18, author = {Annachiara Rotondo and Pierluigi Salvati}, title = {Fake news, (dis)information and principle of non-intervention}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--9}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session4-Paper3.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/RotondoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/SampleJD18, author = {Char Sample and Connie Justice and Emily Darraj}, title = {A Model for Evaluating Fake News}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--11}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session4-Paper1.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/SampleJD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/SarkarASS18, author = {Soumajyoti Sarkar and Mohammad Almukaynizi and Jana Shakarian and Paulo Shakarian}, title = {Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--7}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session2-Paper2.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/SarkarASS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/StandleyE18, author = {Vaughn H. Standley and Roxanne Everetts}, title = {The Calculus of Protecting Interstate Competition from Cyber Attack}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--7}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session1-Paper2.pdf}, timestamp = {Wed, 11 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cyconus/StandleyE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Vecino18, author = {Jobel Kyle P. Vecino}, title = {United By Necessity: Conditions for Institutional Cooperation against Cybercrime}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--11}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session3-Paper1.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Vecino18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Warner18, author = {Michael Warner}, title = {Borders in Cyberspace: Stratigive Information Conflict since 9/11}, booktitle = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, pages = {1--19}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/Portals/6/Documents/CyConUS18\%20Conference\%20Papers/Session5-Paper2.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Warner18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cyconus/2018, title = {2018 International Conference on Cyber Conflict, CyCon {U.S.} 2018, Washington, DC, USA, November 14-15, 2018}, publisher = {{U.S.} Army}, year = {2018}, url = {https://cyberdefensereview.army.mil/CDR-Content/CyCon-US-2018-Conference-Papers/}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cyconus/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Alatalu17, author = {Siim Alatalu}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {One year after Warsaw: The growing need for a {NATO} cyber command}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {59--66}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167513}, doi = {10.1109/CYCONUS.2017.8167513}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Alatalu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/AlmukayniziNDSS17, author = {Mohammed Almukaynizi and Eric Nunes and Krishna Dharaiya and Manoj Senguttuvan and Jana Shakarian and Paulo Shakarian}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Proactive identification of exploits in the wild through vulnerability mentions online}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {82--88}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167501}, doi = {10.1109/CYCONUS.2017.8167501}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/AlmukayniziNDSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Chen17, author = {Jim Q. Chen}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Take the rein of cyber deterrence}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {29--35}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167510}, doi = {10.1109/CYCONUS.2017.8167510}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Chen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/GuionR17, author = {Jeffrey Guion and Mark Reith}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Cyber terrain mission mapping: Tools and methodologies}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {105--111}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167504}, doi = {10.1109/CYCONUS.2017.8167504}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/GuionR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/HartK17, author = {Stephen W. Hart and Mark C. Klink}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {1st Troll Battalion: Influencing military and strategic operations through cyber-personas}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {97--104}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167503}, doi = {10.1109/CYCONUS.2017.8167503}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/HartK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Healey17, author = {Jason Healey}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {What might be predominant form of cyber conflict?}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {36--44}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167511}, doi = {10.1109/CYCONUS.2017.8167511}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Healey17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/KaniaC17, author = {Elsa B. Kania and John K. Costello}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {89--96}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167502}, doi = {10.1109/CYCONUS.2017.8167502}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/KaniaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/LemayK17, author = {Antoine Lemay and Scott Knight}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {A timing-based covert channel for {SCADA} networks}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {8--15}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167507}, doi = {10.1109/CYCONUS.2017.8167507}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/LemayK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/LivelyC17, author = {Rebecca K. Lively and Maj Sara Dayton Curran}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {23--28}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167509}, doi = {10.1109/CYCONUS.2017.8167509}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/LivelyC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Rivera17, author = {Joey Rivera}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Cyber security via formal methods: {A} framework for implementing formal methods}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {76--81}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167500}, doi = {10.1109/CYCONUS.2017.8167500}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Rivera17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Ruiz17, author = {Monica M. Ruiz}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Establishing volunteer {US} cyber defense units: {A} holistic approach}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {45--58}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167512}, doi = {10.1109/CYCONUS.2017.8167512}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Ruiz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Stevens17, author = {Rock Stevens}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Identifying self-inflicted vulnerabilities: The operational implications of technology within {U.S.} combat systems}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {112--118}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167505}, doi = {10.1109/CYCONUS.2017.8167505}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Stevens17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Stockburger17, author = {Peter Z. Stockburger}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {The control {\&} capabilities test: How a new legal regime is shaping attribution in cyberspace}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {67--75}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167514}, doi = {10.1109/CYCONUS.2017.8167514}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Stockburger17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/TrimbleMS17, author = {Daniel Trimble and Jonathon Monken and Alexander F. L. Sand}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {A framework for cybersecurity assessments of critical port infrastructure}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167506}, doi = {10.1109/CYCONUS.2017.8167506}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/TrimbleMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/WillisMMG17, author = {John M. Willis and Robert F. Mills and Logan O. Mailloux and Scott R. Graham}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Considerations for secure and resilient satellite architectures}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {16--22}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167508}, doi = {10.1109/CYCONUS.2017.8167508}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/WillisMMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cyconus/2017, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8119418/proceeding}, isbn = {978-1-5386-2379-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cyconus/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Alatalu16, author = {Siim Alatalu}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {NATO's new cyber domain challenge}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836609}, doi = {10.1109/CYCONUS.2016.7836609}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Alatalu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Armistead16, author = {Edwin L. Armistead}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Suggestions to measure cyber power and proposed metrics for cyber warfare operations (cyberdeterrence/cyber power)}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {9--15}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836610}, doi = {10.1109/CYCONUS.2016.7836610}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Armistead16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Assante16, author = {Michael J. Assante}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Implications of cyber in anti-access and area-denial counters}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {16--21}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836611}, doi = {10.1109/CYCONUS.2016.7836611}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Assante16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Cal16, author = {Nerea M. Cal}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Crossing the rubicon: identifying and responding to an armed cyber-attack}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {22--28}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836612}, doi = {10.1109/CYCONUS.2016.7836612}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Cal16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/CarvalhoC16, author = {Jeronymo M. A. Carvalho and Paulo C. G. Costa}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {{CMIDS:} collaborative {MANET} intrusion detection system}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {29--33}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836613}, doi = {10.1109/CYCONUS.2016.7836613}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/CarvalhoC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/CattaruzzaDTL16, author = {Ama{\"{e}}l Cattaruzza and Didier Danet and St{\'{e}}phane Taillat and Arthur Laudrain}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Sovereignty in cyberspace: Balkanization or democratization}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {146--154}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836628}, doi = {10.1109/CYCONUS.2016.7836628}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/CattaruzzaDTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/CaulkinsBBL16, author = {Bruce D. Caulkins and Karla A. Badillo{-}Urquiola and Patricia Bockelman and Rebecca A. Leis}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Cyber workforce development using a behavioral cybersecurity paradigm}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {34--39}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836614}, doi = {10.1109/CYCONUS.2016.7836614}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/CaulkinsBBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/DykstraO16, author = {Josiah A. B. S. Dykstra and Stephen R. Orr}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {44--49}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836616}, doi = {10.1109/CYCONUS.2016.7836616}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/DykstraO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Gregorio16, author = {Alfonso De Gregorio}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sector}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {40--43}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836615}, doi = {10.1109/CYCONUS.2016.7836615}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Gregorio16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Greiman16, author = {V. A. Greiman}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Cyber attacks: the fog of identity}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {50--62}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836617}, doi = {10.1109/CYCONUS.2016.7836617}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Greiman16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Kania16, author = {Elsa B. Kania}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Cyber deterrence in times of cyber anarchy - evaluating the divergences in {U.S.} and Chinese strategic thinking}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {69--85}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836619}, doi = {10.1109/CYCONUS.2016.7836619}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Kania16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/KantolaJ16, author = {H. Kantola and Margarita Levin Jaitner}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Cyber defence information sharing in a federated network}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {86--93}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836620}, doi = {10.1109/CYCONUS.2016.7836620}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/KantolaJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/MaathuisPB16, author = {Clara Maathuis and Wolter Pieters and Jan van den Berg}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Cyber weapons: a profiling framework}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {94--101}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836621}, doi = {10.1109/CYCONUS.2016.7836621}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/MaathuisPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/MatthewsBB16, author = {Suzanne J. Matthews and Raymond W. Blaine and Aaron F. Brantly}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Evaluating single board computer clusters for cyber operations}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {102--109}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836622}, doi = {10.1109/CYCONUS.2016.7836622}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/MatthewsBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/MazanecS16, author = {Brian M. Mazanec and Patricia Shamai}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Stigmatizing cyber war: mission impossible?}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {110--117}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836623}, doi = {10.1109/CYCONUS.2016.7836623}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cyconus/MazanecS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/MirelesCX16, author = {Jose David Mireles and Jin{-}Hee Cho and Shouhuai Xu}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Extracting attack narratives from traffic datasets}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {118--123}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836624}, doi = {10.1109/CYCONUS.2016.7836624}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/MirelesCX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Rotondo16, author = {Annachiara Rotondo}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Countering cyber threats: answers from international law}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {124--130}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836625}, doi = {10.1109/CYCONUS.2016.7836625}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Rotondo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/SampleCWM16, author = {Char Sample and Jennifer Cowley and Tim Watson and Carsten Maple}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Re-thinking threat intelligence}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {131--139}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836626}, doi = {10.1109/CYCONUS.2016.7836626}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/SampleCWM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Spirito16, author = {Christopher M. Spirito}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Cyber norms for civilian nuclear power plants}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {140--145}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836627}, doi = {10.1109/CYCONUS.2016.7836627}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Spirito16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/WongS16, author = {Ernest Y. Wong and Nicholas M. Sambaluk}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Disruptive innovations to help protect against future threats}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {155--159}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836629}, doi = {10.1109/CYCONUS.2016.7836629}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/WongS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/YannakogeorgosT16, author = {Panayotis A. Yannakogeorgos and Eneken Tikk}, editor = {Aaron F. Brantly and Paul Maxwell}, title = {Stuxnet as cyber-enabled sanctions enforcement}, booktitle = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, pages = {160--165}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CYCONUS.2016.7836630}, doi = {10.1109/CYCONUS.2016.7836630}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/YannakogeorgosT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cyconus/2016, editor = {Aaron F. Brantly and Paul Maxwell}, title = {2016 International Conference on Cyber Conflict, CyCon {U.S.} 2016, Washington, DC, USA, October 21-23, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7836073/proceeding}, isbn = {978-1-5090-5258-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cyconus/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.