default search action
Search dblp for Publications
export results for "toc:db/conf/cycon/cycon2018.bht:"
@inproceedings{DBLP:conf/cycon/0002G18, author = {Robert Koch and Mario Golling}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {The cyber decade: Cyber defence at a X-ing point}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {159--186}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405016}, doi = {10.23919/CYCON.2018.8405016}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cycon/0002G18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/ApruzzeseCFGM18, author = {Giovanni Apruzzese and Michele Colajanni and Luca Ferretti and Alessandro Guido and Mirco Marchetti}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {On the effectiveness of machine and deep learning for cyber security}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {371--390}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405026}, doi = {10.23919/CYCON.2018.8405026}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/ApruzzeseCFGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Bigelow18, author = {Brad Bigelow}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {The topography of cyberspace and its consequences for operations}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {123--138}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405014}, doi = {10.23919/CYCON.2018.8405014}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Bigelow18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Brantly18, author = {Aaron F. Brantly}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {The cyber deterrence problem}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {31--54}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405009}, doi = {10.23919/CYCON.2018.8405009}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Brantly18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GrafK18, author = {Roman Graf and Ross King}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Neural network and blockchain based technique for cyber threat intelligence and situational awareness}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {409--426}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405028}, doi = {10.23919/CYCON.2018.8405028}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/GrafK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/GugelmannSLHV18, author = {David Gugelmann and David M. Sommer and Vincent Lenders and Markus Happe and Laurent Vanbever}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Screen watermarking for data theft investigation and attribution}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {391--408}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405027}, doi = {10.23919/CYCON.2018.8405027}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cycon/GugelmannSLHV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/HartmannG18, author = {Kim Hartmann and Keir Giles}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Net neutrality in the context of cyber warfare}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {139--158}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405015}, doi = {10.23919/CYCON.2018.8405015}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/HartmannG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Hodgson18, author = {Quentin E. Hodgson}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Understanding and countering cyber coercion}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {73--88}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405011}, doi = {10.23919/CYCON.2018.8405011}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Hodgson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Huszti-Orban18, author = {Krisztina Huszti{-}Orban}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement\({}^{\mbox{1}}\)}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {227--244}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405019}, doi = {10.23919/CYCON.2018.8405019}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Huszti-Orban18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Kosseff18, author = {Jeff Kosseff}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Developing collaborative and cohesive cybersecurity legal principles}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {283--298}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405022}, doi = {10.23919/CYCON.2018.8405022}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Kosseff18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/LavrenovsM18, author = {Arturs Lavrenovs and F. Jesus Rubio Melon}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {{HTTP} security headers analysis of top one million websites}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {345--370}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405025}, doi = {10.23919/CYCON.2018.8405025}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/LavrenovsM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Libicki18, author = {Martin C. Libicki}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Drawing inferences from cyber espionage}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {109--122}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405013}, doi = {10.23919/CYCON.2018.8405013}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Libicki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Lubin18, author = {Asaf Lubin}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Cyber law and espionage law as communicating vessels}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {203--226}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405018}, doi = {10.23919/CYCON.2018.8405018}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Lubin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MeierSGLV18, author = {Roland Meier and Cornelia Scherrer and David Gugelmann and Vincent Lenders and Laurent Vanbever}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {FeedRank: {A} tamper- resistant method for the ranking of cyber threat intelligence feeds}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {321--344}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405024}, doi = {10.23919/CYCON.2018.8405024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MeierSGLV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Moore18, author = {Daniel Moore}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Targeting technology: Mapping military offensive network operations}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {89--108}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405012}, doi = {10.23919/CYCON.2018.8405012}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Moore18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/NoelRPLLM18, author = {Steven Noel and Paul D. Rowe and Stephen Purdy and Michael Limiero and Travis Lu and Will Mathews}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Mission-focused cyber situational understanding via graph analytics}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {427--448}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405029}, doi = {10.23919/CYCON.2018.8405029}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/NoelRPLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/PodinsG18, author = {Karlis Podins and Kenneth Geers}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Aladdin's lamp: The theft and re-weaponization of malicious code}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {187--202}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405017}, doi = {10.23919/CYCON.2018.8405017}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/PodinsG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Sabbah18, author = {Cedric Sabbah}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Pressing pause: {A} new approach for international cybersecurity norm development}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {263--282}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405021}, doi = {10.23919/CYCON.2018.8405021}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Sabbah18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/SmeetsL18, author = {Max Smeets and Herbert S. Lin}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Offensive cyber capabilities: To what ends?}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {55--72}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405010}, doi = {10.23919/CYCON.2018.8405010}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/SmeetsL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Stockburger18, author = {Peter Z. Stockburger}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {From grey zone to customary international law: How adopting the precautionary principle may help crystallize the due diligence principle in cyberspace}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {245--262}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405020}, doi = {10.23919/CYCON.2018.8405020}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Stockburger18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/Strohmeier0M0LM18, author = {Martin Strohmeier and Matthew Smith and Daniel Moser and Matthias Sch{\"{a}}fer and Vincent Lenders and Ivan Martinovic}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Utilizing air traffic communications for {OSINT} on state and government aircraft}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {299--320}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405023}, doi = {10.23919/CYCON.2018.8405023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/Strohmeier0M0LM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/WhyteVJM18, author = {Christopher Whyte and Brandon Valeriano and Benjamin Jensen and Ryan Maness}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {Rethinking the data wheel: Automating open-access, public data on cyber conflict}, booktitle = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, pages = {9--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/CYCON.2018.8405008}, doi = {10.23919/CYCON.2018.8405008}, timestamp = {Mon, 16 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/WhyteVJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cycon/2018, editor = {Tom{\'{a}}s Min{\'{a}}rik and Raik Jakschis and Lauri Lindstr{\"{o}}m}, title = {10th International Conference on Cyber Conflict, CyCon 2018, Tallinn, Estonia, May 29 - June 1, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8399711/proceeding}, isbn = {978-9-9499-9042-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.