Search dblp for Publications

export results for "toc:db/conf/cyconus/cyconus2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cyconus/Alatalu17,
  author       = {Siim Alatalu},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {One year after Warsaw: The growing need for a {NATO} cyber command},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {59--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167513},
  doi          = {10.1109/CYCONUS.2017.8167513},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Alatalu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/AlmukayniziNDSS17,
  author       = {Mohammed Almukaynizi and
                  Eric Nunes and
                  Krishna Dharaiya and
                  Manoj Senguttuvan and
                  Jana Shakarian and
                  Paulo Shakarian},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Proactive identification of exploits in the wild through vulnerability
                  mentions online},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {82--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167501},
  doi          = {10.1109/CYCONUS.2017.8167501},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/AlmukayniziNDSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Chen17,
  author       = {Jim Q. Chen},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Take the rein of cyber deterrence},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {29--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167510},
  doi          = {10.1109/CYCONUS.2017.8167510},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Chen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/GuionR17,
  author       = {Jeffrey Guion and
                  Mark Reith},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Cyber terrain mission mapping: Tools and methodologies},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {105--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167504},
  doi          = {10.1109/CYCONUS.2017.8167504},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/GuionR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/HartK17,
  author       = {Stephen W. Hart and
                  Mark C. Klink},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {1st Troll Battalion: Influencing military and strategic operations
                  through cyber-personas},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {97--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167503},
  doi          = {10.1109/CYCONUS.2017.8167503},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/HartK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Healey17,
  author       = {Jason Healey},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {What might be predominant form of cyber conflict?},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {36--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167511},
  doi          = {10.1109/CYCONUS.2017.8167511},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Healey17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/KaniaC17,
  author       = {Elsa B. Kania and
                  John K. Costello},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Quantum technologies, U.S.-China strategic competition, and future
                  dynamics of cyber stability},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {89--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167502},
  doi          = {10.1109/CYCONUS.2017.8167502},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/KaniaC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/LemayK17,
  author       = {Antoine Lemay and
                  Scott Knight},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {A timing-based covert channel for {SCADA} networks},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {8--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167507},
  doi          = {10.1109/CYCONUS.2017.8167507},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/LemayK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/LivelyC17,
  author       = {Rebecca K. Lively and
                  Maj Sara Dayton Curran},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Solving the fiscal challenge of real-time cyber capability development:
                  How low-cost cyber capability development can be accelerated through
                  the use of Operations and Maintenance funds and what congress can
                  do to help},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {23--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167509},
  doi          = {10.1109/CYCONUS.2017.8167509},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/LivelyC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Rivera17,
  author       = {Joey Rivera},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Cyber security via formal methods: {A} framework for implementing
                  formal methods},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {76--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167500},
  doi          = {10.1109/CYCONUS.2017.8167500},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Rivera17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Ruiz17,
  author       = {Monica M. Ruiz},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Establishing volunteer {US} cyber defense units: {A} holistic approach},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {45--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167512},
  doi          = {10.1109/CYCONUS.2017.8167512},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Ruiz17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Stevens17,
  author       = {Rock Stevens},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Identifying self-inflicted vulnerabilities: The operational implications
                  of technology within {U.S.} combat systems},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {112--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167505},
  doi          = {10.1109/CYCONUS.2017.8167505},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Stevens17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/Stockburger17,
  author       = {Peter Z. Stockburger},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {The control {\&} capabilities test: How a new legal regime is
                  shaping attribution in cyberspace},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {67--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167514},
  doi          = {10.1109/CYCONUS.2017.8167514},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/Stockburger17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/TrimbleMS17,
  author       = {Daniel Trimble and
                  Jonathon Monken and
                  Alexander F. L. Sand},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {A framework for cybersecurity assessments of critical port infrastructure},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167506},
  doi          = {10.1109/CYCONUS.2017.8167506},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/TrimbleMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyconus/WillisMMG17,
  author       = {John M. Willis and
                  Robert F. Mills and
                  Logan O. Mailloux and
                  Scott R. Graham},
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {Considerations for secure and resilient satellite architectures},
  booktitle    = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  pages        = {16--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CYCONUS.2017.8167508},
  doi          = {10.1109/CYCONUS.2017.8167508},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyconus/WillisMMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cyconus/2017,
  editor       = {Edward Sobiesk and
                  Daniel Bennett and
                  Paul Maxwell},
  title        = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017,
                  Washington, DC, USA, November 7-8, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8119418/proceeding},
  isbn         = {978-1-5386-2379-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cyconus/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}