default search action
8th CyCon 2016: Tallinn, Estonia
- Nikolaos Pissanidis, Henry Roigas, Matthijs Veenendaal:
8th International Conference on Cyber Conflict, CyCon 2016, Tallinn, Estonia, May 31 - June 3, 2016. IEEE 2016, ISBN 978-9-9499-5449-0 - Gabriel Jakobson, Rain Ottis:
Foreword. 1 - Pascal Brangetto, Raik Jakschis, Mari Kert-St Aubyn, Lauri Lindström, Nikolaos Pissanidis, Henry Roigas, Teemu Uolevi Väisänen, Matthijs Veenendaal:
Introduction. 1-4 - Jelle van Haaster:
Assessing cyber power. 7-21 - Ragnhild Endresen Siedler:
Hard power in cyberspace: CNA as a political means. 23-36 - Jason Healey:
Winning and losing in cyberspace. 37-49 - Lior Tabansky:
Towards a theory of cyber power: The Israeli experience with innovation and strategy. 51-63 - Sean Lawson, Sara K. Yeo, Haoran Yu, Ethan Greene:
The cyber-doom effect: The impact of fear appeals in the US cyber security debate. 65-80 - Steve S. Sin, Laura A. Blackerby, Elvis Asiamah, Rhyner Washburn:
Determining extremist organisations' likelihood of conducting cyber attacks. 81-98 - Drew Herrick:
The social side of 'cyber power'? Social media and cyber operations. 99-111 - Pascal Brangetto, Matthijs A. Veenendaal:
Influence Cyber Operations: The use of cyberattacks in support of Influence Operations. 113-126 - Kubo Macak:
Is the international law of cyber security in crisis? 127-139 - Anthony Craig, Brandon Valeriano:
Conceptualising cyber arms races. 141-158 - Markus Maybaum, Jens Tölle:
Arms control in cyberspace - architecture for a trust-based implementation framework based on conventional arms control methods. 159-173 - Trey Herr:
Malware counter-proliferation and the Wassenaar Arrangement. 175-190 - Robert Koch, Mario Golling:
Weapons systems and cyber security - a challenging union. 191-203 - Kim Hartmann, Keir Giles:
UAV exploitation: A new domain for cyber power. 205-221 - Martin Strohmeier, Matthias Schäfer, Matthew Smith, Vincent Lenders, Ivan Martinovic:
Assessing the impact of aviation security on cyber power. 223-241 - Mirco Marchetti, Fabio Pierazzi, Alessandro Guido, Michele Colajanni:
Countering Advanced Persistent Threats through security intelligence and big data analytics. 243-261 - Paolo Palmieri:
Anonymity networks and access to information during conflicts: Towards a distributed network organisation. 263-275 - Siddharth Prakash Rao, Ian Oliver, Silke Holtmanns, Tuomas Aura:
We know where you are! 277-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.