


default search action
14th CyCon 2022: Tallinn, Estonia
- Tat'ána Jancárková, Gábor Visky, I. Winther:

14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 - June 3, 2022. IEEE 2022, ISBN 978-9916-9789-1-7 - Max Smeets:

The Role of Military Cyber Exercises: A Case Study of Locked Shields. 9-25 - Lee Andrew Bygrave:

Cyber Resilience versus Cybersecurity as Legal Aspiration. 27-43 - John Morgan Salomon:

Public-Private Partnerships and Collective Cyber Defence. 45-63 - Martin C. Libicki:

Obnoxious Deterrence. 65-77 - Erica D. Lonergan, Mark Montgomery:

The Promise and Perils of Allied Offensive Cyber Operations. 79-92 - Michael Bátrla, Jakub Harasta:

'Releasing the Hounds?'1 Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations. 93-115 - Miguel Alberto Gomez, Gregory Winger

:
Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations. 117-134 - Christopher E. Whyte:

Machine Expertise in the Loop: Artificial Intelligence Decision-Making Inputs and Cyber Conflict. 135-154 - Lennart Maschmeyer:

Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation. 155-171 - Arun Mohan Sukumar

:
'Responsibility to Detect?': Autonomous Threat Detection and its Implications for Due Diligence in Cyberspace. 173-187 - Tsvetelina J. van Benthem:

Exploring Changing Battlefields: Autonomous Weapons, Unintended Engagements and the Law of Armed Conflict. 190-204 - Petr Stejskal, Martin Faix

:
Legal Aspects of Misattribution Caused by Cyber Deception. 205-218 - Sebastian Cymutta, Marten Zwanenburg, Paul Oling:

Military Data and Information Sharing - a European Union Perspective. 219-234 - Seth W. Dilworth, D. Daniel Osborne:

Cyber Threats Against and in the Space Domain: Legal Remedies. 235-247 - Michael L. Thomas:

Maritime Hacking Using Land-Based Skills. 249-263 - Mikko Kiviharju, Christina Lassfolk, Sanna Rikkonen, Hannu H. Kari:

A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System. 265-284 - Georg Baselt, Martin Strohmeier

, James Pavur, Vincent Lenders
, Ivan Martinovic:
Security and Privacy Issues of Satellite Communication in the Avlatlon Domain. 285-307 - Sampath Rajapaksha, Harsha K. Kalutarage

, M. Omar Al-Kadri
, Garikayi Madzudzo, Andrei V. Petrovski:
Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security. 309-330 - Joseph A. J. Ross, Kimberly Tam

, David J. Walker
, Kevin D. Jones
:
Towards a Digital Twin of a Complex Maritime Site for Multi-Objective Optimization. 331-345 - Siddhant Shrivastava, Francisco Furtado, Mark Goh, Aditya Mathur:

The Design of Cyber-Physical Exercises (CPXS). 348-366 - Emre Halisdemir, Hacer Karacan, Mauno Pihelgas, Toomas Lepik, Sungbaek Cho:

Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal. 367-383 - Christopher Molloy, Philippe Charland, Steven H. H. Ding, Benjamin C. M. Fung:

JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence. 385-403 - Keir Giles, Kim Hartmann:

Emergence of 5G Networks and Implications for Cyber Conflict. 405-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














