


default search action
15th CyCon 2023: Tallinn, Estonia
- Tat'ána Jancárková, D. Giovannelli, Karlis Podins, I. Winther:

15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023. IEEE 2023, ISBN 978-9916-9789-3-1 - Scott Sullivan:

Unpacking Cyber Neutrality. 9-23 - Yann L. Schmuki:

The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict. 25-38 - Marie Thøgersen:

Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts. 39-54 - Tsvetelina J. van Benthem:

Privatized Frontlines: Private-Sector Contributions in Armed Conflict. 55-69 - Bilyana Lilly, Kenneth Geers, Greg Rattray, Robert Koch:

Business@War: The IT Companies Helping to Defend Ukraine. 71-83 - Erica D. Lonergan, Margaret W. Smith, Grace B. Mueller:

Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine*. 85-102 - Margaret W. Smith, Thomas Dean:

The Irregulars: Third-Party Cyber Actors and Digital Resistance Movements in the Ukraine Conflict. 103-119 - Andrii Davydiuk, Vitalii Zubok

:
Analytical Review of the Resilience of Ukraine's Critical Energy Infrastructure to Cyber Threats in Times of War. 121-139 - Lars Gjesvik, Azan Latif Khanyari, Haakon Bryhni, Alfred Arouna, Niels Nagelhus Schia:

Digital Supply Chain Dependency and Resilience. 141-160 - Gerrit Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud

, Jean-Pascal Chavanne, Vincent Lenders
:
Modeling 5G Threat Scenarios for Critical Infrastructure Protection. 161-180 - Igor Linkov, Kelsey Stoddard, Andrew Strelzoff, Stephanie Elisabeth Galaitsi, Jeffrey M. Keisler, Benjamin D. Trump, Alexander Kott, Pavol Bielik, Petar Tsankov:

Toward Mission-Critical AI: Interpretable, Actionable, and Resilient AI. 181-197 - Baris Egemen Ozkan, Ihsan B. Tolga:

Zero-Day Operational Cyber Readiness. 199-215 - Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Demosthenes Ikonomou:

AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict. 217-238 - YoungJae Maeng, Mauno Pihelgas:

Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises. 239-252 - Lina Gehri, Roland Meier, Daniel Hulliger, Vincent Lenders

:
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic. 253-271 - Benjamin Strickson, Cameron Worsley, Stewart Bertram:

Human-centered Assessment of Automated Tools for Improved Cyber Situational Awareness. 273-286 - Conner Bender, Jason Staggs:

Leveling the Playing Field: Equipping Ukrainian Freedom Fighters with Low-Cost Drone Detection Capabilities. 287-312 - Aleksi Kajander

:
Russian Invasion of Ukraine 2022: Time to Reconsider Small Drones? 313-327 - Matt Malone:

Weaponizing Cross-Border Data Flows: An Opportunity for NATO? 329-343 - Talita Dias:

Limits on Information Operations Under International Law. 345-363 - Lindsay Freeman:

Seeing Through the Fog: The Impact of Information Operations on War Crimes Investigations in Ukraine. 365-379 - Joe Devanny

, Andrew C. Dwyer
:
From Cyber Security to Cyber Power: Appraising the Emergence of 'Responsible, Democratic Cyber Power' in UK Strategy. 381-397 - Nate Beach-Westmoreland:

Sharpening the Spear: China's Information Warfare Lessons from Ukraine. 399-415 - Eduardo Izycki, Brett van Niekerk, Trishana Ramluckan:

Cyber Diplomacy: NATO/EU Engaging with the Global South. 417-435

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














