


default search action
CyCon U.S. 2017: Washington, DC, USA
- Edward Sobiesk, Daniel Bennett, Paul Maxwell:

2017 International Conference on Cyber Conflict, CyCon U.S. 2017, Washington, DC, USA, November 7-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2379-4
Mission Assurance Paper Track
- Daniel Trimble, Jonathon Monken, Alexander F. L. Sand:

A framework for cybersecurity assessments of critical port infrastructure. 1-7 - Antoine Lemay, Scott Knight:

A timing-based covert channel for SCADA networks. 8-15 - John M. Willis, Robert F. Mills, Logan O. Mailloux, Scott R. Graham

:
Considerations for secure and resilient satellite architectures. 16-22
Cyber Policy Paper Track
- Rebecca K. Lively, Maj Sara Dayton Curran:

Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help. 23-28 - Jim Q. Chen:

Take the rein of cyber deterrence. 29-35 - Jason Healey:

What might be predominant form of cyber conflict? 36-44
International Cyber Issues Paper Track
- Monica M. Ruiz:

Establishing volunteer US cyber defense units: A holistic approach. 45-58 - Siim Alatalu:

One year after Warsaw: The growing need for a NATO cyber command. 59-66 - Peter Z. Stockburger:

The control & capabilities test: How a new legal regime is shaping attribution in cyberspace. 67-75
Emerging Technologies Paper Track
- Joey Rivera:

Cyber security via formal methods: A framework for implementing formal methods. 76-81 - Mohammed Almukaynizi

, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian
:
Proactive identification of exploits in the wild through vulnerability mentions online. 82-88 - Elsa B. Kania, John K. Costello:

Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability. 89-96
Cyber Operations Paper Track
- Stephen W. Hart, Mark C. Klink:

1st Troll Battalion: Influencing military and strategic operations through cyber-personas. 97-104 - Jeffrey Guion, Mark Reith:

Cyber terrain mission mapping: Tools and methodologies. 105-111 - Rock Stevens:

Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems. 112-118

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














