default search action
Search dblp for Publications
export results for "toc:db/conf/cyconus/cyconus2017.bht:"
@inproceedings{DBLP:conf/cyconus/Alatalu17, author = {Siim Alatalu}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {One year after Warsaw: The growing need for a {NATO} cyber command}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {59--66}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167513}, doi = {10.1109/CYCONUS.2017.8167513}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Alatalu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/AlmukayniziNDSS17, author = {Mohammed Almukaynizi and Eric Nunes and Krishna Dharaiya and Manoj Senguttuvan and Jana Shakarian and Paulo Shakarian}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Proactive identification of exploits in the wild through vulnerability mentions online}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {82--88}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167501}, doi = {10.1109/CYCONUS.2017.8167501}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/AlmukayniziNDSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Chen17, author = {Jim Q. Chen}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Take the rein of cyber deterrence}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {29--35}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167510}, doi = {10.1109/CYCONUS.2017.8167510}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Chen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/GuionR17, author = {Jeffrey Guion and Mark Reith}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Cyber terrain mission mapping: Tools and methodologies}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {105--111}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167504}, doi = {10.1109/CYCONUS.2017.8167504}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/GuionR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/HartK17, author = {Stephen W. Hart and Mark C. Klink}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {1st Troll Battalion: Influencing military and strategic operations through cyber-personas}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {97--104}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167503}, doi = {10.1109/CYCONUS.2017.8167503}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/HartK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Healey17, author = {Jason Healey}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {What might be predominant form of cyber conflict?}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {36--44}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167511}, doi = {10.1109/CYCONUS.2017.8167511}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Healey17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/KaniaC17, author = {Elsa B. Kania and John K. Costello}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {89--96}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167502}, doi = {10.1109/CYCONUS.2017.8167502}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/KaniaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/LemayK17, author = {Antoine Lemay and Scott Knight}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {A timing-based covert channel for {SCADA} networks}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {8--15}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167507}, doi = {10.1109/CYCONUS.2017.8167507}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/LemayK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/LivelyC17, author = {Rebecca K. Lively and Maj Sara Dayton Curran}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {23--28}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167509}, doi = {10.1109/CYCONUS.2017.8167509}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/LivelyC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Rivera17, author = {Joey Rivera}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Cyber security via formal methods: {A} framework for implementing formal methods}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {76--81}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167500}, doi = {10.1109/CYCONUS.2017.8167500}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Rivera17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Ruiz17, author = {Monica M. Ruiz}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Establishing volunteer {US} cyber defense units: {A} holistic approach}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {45--58}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167512}, doi = {10.1109/CYCONUS.2017.8167512}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Ruiz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Stevens17, author = {Rock Stevens}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Identifying self-inflicted vulnerabilities: The operational implications of technology within {U.S.} combat systems}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {112--118}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167505}, doi = {10.1109/CYCONUS.2017.8167505}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Stevens17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/Stockburger17, author = {Peter Z. Stockburger}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {The control {\&} capabilities test: How a new legal regime is shaping attribution in cyberspace}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {67--75}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167514}, doi = {10.1109/CYCONUS.2017.8167514}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/Stockburger17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/TrimbleMS17, author = {Daniel Trimble and Jonathon Monken and Alexander F. L. Sand}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {A framework for cybersecurity assessments of critical port infrastructure}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167506}, doi = {10.1109/CYCONUS.2017.8167506}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/TrimbleMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyconus/WillisMMG17, author = {John M. Willis and Robert F. Mills and Logan O. Mailloux and Scott R. Graham}, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {Considerations for secure and resilient satellite architectures}, booktitle = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, pages = {16--22}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CYCONUS.2017.8167508}, doi = {10.1109/CYCONUS.2017.8167508}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyconus/WillisMMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cyconus/2017, editor = {Edward Sobiesk and Daniel Bennett and Paul Maxwell}, title = {2017 International Conference on Cyber Conflict, CyCon {U.S.} 2017, Washington, DC, USA, November 7-8, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8119418/proceeding}, isbn = {978-1-5386-2379-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cyconus/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.