default search action
15th CyCon 2023: Tallinn, Estonia
- Tat'ána Jancárková, D. Giovannelli, Karlis Podins, I. Winther:
15th International Conference on Cyber Conflict: Meeting Reality, CyCon 2023, Tallinn, Estonia, May 30 - June 2, 2023. IEEE 2023, ISBN 978-9916-9789-3-1 - Scott Sullivan:
Unpacking Cyber Neutrality. 9-23 - Yann L. Schmuki:
The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict. 25-38 - Marie Thøgersen:
Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts. 39-54 - Tsvetelina J. van Benthem:
Privatized Frontlines: Private-Sector Contributions in Armed Conflict. 55-69 - Bilyana Lilly, Kenneth Geers, Greg Rattray, Robert Koch:
Business@War: The IT Companies Helping to Defend Ukraine. 71-83 - Erica D. Lonergan, Margaret W. Smith, Grace B. Mueller:
Evaluating Assumptions About the Role of Cyberspace in Warfighting: Evidence from Ukraine*. 85-102 - Margaret W. Smith, Thomas Dean:
The Irregulars: Third-Party Cyber Actors and Digital Resistance Movements in the Ukraine Conflict. 103-119 - Andrii Davydiuk, Vitalii Zubok:
Analytical Review of the Resilience of Ukraine's Critical Energy Infrastructure to Cyber Threats in Times of War. 121-139 - Lars Gjesvik, Azan Latif Khanyari, Haakon Bryhni, Alfred Arouna, Niels Nagelhus Schia:
Digital Supply Chain Dependency and Resilience. 141-160 - Gerrit Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud, Jean-Pascal Chavanne, Vincent Lenders:
Modeling 5G Threat Scenarios for Critical Infrastructure Protection. 161-180 - Igor Linkov, Kelsey Stoddard, Andrew Strelzoff, Stephanie Elisabeth Galaitsi, Jeffrey M. Keisler, Benjamin D. Trump, Alexander Kott, Pavol Bielik, Petar Tsankov:
Toward Mission-Critical AI: Interpretable, Actionable, and Resilient AI. 181-197 - Baris Egemen Ozkan, Ihsan B. Tolga:
Zero-Day Operational Cyber Readiness. 199-215 - Alexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Demosthenes Ikonomou:
AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber Conflict. 217-238 - YoungJae Maeng, Mauno Pihelgas:
Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises. 239-252 - Lina Gehri, Roland Meier, Daniel Hulliger, Vincent Lenders:
Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic. 253-271 - Benjamin Strickson, Cameron Worsley, Stewart Bertram:
Human-centered Assessment of Automated Tools for Improved Cyber Situational Awareness. 273-286 - Conner Bender, Jason Staggs:
Leveling the Playing Field: Equipping Ukrainian Freedom Fighters with Low-Cost Drone Detection Capabilities. 287-312 - Aleksi Kajander:
Russian Invasion of Ukraine 2022: Time to Reconsider Small Drones? 313-327 - Matt Malone:
Weaponizing Cross-Border Data Flows: An Opportunity for NATO? 329-343 - Talita Dias:
Limits on Information Operations Under International Law. 345-363 - Lindsay Freeman:
Seeing Through the Fog: The Impact of Information Operations on War Crimes Investigations in Ukraine. 365-379 - Joe Devanny, Andrew C. Dwyer:
From Cyber Security to Cyber Power: Appraising the Emergence of 'Responsible, Democratic Cyber Power' in UK Strategy. 381-397 - Nate Beach-Westmoreland:
Sharpening the Spear: China's Information Warfare Lessons from Ukraine. 399-415 - Eduardo Izycki, Brett van Niekerk, Trishana Ramluckan:
Cyber Diplomacy: NATO/EU Engaging with the Global South. 417-435
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.