Login / Signup
CyCon U.S.
2016
2018
2016
2018
Keyphrases
Publications
2018
Char Sample
,
Connie Justice
,
Emily Darraj
A Model for Evaluating Fake News.
CyCon U.S.
(2018)
Matthew J. Flynn
Strategic Cyber: Responding to Russian Online Information Warfare.
CyCon U.S.
(2018)
Thomas Klemas
,
Rebecca K. Lively
,
Nazli Choucri
Cyber Acquisition.
CyCon U.S.
(2018)
Marcelo Antonio Righi
,
Raul Ceretta Nunes
Combining Recurrence Quantification Analysis and Adaptive Clustering to Detect DDoS Attacks.
CyCon U.S.
(2018)
David M. Perlman
Applies computational social choice theory as a framework for new cyber-threats.
CyCon U.S.
(2018)
2018 International Conference on Cyber Conflict, CyCon U.S. 2018, Washington, DC, USA, November 14-15, 2018
CyCon U.S.
(2018)
Annachiara Rotondo
,
Pierluigi Salvati
Fake news, (dis)information and principle of non-intervention.
CyCon U.S.
(2018)
Jason Healey
,
Erik B. Korn
Defense Support to the Private Sector: New Concepts for DoD's National Cyber Defense Mission.
CyCon U.S.
(2018)
Jobel Kyle P. Vecino
United By Necessity: Conditions for Institutional Cooperation against Cybercrime.
CyCon U.S.
(2018)
John A. Davis
,
Charlie Lewis
Beyond the United Nations Group of Governmental Experts: Norms of Responsible Nation State Behavior in Cyberspace.
CyCon U.S.
(2018)
Michael Warner
Borders in Cyberspace: Stratigive Information Conflict since 9/11.
CyCon U.S.
(2018)
Vaughn H. Standley
,
Roxanne B. Everetts
The Calculus of Protecting Interstate Competition from Cyber Attack.
CyCon U.S.
(2018)
Soumajyoti Sarkar
,
Mohammad Almukaynizi
,
Jana Shakarian
,
Paulo Shakarian
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums.
CyCon U.S.
(2018)
Michael P. Fischerkeller
,
Richard J. Harknett
Persistent Engagement, Agreed Competition, Cyberspace Interaction Dynamics and Escalation.
CyCon U.S.
(2018)
Colin Brooks
Critical Infrastructure Protection at the Local Level.
CyCon U.S.
(2018)
Nina A. Kollars
,
Michael B. Petersen
Feed the Bears, Starve the Trolls.
CyCon U.S.
(2018)
2017
John M. Willis
,
Robert F. Mills
,
Logan O. Mailloux
,
Scott R. Graham
Considerations for secure and resilient satellite architectures.
CyCon U.S.
(2017)
Rock Stevens
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems.
CyCon U.S.
(2017)
Jeffrey Guion
,
Mark Reith
Cyber terrain mission mapping: Tools and methodologies.
CyCon U.S.
(2017)
Joey Rivera
Cyber security via formal methods: A framework for implementing formal methods.
CyCon U.S.
(2017)
Daniel Trimble
,
Jonathon Monken
,
Alexander F. L. Sand
A framework for cybersecurity assessments of critical port infrastructure.
CyCon U.S.
(2017)
Monica M. Ruiz
Establishing volunteer US cyber defense units: A holistic approach.
CyCon U.S.
(2017)
Jim Q. Chen
Take the rein of cyber deterrence.
CyCon U.S.
(2017)
Rebecca K. Lively
,
Maj Sara Dayton Curran
Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help.
CyCon U.S.
(2017)
2017 International Conference on Cyber Conflict, CyCon U.S. 2017, Washington, DC, USA, November 7-8, 2017
CyCon U.S.
(2017)
Antoine Lemay
,
Scott Knight
A timing-based covert channel for SCADA networks.
CyCon U.S.
(2017)
Siim Alatalu
One year after Warsaw: The growing need for a NATO cyber command.
CyCon U.S.
(2017)
Stephen W. Hart
,
Mark C. Klink
1st Troll Battalion: Influencing military and strategic operations through cyber-personas.
CyCon U.S.
(2017)
Jason Healey
What might be predominant form of cyber conflict?
CyCon U.S.
(2017)
Mohammed Almukaynizi
,
Eric Nunes
,
Krishna Dharaiya
,
Manoj Senguttuvan
,
Jana Shakarian
,
Paulo Shakarian
Proactive identification of exploits in the wild through vulnerability mentions online.
CyCon U.S.
(2017)
Peter Z. Stockburger
The control & capabilities test: How a new legal regime is shaping attribution in cyberspace.
CyCon U.S.
(2017)
Elsa B. Kania
,
John K. Costello
Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability.
CyCon U.S.
(2017)
2016
H. Kantola
,
Margarita Levin Jaitner
Cyber defence information sharing in a federated network.
CyCon U.S.
(2016)
Char Sample
,
Jennifer Cowley
,
Tim Watson
,
Carsten Maple
Re-thinking threat intelligence.
CyCon U.S.
(2016)
Annachiara Rotondo
Countering cyber threats: answers from international law.
CyCon U.S.
(2016)
Bruce D. Caulkins
,
Karla A. Badillo-Urquiola
,
Patricia Bockelman
,
Rebecca A. Leis
Cyber workforce development using a behavioral cybersecurity paradigm.
CyCon U.S.
(2016)
Alfonso De Gregorio
Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sector.
CyCon U.S.
(2016)
Brian M. Mazanec
,
Patricia Shamai
Stigmatizing cyber war: mission impossible?
CyCon U.S.
(2016)
Suzanne J. Matthews
,
Raymond W. Blaine
,
Aaron F. Brantly
Evaluating single board computer clusters for cyber operations.
CyCon U.S.
(2016)
V. A. Greiman
Cyber attacks: the fog of identity.
CyCon U.S.
(2016)
Panayotis A. Yannakogeorgos
,
Eneken Tikk
Stuxnet as cyber-enabled sanctions enforcement.
CyCon U.S.
(2016)
Jose David Mireles
,
Jin-Hee Cho
,
Shouhuai Xu
Extracting attack narratives from traffic datasets.
CyCon U.S.
(2016)
Michael J. Assante
Implications of cyber in anti-access and area-denial counters.
CyCon U.S.
(2016)
Amaël Cattaruzza
,
Didier Danet
,
Stéphane Taillat
,
Arthur Laudrain
Sovereignty in cyberspace: Balkanization or democratization.
CyCon U.S.
(2016)
Elsa B. Kania
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking.
CyCon U.S.
(2016)
Edwin L. Armistead
Suggestions to measure cyber power and proposed metrics for cyber warfare operations (cyberdeterrence/cyber power).
CyCon U.S.
(2016)
Ernest Y. Wong
,
Nicholas M. Sambaluk
Disruptive innovations to help protect against future threats.
CyCon U.S.
(2016)
Clara Maathuis
,
Wolter Pieters
,
Jan van den Berg
Cyber weapons: a profiling framework.
CyCon U.S.
(2016)
Christopher M. Spirito
Cyber norms for civilian nuclear power plants.
CyCon U.S.
(2016)
Josiah A. B. S. Dykstra
,
Stephen R. Orr
Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making.
CyCon U.S.
(2016)