Login / Signup
CyCom
2022
2022
2022
Keyphrases
Publications
2022
Keir Giles
,
Kim Hartmann
Emergence of 5G Networks and Implications for Cyber Conflict.
CyCom
(2022)
Seth W. Dilworth
,
D. Daniel Osborne
Cyber Threats Against and in the Space Domain: Legal Remedies.
CyCom
(2022)
Sampath Rajapaksha
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
,
Garikayi Madzudzo
,
Andrei V. Petrovski
Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security.
CyCom
(2022)
John Morgan Salomon
Public-Private Partnerships and Collective Cyber Defence.
CyCom
(2022)
Emre Halisdemir
,
Hacer Karacan
,
Mauno Pihelgas
,
Toomas Lepik
,
Sungbaek Cho
Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal.
CyCom
(2022)
Joseph A. J. Ross
,
Kimberly Tam
,
David J. Walker
,
Kevin D. Jones
Towards a Digital Twin of a Complex Maritime Site for Multi-Objective Optimization.
CyCom
(2022)
Christopher Molloy
,
Philippe Charland
,
Steven H. H. Ding
,
Benjamin C. M. Fung
JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence.
CyCom
(2022)
Miguel Alberto Gomez
,
Gregory Winger
Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations.
CyCom
(2022)
Lennart Maschmeyer
Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation.
CyCom
(2022)
Georg Baselt
,
Martin Strohmeier
,
James Pavur
,
Vincent Lenders
,
Ivan Martinovic
Security and Privacy Issues of Satellite Communication in the Avlatlon Domain.
CyCom
(2022)
Siddhant Shrivastava
,
Francisco Furtado
,
Mark Goh
,
Aditya Mathur
The Design of Cyber-Physical Exercises (CPXS).
CyCom
(2022)
Sebastian Cymutta
,
Marten Zwanenburg
,
Paul Oling
Military Data and Information Sharing - a European Union Perspective.
CyCom
(2022)
Christopher E. Whyte
Machine Expertise in the Loop: Artificial Intelligence Decision-Making Inputs and Cyber Conflict.
CyCom
(2022)
Max Smeets
The Role of Military Cyber Exercises: A Case Study of Locked Shields.
CyCom
(2022)
Arun Mohan Sukumar
'Responsibility to Detect?': Autonomous Threat Detection and its Implications for Due Diligence in Cyberspace.
CyCom
(2022)
Erica D. Lonergan
,
Mark Montgomery
The Promise and Perils of Allied Offensive Cyber Operations.
CyCom
(2022)
Mikko Kiviharju
,
Christina Lassfolk
,
Sanna Rikkonen
,
Hannu H. Kari
A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System.
CyCom
(2022)
Michael Bátrla
,
Jakub Harasta
Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations.
CyCom
(2022)
Michael L. Thomas
Maritime Hacking Using Land-Based Skills.
CyCom
(2022)
Petr Stejskal
,
Martin Faix
Legal Aspects of Misattribution Caused by Cyber Deception.
CyCom
(2022)
Lee A. Bygrave
Cyber Resilience versus Cybersecurity as Legal Aspiration.
CyCom
(2022)
Martin C. Libicki
Obnoxious Deterrence.
CyCom
(2022)
Tsvetelina J. van Benthem
Exploring Changing Battlefields: Autonomous Weapons, Unintended Engagements and the Law of Armed Conflict.
CyCom
(2022)