2017 IEEE International Conference on Cyber Conflict U.S. (CyCon U.S.) : proceedings : 7-8 November 2017, Washington, DC, USA (Englisch)
- Neue Suche nach: IEEE International Conference on Cyber Conflict U.S.
- Neue Suche nach: Institute of Electrical and Electronics Engineers
- Weitere Informationen zu Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
- Neue Suche nach: IEEE Computer Society
- Weitere Informationen zu IEEE Computer Society:
- http://d-nb.info/gnd/25694-8
- Neue Suche nach: Sobiesk, Edward
- Neue Suche nach: IEEE International Conference on Cyber Conflict U.S.
- Neue Suche nach: Institute of Electrical and Electronics Engineers
- Weitere Informationen zu Institute of Electrical and Electronics Engineers:
- http://d-nb.info/gnd/1692-5
- Neue Suche nach: IEEE Computer Society
- Weitere Informationen zu IEEE Computer Society:
- http://d-nb.info/gnd/25694-8
2017
-
ISBN:
- Konferenzband / Elektronische Ressource
-
Titel:2017 IEEE International Conference on Cyber Conflict U.S. (CyCon U.S.) : proceedings : 7-8 November 2017, Washington, DC, USA
-
Weitere Titelangaben:Future of cyber conflict
-
Beteiligte:Sobiesk, Edward ( Herausgeber:in ) / IEEE International Conference on Cyber Conflict U.S. ( Autor:in ) / Institute of Electrical and Electronics Engineers ( Herausgebendes Organ ) / IEEE Computer Society ( Sponsor:in )
-
Kongress:IEEE International Conference on Cyber Conflict U.S. ; 2017 ; Washington, DC
CyCon U.S. ; 2017 ; Washington, DC -
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsort:Piscataway, NJ
-
Erscheinungsdatum:2017
-
Format / Umfang:1 Online-Ressource
-
Anmerkungen:Illustrationen
Thema der Konferenz: The future of cyber conflict
Literaturangaben -
ISBN:
-
Medientyp:Konferenzband
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
[Title page]| 2017
- 1
-
[Copyright notice]| 2017
- 1
-
A framework for cybersecurity assessments of critical port infrastructureTrimble, Daniel / Monken, Jonathon / Sand, Alexander F. L. et al. | 2017
- 8
-
A timing-based covert channel for SCADA networksLemay, Antoine / Knight, Scott et al. | 2017
- 16
-
Considerations for secure and resilient satellite architecturesWillis, John M. / Mills, Robert F. / Mailloux, Logan O. / Graham, Scott R. et al. | 2017
- 23
-
Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to helpLively, Rebecca K. / Dayton Curran, Maj Sara et al. | 2017
- 29
-
Take the rein of cyber deterrenceChen, Jim Q. et al. | 2017
- 36
-
What might be predominant form of cyber conflict?Healey, Jason et al. | 2017
- 45
-
Establishing volunteer US cyber defense units: A holistic approachRuiz, Monica M. et al. | 2017
- 59
-
One year after Warsaw: The growing need for a NATO cyber commandAlatalu, Siim et al. | 2017
- 67
-
The control & capabilities test: How a new legal regime is shaping attribution in cyberspaceStockburger, Peter Z. et al. | 2017
- 76
-
Cyber security via formal methods: A framework for implementing formal methodsRivera, Joey et al. | 2017
- 82
-
Proactive identification of exploits in the wild through vulnerability mentions onlineAlmukaynizi, Mohammed / Nunes, Eric / Dharaiya, Krishna / Senguttuvan, Manoj / Shakarian, Jana / Shakarian, Paulo et al. | 2017
- 89
-
Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stabilityKania, Elsa B. / Costello, John K. et al. | 2017
- 97
-
1st Troll Battalion: Influencing military and strategic operations through cyber-personasHart, Stephen W. / Klink, Mark C. et al. | 2017
- 105
-
Cyber terrain mission mapping: Tools and methodologiesGuion, Jeffrey / Reith, Mark et al. | 2017
- 112
-
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systemsStevens, Rock et al. | 2017
- 119
-
Author index| 2017
- iii
-
Army cyber institute| 2017
- iv
-
Introduction| 2017
- v
-
Paper review committee members| 2017
- vi
-
Acknowledgment| 2017
- vii
-
Table of contents| 2017