Just Warfare: Is a Nuclear Attack an appropriate Response to a Cyber Attack? (English)
- New search for: Fitz, Alexia
- New search for: Wilson, Richard
- New search for: Fitz, Alexia
- New search for: Wilson, Richard
In:
18th International Conference on Cyber Warfare and Security (ICCWS 2023)
; 534-541
;
2023
-
ISBN:
- Conference paper / Print
-
Title:Just Warfare: Is a Nuclear Attack an appropriate Response to a Cyber Attack?
-
Contributors:Fitz, Alexia ( author ) / Wilson, Richard ( author )
-
Conference:International Conference on Cyber Warfare and Security ; 18. ; 2023 ; Towson, Md.
-
Published in:
-
Publisher:
- New search for: Curran Associates, Inc.
-
Place of publication:Red Hook, NY
-
Publication date:2023
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.38 / 89.83
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Secure Cloud Migration Strategy (SCMS): A Safe Journey to the CloudAlharthi, Dalal et al. | 2023
- 7
-
Cyber-Physical Attack Using High Power RF in Havana, CubaArgudo, Allyffazzkkamn / Nasibu, Ghislaine et al. | 2023
- 19
-
Cybersecurity in Digital Transformation applications: Analysis of Past Research and Future DirectionsBelkhamza, Zakariya et al. | 2023
- 25
-
An Automated Post-Exploitation Model for Cyber Red TeamingBenito, Ryan / Shaffer, Alan / Singh, Gurminder et al. | 2023
- 35
-
Review of End-to-End Encryption for Social MediaBhuse, Vijay et al. | 2023
- 39
-
An Analysis of Crypto Scams during the Covid-19 Pandemic: 2020-2022Botha, Johannes George / Botha, Danielle / Leenen, Louise et al. | 2023
- 49
-
Case Study: Conducting a Risk Assessment for an Electrical UtilityCovert, Edwin et al. | 2023
- 57
-
On the Use and Strategic Implications of Cyber Ranges in Military Contexts: A Dual TypologyHansel, Mischa / Dwyer, Andrew / Moog, Kathrin / Silomon, Jantje et al. | 2023
- 67
-
Evaluation of Quantum Key Distribution for Secure Satellite-integrated IoT NetworksEdwards, Andrew / Law, Yee Wei / Mulinde, Ronald / Slay, Jill et al. | 2023
- 77
-
Commentary on Healthcare and Disruptive InnovationFinch, Hilary / Affia, Abasi-Amefon / Jung, Woosub / Potter, Lucas / Palmer, Xavier-Lewis et al. | 2023
- 85
-
Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain FrameworkFleming, Courtney / Reith, Mark / Henry, Wayne et al. | 2023
- 93
-
Predictors of Human Efficiency in Radar Detection TasksFox, Elizabeth / Stephenson, Arielle / Stevens, Christopher / Bowers, Gregory et al. | 2023
- 103
-
Nuclear Cyber Attacks: A Study of Sabotage and Regulation of Critical InfrastructureGreiman, Virginia et al. | 2023
- 111
-
Social-Engineering, Bio-economies, and Nation-State Ontological Security: A CommentaryGriffin, Brandon / Alexander, Keitavius / Palmer, Xavier-Lewis / Potter, Lucas et al. | 2023
- 119
-
Search and CompAre Reverse (SCAR): A Bioinformatics–Inspired Methodology for Detecting File Remnants in Digital ForensicsGrispos, George / Mahoney, William / Mandal, Sayonnha et al. | 2023
- 128
-
Development and Analysis of a Reconnaissance-Technique Knowledge GraphHeverin, Thomas / Deitz, Elsa / Cohen, Eve / Wilkes, Jordana et al. | 2023
- 137
-
Zero Trust is Not Enough: Mitigating Data Repository BreachesHurley, J. S. et al. | 2023
- 145
-
Managing Large-Scale Heterogeneous Deployments for CybersecurityHurley, J. S. et al. | 2023
- 152
-
Digital Geopolitics: A Review of the Current StateHuskaj, Gazmend et al. | 2023
- 162
-
Managing Variable Cyber Environments with Organizational Foresight and Resilience ThinkingHytönen, Eveliina / Rajamäki, Jyri / Ruoslahti, Harri et al. | 2023
- 171
-
Fingerprinting Network Sessions for the Discovery of Cyber ThreatsKlopper, Christiaan / Jan et al. | 2023
- 181
-
S-400s, Disinformation, and Anti-American Sentiment in TurkeyKorb, Russell / Karahan, Saltuk / Prathap, Gowri / Kaya, Ekrem / Palmieri, Luke / Kavak, Hamdi et al. | 2023
- 189
-
Detecting and tracking hypersonic glide vehicles:A cybersecurity-engineering analysis of academic literatureLaw, Yee Wei / Gliponeo, John Joshua / Singh, Dilpreet / McGuire, John / Liang, Jiajun / Ho, Sook-Ying / Slay, Jill et al. | 2023
- 199
-
Cyber security training in Finnish basic and general upper secondary educationLehto, Martti / Neittaanmäki, Pekka et al. | 2023
- 209
-
Russian Influence Operations during the Invasion of UkraineLittell, Joseph / Starck, Nicolas et al. | 2023
- 218
-
Modelling the Influential Factors Embedded in the Proportionality Assessment in Military OperationsMaathuis, Clara / Chockalingam, Sabarathinam et al. | 2023
- 227
-
Social Media Manipulation Awareness through Deep Learning based Disinformation GenerationMaathuis, Clara / Kerkhof, Iddo et al. | 2023
- 237
-
Social Media Manipulation Deep Learning based Disinformation DetectionMaathuis, Clara / Godschalk, Rik et al. | 2023
- 246
-
Improvements on Hiding x86-64 Instructions by InterleavingMahoney, William / McDonald, Todd / Grispos, George / Mandal, Sayonnha et al. | 2023
- 256
-
Developing Privacy Incident Responses to Combat Information WarfareMcElroy, Sean / McKee, Lisa et al. | 2023
- 264
-
Use of Intrusion Detection Systems in Vehicular Controller Area Networks to Preclude Remote AttacksMonge, Anthony / Andel, Todd et al. | 2023
- 273
-
Digital Insanity: Exploring the Flexibility of NIST Digital Identity Assurance LevelsMyers, Kenneth et al. | 2023
- 279
-
Risk likelihood of planned and unplanned cyber-attacks in small business sectors: A cybersecurity concernNcubukezi, Tabisa et al. | 2023
- 291
-
Ret-gadgets in RISC-V-based Binaries Resulting in Traps for HijackersOyinloye, Toyosi / Speakman, Lee / Eze, Thaddeus et al. | 2023
- 300
-
Basic Elements of Cyber Security for a Smart Terminal ProcessPöyhönen, Jouni / Simola, Jussi / Lehto, Martti et al. | 2023
- 309
-
Anti-American Stance in Turkey: A Twitter Case StudyPrathap, Gowri / Kavak, Hamdi / Kaya, Ekrem / Palmieri, Luke / Karahan, Saltuk / Korb, Alex et al. | 2023
- 318
-
Gaps in Asset Management Systems to Integrate Railway Companies’ ResilienceRajamäki, Jyri / Savolainen, Jari / Pirinen, Rauno / Villamor et al. | 2023
- 327
-
LoRaWAN & The Helium Blockchain: A Study on Military IoT DeploymentReyneke, Michael A. / Mullins, Barry E. / Reith, Mark G. et al. | 2023
- 338
-
Blockchain Forensics: A Modern Approach to Investigating Cybercrime in the Age of DecentralisationSalisu, Saminu / Filipov, Velitchko et al. | 2023
- 348
-
Biocybersecurity and Deterrence: Hypothetical Rwandan ConsiderationsSamori, Issah / Odularu, Gbadebo / Potter, Lucas / Palmer, Xavier-Lewis et al. | 2023
- 355
-
Lesson Plan: An Interdisciplinary Approach to Teaching Cyber Warfare ConceptsSchaeffer, Donna / Olson, Patrick et al. | 2023
- 360
-
The Impact of Edge Computing on the Industrial Internet of ThingsSekonya, Nkata / Sithungu, Siphesihle et al. | 2023
- 369
-
Cyber Threat Analysis in Smart Terminal SystemsSimola, Jussi / Pöyhönen, Jouni / Martti, Lehto et al. | 2023
- 379
-
Towards a Scientific Definition of Cyber ResilienceSmith, Sidney et al. | 2023
- 387
-
Implications of Cyberbiosecurity in Advanced AgricultureStephen, Simone / Alexander, Keitavius / Potter, Lucas / Palmer, Xavier-Lewis et al. | 2023
- 394
-
Organizational Cybersecurity Post The Pandemic: An Exploration of Remote Working Risks and Mitigation StrategiesTreacy, Stephen / Sabu, Anoop / Bond, Thomas / O'Sullivan, Joseph / Sullivan, Jack / Sylvester, Peter et al. | 2023
- 402
-
A Quantitative Risk Assessment Framework for the Cybersecurity of Networked Medical DevicesDevender, Maureen Van / McDonald, Jeffrey Todd et al. | 2023
- 412
-
Towards the Usefulness of Learning Factories in the Cybersecurity DomainVeerasamy, Namosha / Mkhwanazi, Thuli / Dawood, Zubeida et al. | 2023
- 420
-
Naïve Bayes Supervised Learning based Physical Layer Authentication: Anti-Spoofing techniques for Industrial Radio SystemsWeinand, Andreas / Lipps, Christoph / Karrenbauer, Michael / Schotten, Hans Dieter et al. | 2023
- 431
-
How the Russian Influence Operation on Twitter Weaponized Military NarrativesWeinberg, Dana / Dawson, Jessica / Edwards, April et al. | 2023
- 440
-
Nuclear Weapons, Cyber Warfare, and Cyber Security: Ethical and Anticipated Ethical Issues Richard Wilson, Alexia FitzWilson, Richard / Fitz, Alexia et al. | 2023
- 449
-
Robots Security Assessment and Analysis Using Open-Source ToolsYankson, Benjamin / Loucks, Tyler / Sampson, Andrea / Lojano, Chelsea et al. | 2023
- 457
-
Social Robots Privacy Enhancement Using Colored Petri Net (CPN) for Behavior Modeling: A Case Study of Asus Zenbo RobotYankson, Benjamin / Iqbal, Farkhund / AlMaeeni, Fadya et al. | 2023
- 466
-
A Unified Forensics Analysis Approach to Digital InvestigationAlshumrani, Ali / Clarke, Nathan / Ghita, Bogdan et al. | 2023
- 476
-
Offensive Cyberspace Operations for Cyber SecurityHuskaj, Gazmend et al. | 2023
- 480
-
Categorizing Cyber Activity Through an Information-psychological and Information-technological Perspective, Case UkraineKantola, Harry et al. | 2023
- 489
-
Using Military Cyber Operations as a DeterrentKeinonen, Maria et al. | 2023
- 497
-
Identifying Commonalities of Cyberattacks Against the Maritime Transportation SystemRohan, Rebecca et al. | 2023
- 504
-
Evaluating a Non-platform-specific OCR/NLP system to detect Online GroomingStreet, Jake / Olajide, Funminiyi et al. | 2023
- 513
-
Demonstrating Redundancy Advantages of a Three-Channel Communication ProtocolCulbreth, Scott / Graham, Scott et al. | 2023
- 523
-
UAV Payload Identification with Acoustic Emissions and Cell PhonesDoster, Hunter / Mullins, Barry et al. | 2023
- 534
-
Just Warfare: Is a Nuclear Attack an appropriate Response to a Cyber Attack?Fitz, Alexia / Wilson, Richard et al. | 2023
- 542
-
A Review and Testing of Fault Tolerance Levels of Anti-Poaching Cybersecurity SystemHeyl, Isabelle / Stone, Julia / Banda, Takudzwa Vincent / Smit, Vian / Blaauw, Dewald et al. | 2023
- 550
-
DACA: Automated Attack Scenarios and Dataset GenerationKorving, Frank / Vaarandi, Risto et al. | 2023
- 560
-
Towards a Critical Review of Cybersecurity Risks in Anti-Poaching SystemsSteyn, Christelle / Blaauw, Dewald Neville et al. | 2023
- 570
-
Locality-based electromagnetic leakage assessment using CNNHeffron, Ian / Dean, James et al. | 2023
- 577
-
Using Deep Reinforcement Learning for Assessing the Consequences of Cyber Mitigation Techniques on Industrial Control SystemsMerz, Terry / Rosado, Romarie Morales et al. | 2023