Abstract is missing.
- ForewordGabriel Jakobson, Rain Ottis. [doi]
- IntroductionPascal Brangetto, Markus Maybaum, Jan Stinissen. 1-3 [doi]
- Low-cost active cyber defenceKarlis Podins, Varis Teivans, Iveta Skujina. 1-16 [doi]
- The "triptych of cyber security": A classifi cation of active cyber defenceRobert S. Dewar. 7-21 [doi]
- Socio-political effects of Active Cyber Defence measuresKeir Giles, Kim Hartmann. 23-36 [doi]
- The drawbacks and dangers of active defenseOona A. Hathaway. 39-50 [doi]
- Artificial (intelligent) agents and active cyber defence: Policy implicationsCaitriona H. Heinl. 53-66 [doi]
- Malware is called malicious for a reason: The risks of weaponizing codeStephen Cobb, Andrew Lee. 71-84 [doi]
- Changing the game: The art of deceiving sophisticated attackersNikos Virvilis, Bart Vanautgaerden, Oscar Serrano Serrano. 87-97 [doi]
- The deployment of attribution agnostic cyberdefense constructs and internally based cyberthreat countermeasuresJason Rivera, Forrest Hare. 99-116 [doi]
- Dynamic cyber-incident responseKevin Mepham, Panos Louvieris, Gheorghita Ghinea, Natalie Clewley. 121-136 [doi]
- Beyond technical data - a more comprehensive situational awareness fed by available intelligence informationAndreas Kornmaier, Fabrice Jaouen. 139-154 [doi]
- Situational awareness and information collection from critical infrastructureJussi Timonen, Lauri Laaperi, Lauri Rummukainen, Samir Puuska, Jouko Vankka. 157-173 [doi]
- Operational data classes for establishing situational awareness in cyberspaceJudson Dressler, Calvert L. Bowen III, William Moody, Jason Koepke. 175-186 [doi]
- Towards multi-layered intrusion detection in high-speed networksMario Golling, Rick Hofstede, Robert Koch 0002. 191-206 [doi]
- Detecting and defeating advanced man-in-the-middle attacks against TLSEnrique de la Hoz, Gary Cochrane, Jose Manuel Moreira-Lemus, Rafael Paez-Reyes, Ivan Marsá-Maestre, Bernardo Alarcos. 209-221 [doi]
- Inter-AS routing anomalies: Improved detection and classificationMatthias Wubbeling, Till Elsner, Michael Meier. 223-238 [doi]
- Elastic deep packet inspectionBruce W. Watson, I. P. Blox. 241-253 [doi]
- An automated bot detection system through honeypots for large-scaleFatih Haltas, Erkam Uzun, Necati Siseci, Abdulkadir Posul, Bakir Emre. 255-270 [doi]
- Botnet over Tor: The illusion of hidingMatteo Casenove, Armando Miraglia. 273-282 [doi]
- Key terrain in cyberspace: Seeking the high groundDavid Raymond, Tom Cross, Gregory J. Conti, Michael Nowatkowski. 287-300 [doi]
- Fighting power, targeting and cyber operationsPaul Ducheine, Jelle van Haaster. 303-327 [doi]
- Cyber fratricideSamuel Liles, Jacob Kambic. 329-338 [doi]