Abstract is missing.
- Cyber War Games: Strategic Jostling Among Traditional AdversariesSanjay Goel, Yuan Hong. 1-13 [doi]
- Alternatives to Cyber Warfare: Deterrence and AssuranceRobert J. Elder, Alexander H. Levis, Bahram Yousefi. 15-35 [doi]
- Identifying and Exploiting the Cyber High Ground for BotnetsPatrick Sweeney, George Cybenko. 37-56 [doi]
- Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in CyberwarfareEhab Al-Shaer, Mohammad Ashiqur Rahman. 57-80 [doi]
- Game-Theoretic Foundations for the Strategic Use of Honeypots in Network SecurityChristopher Kiekintveld, Viliam Lisý, Radek Píbil. 81-101 [doi]
- Cyber Counterdeception: How to Detect Denial & Deception (D&D)Kristin E. Heckman, Frank J. Stech. 103-140 [doi]
- Automated Adversary ProfilingSamuel N. Hamilton. 141-149 [doi]
- Cyber Attribution: An Argumentation-Based ApproachPaulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons. 151-171 [doi]
- The Human Factor in Cybersecurity: Robust & Intelligent DefenseJulie L. Marble, William F. Lawless, Ranjeev Mittu, Joseph T. Coyne, Myriam Abramson, Ciara Sibley. 173-206 [doi]
- CyberWar Game: A Paradigm for Understanding New Challenges of Cyber WarNoam Ben-Asher, Cleotilde Gonzalez. 207-220 [doi]
- Active Discovery of Hidden Profiles in Social Networks Using MalwareRami Puzis, Yuval Elovici. 221-235 [doi]
- A Survey of Community Detection Algorithms Based On Analysis-IntentNapoleon C. Paxton, Stephen Russell, Ira S. Moskowitz, Paul Hyden. 237-263 [doi]
- Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber AttacksTudor Dumitras. 265-285 [doi]
- Graph Mining for Cyber SecurityB. Aditya Prakash. 287-306 [doi]
- Programming Language Theoretic Security in the Real World: A Mirage or the Future?Andrew Ruef, Chris Rohlf. 307-321 [doi]