Abstract is missing.
- A treaty for governing cyber-weapons: Potential benefits and practical limitationsLouise Arimatsu. 1-19 [doi]
- Russia's public stance on cyberspace issuesKeir Giles. 1-13 [doi]
- Impact of cyberspace on human rights and democracyVittorio Fanchiotti, Jean Paul Pierini. 1-12 [doi]
- Socially engineered commoners as cyber warriors - Estonian future or present?Birgy Lorenz, Kaido Kikkas. 1-12 [doi]
- Applying traditional military principles to cyber warfareSamuel Liles, J. Eric Dietz, Marcus K. Rogers, Dean Larson. 1-12 [doi]
- Natural Privacy Preservation Protocol for electronic mailKim Hartmann, Christoph Steup. 1-17 [doi]
- The notion of combatancy in cyber warfareSean Watts. 1-15 [doi]
- Neutrality in cyberspaceWolff Heintschel von Heinegg. 1-12 [doi]
- Paradigm change of vehicle cyber securityHiro Onishi. 1-11 [doi]
- The role of COTS products for high security systemsRobert Koch 0002, Gabi Dreo Rodosek. 1-14 [doi]
- Conceptual framework for cyber defense information sharing within trust relationshipsDiego Fernandez Vazquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid. 1-17 [doi]
- When "not my problem" isn't enough: Political neutrality and national responsibility in cyber conflictJason Healey. 1-13 [doi]
- Direct participation in cyber hostilities: terms of reference for like-minded states?Jody M. Prescott. 1-16 [doi]
- French cyberdefence policyPatrice Tromparent. 1-12 [doi]
- An analysis for a just cyber warfareMariarosaria Taddeo. 1-10 [doi]
- Command and control of cyber weaponsEnn Tyugu. 1-11 [doi]
- "Attack" as a term of art in international law: The cyber operations contextMichael N. Schmitt. 1-11 [doi]
- Attack trends in present computer networksRobert Koch 0002, Björn Stelte, Mario Golling. 1-12 [doi]
- Legal implications of territorial sovereignty in cyberspaceWolff Heintschel von Heinegg. 1-13 [doi]
- Case study of the Miner BotnetDaniel Plohmann, Elmar Gerhards-Padilla. 1-16 [doi]
- A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflictRobert Fanelli, Gregory J. Conti. 1-13 [doi]
- The principle of maneuver in cyber operationsScott D. Applegate. 1-13 [doi]
- The militarisation of cyberspace: Why less may be betterMyriam Dunn Cavelty. 1-13 [doi]
- Beyond domains, beyond commons: Context and theory of conflict in cyberspaceJeffrey L. Caton. 1-11 [doi]
- Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoningHarsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James. 1-19 [doi]
- The signifi cance of attribution to cyberspace coercion: A political perspectiveForrest Hare. 1-15 [doi]
- Internet as a CII - A framework to measure awareness in the cyber sphereAssaf Y. Keren, Keren Elazari. 1-13 [doi]