Abstract is missing.
- IntroductionKarlis Podins, Jan Stinissen, Markus Maybaum. 1-4 [doi]
- Deriving behavior primitives from aggregate network features using support vector machinesOwen McCusker, Scott Brunza, Dipankar Dasgupta. 1-18 [doi]
- Context-based access control model for smart spaceAlexander V. Smirnov, Alexey Kashevnik, Nikolay Shilov, Nikolay Teslya. 1-15 [doi]
- Information sharing models for cooperative cyber defenceJorge L. Hernandez-Ardieta, Juan E. Tapiador, Guillermo Suarez-Tangil. 1-28 [doi]
- The dawn of Kinetic CyberScott D. Applegate. 1-15 [doi]
- Cyber deception and autonomous attack - Is there a legal problem?William H. Boothby. 1-17 [doi]
- Threat implications of the Internet of ThingsMichael J. Covington, Rush Carskadden. 1-12 [doi]
- A control measure framework to limit collateral damage and propagation of cyber weaponsDavid Raymond, Gregory J. Conti, Tom Cross, Robert Fanelli. 1-16 [doi]
- Illicit network structures in cyberspaceKaarel Kalm. 1-13 [doi]
- Architecture for evaluating and correlating NIDS in real - World networksRobert Koch 0002, Mario Golling. 1-20 [doi]
- Towards a cyber common operating pictureGregory J. Conti, John Nelson, David Raymond. 1-17 [doi]
- Autonomous intelligent agents in cyber offenceAlessandro Guarino. 1-12 [doi]
- Divided by a common language: Cyber definitions in Chinese, Russian and EnglishKeir Giles, William Hagestad. 1-17 [doi]
- Towards a Cyber Conflict TaxonomyScott D. Applegate, Angelos Stavrou. 1-18 [doi]
- ForewordGabriel Jakobson, Rain Ottis. 1-3 [doi]
- Complexity and emergence in ultra-tactical cyberspace operationsJeffrey L. Caton. 1-14 [doi]
- Patterns of a cooperative malware analysis workflowDaniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla. 1-18 [doi]
- The vulnerability of UAVs to cyber attacks - An approach to the risk assessmentKim Hartmann, Christoph Steup. 1-23 [doi]
- A Cyber Attack Modeling and Impact Assessment frameworkIgor V. Kotenko, Andrey Chechulin. 1-24 [doi]
- Legal aspects of a cyber immune systemJanine S. Hiller. 1-15 [doi]
- Autonomous decision-making processes and the responsible cyber commanderJody M. Prescott. 1-18 [doi]
- The future of military virtue: Autonomous systems and the moral deskilling of the militaryShannon Vallor. 1-15 [doi]
- An ethical analysis of the case for robotic weapons arms controlJohn P. Sullins. 1-20 [doi]
- Mission-centricity in cyber security: Architecting cyber attack resilient missionsGabriel Jakobson. 1-18 [doi]
- Exploring the prudent limits of automated cyber attackJeffrey L. Caton. 1-16 [doi]
- A baseline study of potentially malicious activity across five network telescopesBarry Irwin. 1-17 [doi]
- Cyber attack: A dull tool to shape foreign policyEmilio Iasiello. 1-18 [doi]
- Towards improved cyber security information sharingLuc Dandurand, Oscar Serrano Serrano. 1-16 [doi]