Abstract is missing.
- IntroductionBernhards Blumbergs, Pascal Brangetto, Lauri Lindström, Markus Maybaum, Anna-Maria Osula, Nikolaos Pissanidis, Henry Roigas, Matthijs Veenendaal, Teemu Uolevi Väisänen. 1-4 [doi]
- Achieving cyberdeterrence and the ability of small states to hold large states at riskJason Rivera. 7-24 [doi]
- Cyberwar, Netwar, and the future of CyberdefenseRobert Brose. 25-38 [doi]
- Russian Information Warfare of 2014Margarita Jaitner, Peter Mattsson. 39-52 [doi]
- Technological sovereignty: Missing the point?Tim Maurer, Isabel Skierka, Robert Morgus, Mirko Hohmann. 53-68 [doi]
- Civil-military relations and international military cooperation in cyber security: Common challenges & state practices across Asia and EuropeSergei Boeke, Caitriona H. Heinl, Matthijs A. Veenendaal. 69-80 [doi]
- Anticipatory and preemptive self-defense in cyberspace: The challenge of imminenceGeoffrey S. DeWeese. 81-92 [doi]
- Law of the horse to law of the submarine: The future of State behavior in cyberspacePaul A. Walker. 93-104 [doi]
- Multilateral legal responses to cyber security in Africa: Any hope for effective international cooperation?Uchenna Jerome Orji. 105-118 [doi]
- Dealing with cyber security threats: International cooperation, ITU, and WCITRichard Hill. 119-134 [doi]
- Visual structures for seeing cyber policy strategiesJennifer Stoll, Rainhard Z. Bengez. 135-152 [doi]
- Strategic anti-access/area denial in cyberspaceAlison L. Russell. 153-168 [doi]
- Blackout and now? Network Centric Warfare in an anti-access area-denial theatreRobert Koch 0002, Mario Golling. 169-184 [doi]
- Supporting sense-making and decision-making through time evolution analysis of open sourcesAndrea Balboni, Mirco Marchetti, Michele Colajanni, Andrea Melegari. 185-202 [doi]
- A renewed approach to serious games for cyber securityAlexis Le Compte, David A. Elizondo, Tim Watson. 203-216 [doi]
- Exfiltrations using polymorphic blending techniques: Analysis and countermeasuresMatteo Casenove. 217-230 [doi]
- Attacking the baseband modem of mobile phones to breach the users' privacy and network securityChristos Xenakis, Christoforos Ntantogian. 231-244 [doi]