Abstract is missing.
- Rethinking the data wheel: Automating open-access, public data on cyber conflictChristopher Whyte, Brandon Valeriano, Benjamin Jensen, Ryan Maness. 9-30 [doi]
- The cyber deterrence problemAaron F. Brantly. 31-54 [doi]
- Offensive cyber capabilities: To what ends?Max Smeets, Herbert S. Lin. 55-72 [doi]
- Understanding and countering cyber coercionQuentin E. Hodgson. 73-88 [doi]
- Targeting technology: Mapping military offensive network operationsDaniel Moore. 89-108 [doi]
- Drawing inferences from cyber espionageMartin C. Libicki. 109-122 [doi]
- The topography of cyberspace and its consequences for operationsBrad Bigelow. 123-138 [doi]
- Net neutrality in the context of cyber warfareKim Hartmann, Keir Giles. 139-158 [doi]
- The cyber decade: Cyber defence at a X-ing pointRobert Koch 0002, Mario Golling. 159-186 [doi]
- Aladdin's lamp: The theft and re-weaponization of malicious codeKarlis Podins, Kenneth Geers. 187-202 [doi]
- Cyber law and espionage law as communicating vesselsAsaf Lubin. 203-226 [doi]
- 1Krisztina Huszti-Orban. 227-244 [doi]
- From grey zone to customary international law: How adopting the precautionary principle may help crystallize the due diligence principle in cyberspacePeter Z. Stockburger. 245-262 [doi]
- Pressing pause: A new approach for international cybersecurity norm developmentCedric Sabbah. 263-282 [doi]
- Developing collaborative and cohesive cybersecurity legal principlesJeff Kosseff. 283-298 [doi]
- Utilizing air traffic communications for OSINT on state and government aircraftMartin Strohmeier, Matthew Smith 0006, Daniel Moser, Matthias Schäfer 0002, Vincent Lenders, Ivan Martinovic. 299-320 [doi]
- FeedRank: A tamper- resistant method for the ranking of cyber threat intelligence feedsRoland Meier, Cornelia Scherrer, David Gugelmann, Vincent Lenders, Laurent Vanbever. 321-344 [doi]
- HTTP security headers analysis of top one million websitesArturs Lavrenovs, F. Jesus Rubio Melon. 345-370 [doi]
- On the effectiveness of machine and deep learning for cyber securityGiovanni Apruzzese, Michele Colajanni, Luca Ferretti, Alessandro Guido, Mirco Marchetti. 371-390 [doi]
- Screen watermarking for data theft investigation and attributionDavid Gugelmann, David Sommer, Vincent Lenders, Markus Happe, Laurent Vanbever. 391-408 [doi]
- Neural network and blockchain based technique for cyber threat intelligence and situational awarenessRoman Graf, Ross King. 409-426 [doi]
- Mission-focused cyber situational understanding via graph analyticsSteven Noel, Paul D. Rowe, Stephen Purdy, Michael Limiero, Travis Lu, Will Mathews. 427-448 [doi]