Abstract is missing.
- Towards Measuring Global DDoS Attack CapacityArturs Lavrenovs. 1-15 [doi]
- Understanding the Strategic Implications of the Weaponization of Artificial IntelligenceJoe Burton, Simona R. Soare. 1-17 [doi]
- Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?Robert Koch 0004. 1-24 [doi]
- The Cyber-ASAT: On the Impact of Cyber Weapons in Outer SpaceJames Pavur, Ivan Martinovic. 1-18 [doi]
- NATO Members' Organizational Path Towards Conducting Offensive Cyber Operations: A Framework for AnalysisMax Smeets. 1-15 [doi]
- Applying Indications and Warning Frameworks to Cyber IncidentsBilyana Lilly, Lillian Ablon, Quentin E. Hodgson, Adam S. Moore. 1-21 [doi]
- SamSam and the Silent Battle of AtlantaKenneth Kraszewski. 1-16 [doi]
- Covert or not Covert: National Strategies During Cyber ConflictGil Baram, Udi Sommer. 1-16 [doi]
- Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and TheoryAlicia Bargar, Stephanie Pitts, Janis Butkevics, Ian McCulloh. 1-18 [doi]
- Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical InfrastructureDaniel Kapellmann, Rhyner Washburn. 1-23 [doi]
- "Silent Battle" Goes Loud: Entering a New Era of State-Avowed Cyber ConflictKeir Giles, Kim Hartmann. 1-13 [doi]
- The All-Purpose Sword: North Korea's Cyber Operations and StrategiesJi-Young Kong, Jong In Lim, Kyoung-Gon Kim. 1-20 [doi]
- BlackWidow: Monitoring the Dark Web for Cyber Security InformationMatthias Schäfer 0002, Markus Fuchs, Martin Strohmeier, Markus Engel, Marc Liechti, Vincent Lenders. 1-21 [doi]
- Hidden Risks to Cyberspace Security from Obsolete COTS SoftwareBarls Egemen Özkan, Serol Bulkan. 1-19 [doi]
- For a Baltic Cyberspace Alliance?Martin Libicki. 1-14 [doi]
- Recommendations for Enhancing the Results of Cyber EffectsErwin Orye, Olaf Manuel Maennel. 1-19 [doi]
- Addressing Adversarial Attacks Against Security Systems Based on Machine LearningGiovanni Apruzzese, Michele Colajanni, Luca Ferretti, Mirco Marchetti. 1-18 [doi]
- The Sound of Silence: International Law and the Governance of Peacetime Cyber OperationsBarrie Sander. 1-21 [doi]
- Detection of Malicious Remote Shell SessionsPierre Dumont, Roland Meier, David Gugelmann, Vincent Lenders. 1-20 [doi]
- Silent Battles: Towards Unmasking Hidden Cyber AttackRobert Koch 0002, Mario Golling. 1-20 [doi]
- The Rise of the Regionals: How Regional Organisations Contribute to International Cyber Stability Negotiations at the United Nations LevelNikolas Ott, Anna-Maria Osula. 1-25 [doi]
- Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity ExercisesJoonsoo Kim, Kyeongho Kim, Moonsu Jang. 1-19 [doi]
- What are Military Cyberspace Operations Other Than War?Brad Bigelow. 1-17 [doi]
- Machine Learninģ-based Detection of C&C Channels with a Focus on the Locked Shields Cyber Defense ExerciseNicolas Känzig, Roland Meier, Luca Gambazzi, Vincent Lenders, Laurent Vanbever. 1-19 [doi]
- Neural Network-Based Technique for Android Smartphone Applications ClassificationRoman Graf, Leon Aaron Kaplan, Ross King. 1-17 [doi]
- Rough-and-Ready: A Policy Framework to Determine if Cyber Deterrence is Working or FailingJason Healey, Neil Jenkins. 1-20 [doi]
- Layered Sovereignty: Adjusting Traditional Notions of Sovereignty to a Digital EnvironmentPrzemyslaw Roguski. 1-13 [doi]
- The Contours of 'Defend Forward' Under International LawJeff Kosseff. 1-13 [doi]
- Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative MeasuresGiuseppina Murino, Alessandro Armando, Armando Tacchella. 1-19 [doi]