Abstract is missing.
- Retorsion as a Response to Ongoing Malign Cyber OperationsJeff Kosseff. 9-23 [doi]
- Collective Countermeasures in Cyberspace - Lex Lata, Progressive Development or a Bad Idea?Przemyslaw Roguski. 25-42 [doi]
- Up in the Air: Ensuring Government Data Sovereignty in the CloudNeal Kushwaha, Przemyslaw Roguski, Bruce W. Watson. 43-61 [doi]
- Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure ProtectionLivinus Obiora Nweke, Stephen D. Wolthusen. 63-78 [doi]
- Making the Cyber Mercenary - Autonomous Weapons Systems and Common Article 1 of the Geneva ConventionsAleksi Kajander, Agnes Kasper, Evhen Tsybulenko. 79-95 [doi]
- Cyber Weapons Review in Situations Below the Threshold of Armed ConflictIvana Kudlácková, David Wallace, Jakub Harasta. 97-112 [doi]
- R2P & Cyberspace: Sovereignty as a ResponsibilityTina J. Park, Michael Switzer. 113-127 [doi]
- The Past, Present, and Future of Russia's Cyber Strategy and ForcesBilyana Lilly, Joe Cheravitch. 129-155 [doi]
- Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian CrisisFrédérick Douzet, Louis Pétiniaud, Loqman Salamatian, Kevin Limonier, Kavé Salamatian, Thibaut Alchus. 157-182 [doi]
- Cyber in War: Assessing the Strategic, Tactical, and Operational Utility of Military Cyber OperationsMatthias Schulze. 183-197 [doi]
- Correlations Between Cyberspace Attacks and Kinetic AttacksMartin C. Libicki. 199-213 [doi]
- Problems of Poison: New Paradigms and "Agreed" Competition in the Era of AI-Enabled Cyber OperationsChristopher Whyte. 215-232 [doi]
- The Next Generation of Cyber-Enabled Information WarfareKim Hartmann, Keir Giles. 233-250 [doi]
- Defenders Disrupting Adversaries: Framework, Dataset, and Case Studies of Disruptive Counter-Cyber OperationsJason Healey, Neil Jenkins, J. D. Work. 251-274 [doi]
- Using Global Honeypot Networks to Detect Targeted ICS AttacksMichael Dodson, Alastair R. Beresford, Mikael Vingaard. 275-291 [doi]
- Addressing the Cybersecurity Challenges of Electrical Power Systems of the FutureGilberto Pires de Azevedo, Paulo César Pellanda, Maxli Barroso Campos. 293-308 [doi]
- Towards Classifying Devices on the Internet Using Artificial IntelligenceArturs Lavrenovs, Roman Graf, Kimmo Heinäaro. 309-325 [doi]
- Hacking the AI - the Next Generation of Hijacked SystemsKim Hartmann, Christoph Steup. 327-349 [doi]
- Recent Developments in CryptographyLubjana Beshaj, Andrew O. Hall. 351-368 [doi]