Abstract is missing.
- Unpacking Cyber NeutralityScott Sullivan. 9-23 [doi]
- The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed ConflictYann L. Schmuki. 25-38 [doi]
- Obligations of Non-participating States When Hackers on Their Territory Engage in Armed ConflictsMarie Thøgersen. 39-54 [doi]
- Privatized Frontlines: Private-Sector Contributions in Armed ConflictTsvetelina J. van Benthem. 55-69 [doi]
- Business@War: The IT Companies Helping to Defend UkraineBilyana Lilly, Kenneth Geers, Greg Rattray, Robert Koch. 71-83 [doi]
- *Erica D. Lonergan, Margaret W. Smith, Grace B. Mueller. 85-102 [doi]
- The Irregulars: Third-Party Cyber Actors and Digital Resistance Movements in the Ukraine ConflictMargaret W. Smith, Thomas Dean. 103-119 [doi]
- Analytical Review of the Resilience of Ukraine's Critical Energy Infrastructure to Cyber Threats in Times of WarAndrii Davydiuk, Vitalii Zubok. 121-139 [doi]
- Digital Supply Chain Dependency and ResilienceLars Gjesvik, Azan Latif Khanyari, Haakon Bryhni, Alfred Arouna, Niels Nagelhus Schia. 141-160 [doi]
- Modeling 5G Threat Scenarios for Critical Infrastructure ProtectionGerrit Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud, Jean-Pascal Chavanne, Vincent Lenders. 161-180 [doi]
- Toward Mission-Critical AI: Interpretable, Actionable, and Resilient AIIgor Linkov, Kelsey Stoddard, Andrew Strelzoff, Stephanie Elisabeth Galaitsi, Jeffrey M. Keisler, Benjamin D. Trump, Alexander Kott, Pavol Bielik, Petar Tsankov. 181-197 [doi]
- Zero-Day Operational Cyber ReadinessBaris Egemen Ozkan, Ihsan B. Tolga. 199-215 [doi]
- AI-assisted Cyber Security Exercise Content Generation: Modeling a Cyber ConflictAlexandros Zacharis, Razvan Gavrila, Constantinos Patsakis, Demosthenes Ikonomou. 217-238 [doi]
- Request for a Surveillance Tower: Evasive Tactics in Cyber Defense ExercisesYoungJae Maeng, Mauno Pihelgas. 239-252 [doi]
- Towards Generalizing Machine Learning Models to Detect Command and Control Attack TrafficLina Gehri, Roland Meier, Daniel Hulliger, Vincent Lenders. 253-271 [doi]
- Human-centered Assessment of Automated Tools for Improved Cyber Situational AwarenessBenjamin Strickson, Cameron Worsley, Stewart Bertram. 273-286 [doi]
- Leveling the Playing Field: Equipping Ukrainian Freedom Fighters with Low-Cost Drone Detection CapabilitiesConner Bender, Jason Staggs. 287-312 [doi]
- Russian Invasion of Ukraine 2022: Time to Reconsider Small Drones?Aleksi Kajander. 313-327 [doi]
- Weaponizing Cross-Border Data Flows: An Opportunity for NATO?Matt Malone. 329-343 [doi]
- Limits on Information Operations Under International LawTalita Dias. 345-363 [doi]
- Seeing Through the Fog: The Impact of Information Operations on War Crimes Investigations in UkraineLindsay Freeman. 365-379 [doi]
- From Cyber Security to Cyber Power: Appraising the Emergence of 'Responsible, Democratic Cyber Power' in UK StrategyJoe Devanny, Andrew C. Dwyer. 381-397 [doi]
- Sharpening the Spear: China's Information Warfare Lessons from UkraineNate Beach-Westmoreland. 399-415 [doi]
- Cyber Diplomacy: NATO/EU Engaging with the Global SouthEduardo Izycki, Brett van Niekerk, Trishana Ramluckan. 417-435 [doi]