Abstract is missing.
- NATO's new cyber domain challengeSiim Alatalu. 1-8 [doi]
- Suggestions to measure cyber power and proposed metrics for cyber warfare operations (cyberdeterrence/cyber power)Edwin L. Armistead. 9-15 [doi]
- Implications of cyber in anti-access and area-denial countersMichael J. Assante. 16-21 [doi]
- Crossing the rubicon: identifying and responding to an armed cyber-attackNerea M. Cal. 22-28 [doi]
- CMIDS: collaborative MANET intrusion detection systemJeronymo M. A. Carvalho, Paulo C. G. Costa. 29-33 [doi]
- Cyber workforce development using a behavioral cybersecurity paradigmBruce D. Caulkins, Karla A. Badillo-Urquiola, Patricia Bockelman, Rebecca A. Leis. 34-39 [doi]
- Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sectorAlfonso De Gregorio. 40-43 [doi]
- Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision makingJosiah A. B. S. Dykstra, Stephen R. Orr. 44-49 [doi]
- Cyber attacks: the fog of identityV. A. Greiman. 50-62 [doi]
- Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinkingElsa B. Kania. 69-85 [doi]
- Cyber defence information sharing in a federated networkH. Kantola, Margarita Levin Jaitner. 86-93 [doi]
- Cyber weapons: a profiling frameworkClara Maathuis, Wolter Pieters, Jan van den Berg. 94-101 [doi]
- Evaluating single board computer clusters for cyber operationsSuzanne J. Matthews, Raymond W. Blaine, Aaron F. Brantly. 102-109 [doi]
- Stigmatizing cyber war: mission impossible?Brian M. Mazanec, Patricia Shamai. 110-117 [doi]
- Extracting attack narratives from traffic datasetsJose David Mireles, Jin-Hee Cho, Shouhuai Xu. 118-123 [doi]
- Countering cyber threats: answers from international lawAnnachiara Rotondo. 124-130 [doi]
- Re-thinking threat intelligenceChar Sample, Jennifer Cowley, Tim Watson, Carsten Maple. 131-139 [doi]
- Cyber norms for civilian nuclear power plantsChristopher M. Spirito. 140-145 [doi]
- Sovereignty in cyberspace: Balkanization or democratizationAmaël Cattaruzza, Didier Danet, Stéphane Taillat, Arthur Laudrain. 146-154 [doi]
- Disruptive innovations to help protect against future threatsErnest Y. Wong, Nicholas M. Sambaluk. 155-159 [doi]
- Stuxnet as cyber-enabled sanctions enforcementPanayotis A. Yannakogeorgos, Eneken Tikk. 160-165 [doi]