ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2018 10th International Conference on Cyber Conflict (CyCon)
Latest Publications
TOTAL DOCUMENTS
29
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By IEEE
9789949990429, 9789949990436
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
HTTP security headers analysis of top one million websites
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405025
◽
2018
◽
Cited By ~ 5
Author(s):
Arturs Lavrenovs
◽
F. Jesus Rubio Melon
Download Full-text
Offensive cyber capabilities: To what ends?
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405010
◽
2018
◽
Cited By ~ 2
Author(s):
Max Smeets
◽
Herbert S. Lin
Download Full-text
Rethinking the data wheel: Automating open-access, public data on cyber conflict
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405008
◽
2018
◽
Author(s):
Christopher Whyte
◽
Brandon Valeriano
◽
Benjamin Jensen
◽
Ryan Maness
Keyword(s):
Open Access
◽
Public Data
◽
Cyber Conflict
Download Full-text
On the effectiveness of machine and deep learning for cyber security
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405026
◽
2018
◽
Cited By ~ 32
Author(s):
Giovanni Apruzzese
◽
Michele Colajanni
◽
Luca Ferretti
◽
Alessandro Guido
◽
Mirco Marchetti
Keyword(s):
Deep Learning
◽
Cyber Security
Download Full-text
Cyber law and espionage law as communicating vessels
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405018
◽
2018
◽
Author(s):
Asaf Lubin
Keyword(s):
Cyber Law
Download Full-text
Aladdin's lamp: The theft and re-weaponization of malicious code
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405017
◽
2018
◽
Author(s):
Karlis Podins
◽
Kenneth Geers
Keyword(s):
Malicious Code
Download Full-text
Pressing pause: A new approach for international cybersecurity norm development
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405021
◽
2018
◽
Cited By ~ 1
Author(s):
Cedric Sabbah
Keyword(s):
New Approach
Download Full-text
Net neutrality in the context of cyber warfare
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405015
◽
2018
◽
Cited By ~ 1
Author(s):
Kim Hartmann
◽
Keir Giles
Keyword(s):
Net Neutrality
◽
Cyber Warfare
Download Full-text
Drawing inferences from cyber espionage
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405013
◽
2018
◽
Cited By ~ 2
Author(s):
Martin C. Libicki
Keyword(s):
Cyber Espionage
Download Full-text
Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement1
2018 10th International Conference on Cyber Conflict (CyCon)
◽
10.23919/cycon.2018.8405019
◽
2018
◽
Author(s):
Krisztina Huszti-Orban
Keyword(s):
Self Regulation
◽
Counter Terrorism
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close