Conference "ISR", 17-18 April 2013, London, UK, http://www.smi-online.co.uk/defence/uk/isr
eConflicts is a blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, cybercrime, political science and international relations
Total Pageviews
Wednesday, February 6, 2013
Conference - Military Space
Conference - "Military Space", 10-11 April 2013, London, UK, http://www.smi-online.co.uk/defence/uk/milspace
Conference - Order and Chaos
Conference - "Order and Chaos: crisis management and the challenges of the extreme and rare events", 20th March 2013, London, UK, http://www.smi-online.co.uk/defence/uk/masterclass/order-and-chaos-crisis-management-and-the-challenges-of-the-extreme-and-rare-event
Conference - Social Media for Operations
Conference - "Social Media for Operations", 27th February 2013, Amsterdam, Netherlands, http://www.smi-online.co.uk/defence/europe/workshop/social-media-for-operations
Conference - Social media within the military and the defence sector
Conference: "Social media within the military and the defence sector", 25-26 february 2013, Amsterdam. http://www.smi-online.co.uk/defence/europe/social-media-within-the-military-and-defence-sector-europe
Monday, January 7, 2013
News - 2012 Conference Proceedings
CCDCOE 2012 Conference on “Military and Paramilitary Activities in Cyberspace”. Proceedings are now available : http://www.ccdcoe.org/publications/2012proceedings/CyCon_2012_Proceedings.pdf
Content:
Chapter 1: Cyberspace – The Role of States in the Global Structure
Legal Implications of Territorial Sovereignty in Cyberspace by Wolff Heintschel von HeineggWhen “Not My Problem” Isn’t Enough: Political Neutrality and National Responsibility in Cyber Conflict by Jason Healey
Neutrality in Cyberspace by Wolff Heintschel von Heinegg
Impact of Cyberspace on Human Rights and Democracy by Vittorio Fanchiotti / Jean Paul Pierini
Chapter 2: Cyber Policy & Strategic Options
Russia’s Public Stance on Cyber/Information Warfare by Keir Giles
French Cyberdefense Policy by Patrice Tromparent
A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations by Louise ArimatsuInternet as a Critical Infrastructure – A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere by Assaf Y. Keren, Keren Elazari
The Significance of Attribution to Cyberspace Coercion: A Political Perspective by Forrest Hare
The Militarisation of Cyberspace: Why Less May Be Better by Myriam Dunn Cavelty
Chapter 3: Cyber Conflict – Theory & Principles
Beyond Domains, Beyond Commons: The Context and Theory of Conflict in Cyberspaceby Jeffrey L. Caton
Applying Traditional Military Principles to Cyber Warfare by Samuel Liles, J. Eric Dietz, Marcus Rogers, Dean LarsonThe Principle of Maneuver in Cyber Operations by Scott D. Applegate
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy by David T. FahrenkrugAn Analysis For A Just Cyber Warfare by Mariarosaria Taddeo
Chapter 4: Cyber Conflict – Actors Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present? by Birgy Lorenz, Kaido KikkasThe Notion of Combatancy in Cyber Warfare by Sean Watts
Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States? by Jody Prescott
Chapter 5: “Cyber-Attacks” – Trends, Methods & Legal Classification
Attack Trends in Present Computer Networks by Robert Koch, Björn Stelte, Mario Golling
“Attack” as a Term of Art in International Law: The Cyber Operations Context by Michael N. Schmitt
Ius ad bellum in Cyberspace – Some Thoughts on the “Schmitt-Criteria” for Use of Force by Katharina ZiolkowskiThe “Use of Force” in Cyberspace: A Reply to Dr Ziolkowski by Michael N. Schmitt
A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict by Robert Fanelli, Gregory Conti
Command and Control of Cyber Weapons by Enn Tyugu
A Case Study on the Miner Botnet by Daniel Plohmann, Elmar Gerhards-Padilla
Chapter 6: Cyber Defence – Methods & Tools
Natural Privacy Preservation Protocol for Electronic Mail by Kim Hartmann, Christoph Steup
Paradigm Change of Vehicle Cyber-Security by Hiro Onishi
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning by Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
The Role of COTS Products for High Security Systems by Robert Koch, Gabi Dreo Rodosek
Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships by
Diego Fernández Vázquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid
Legal Implications of Territorial Sovereignty in Cyberspace by Wolff Heintschel von HeineggWhen “Not My Problem” Isn’t Enough: Political Neutrality and National Responsibility in Cyber Conflict by Jason Healey
Neutrality in Cyberspace by Wolff Heintschel von Heinegg
Impact of Cyberspace on Human Rights and Democracy by Vittorio Fanchiotti / Jean Paul Pierini
Chapter 2: Cyber Policy & Strategic Options
Russia’s Public Stance on Cyber/Information Warfare by Keir Giles
French Cyberdefense Policy by Patrice Tromparent
A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations by Louise ArimatsuInternet as a Critical Infrastructure – A Framework for the Measurement of Maturity and Awareness in the Cyber Sphere by Assaf Y. Keren, Keren Elazari
The Significance of Attribution to Cyberspace Coercion: A Political Perspective by Forrest Hare
The Militarisation of Cyberspace: Why Less May Be Better by Myriam Dunn Cavelty
Chapter 3: Cyber Conflict – Theory & Principles
Beyond Domains, Beyond Commons: The Context and Theory of Conflict in Cyberspaceby Jeffrey L. Caton
Applying Traditional Military Principles to Cyber Warfare by Samuel Liles, J. Eric Dietz, Marcus Rogers, Dean LarsonThe Principle of Maneuver in Cyber Operations by Scott D. Applegate
Countering the Offensive Advantage in Cyberspace: An Integrated Defensive Strategy by David T. FahrenkrugAn Analysis For A Just Cyber Warfare by Mariarosaria Taddeo
Chapter 4: Cyber Conflict – Actors Socially Engineered Commoners as Cyber Warriors - Estonian Future or Present? by Birgy Lorenz, Kaido KikkasThe Notion of Combatancy in Cyber Warfare by Sean Watts
Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States? by Jody Prescott
Chapter 5: “Cyber-Attacks” – Trends, Methods & Legal Classification
Attack Trends in Present Computer Networks by Robert Koch, Björn Stelte, Mario Golling
“Attack” as a Term of Art in International Law: The Cyber Operations Context by Michael N. Schmitt
Ius ad bellum in Cyberspace – Some Thoughts on the “Schmitt-Criteria” for Use of Force by Katharina ZiolkowskiThe “Use of Force” in Cyberspace: A Reply to Dr Ziolkowski by Michael N. Schmitt
A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict by Robert Fanelli, Gregory Conti
Command and Control of Cyber Weapons by Enn Tyugu
A Case Study on the Miner Botnet by Daniel Plohmann, Elmar Gerhards-Padilla
Chapter 6: Cyber Defence – Methods & Tools
Natural Privacy Preservation Protocol for Electronic Mail by Kim Hartmann, Christoph Steup
Paradigm Change of Vehicle Cyber-Security by Hiro Onishi
Sensing for Suspicion at Scale: A Bayesian Approach for Cyber Conflict Attribution and Reasoning by Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James
The Role of COTS Products for High Security Systems by Robert Koch, Gabi Dreo Rodosek
Conceptual Framework for Cyber Defense Information Sharing within Trust Relationships by
Diego Fernández Vázquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid
Monday, December 31, 2012
Subscribe to:
Posts (Atom)