default search action
Cyber Warfare 2015
- Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 - Sanjay Goel, Yuan Hong:
Cyber War Games: Strategic Jostling Among Traditional Adversaries. 1-13 - Robert J. Elder, Alexander H. Levis, Bahram Yousefi:
Alternatives to Cyber Warfare: Deterrence and Assurance. 15-35 - Patrick Sweeney, George Cybenko:
Identifying and Exploiting the Cyber High Ground for Botnets. 37-56 - Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. 57-80 - Christopher Kiekintveld, Viliam Lisý, Radek Píbil:
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. 81-101 - Kristin E. Heckman, Frank J. Stech:
Cyber Counterdeception: How to Detect Denial & Deception (D&D). 103-140 - Samuel N. Hamilton:
Automated Adversary Profiling. 141-149 - Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons:
Cyber Attribution: An Argumentation-Based Approach. 151-171 - Julie L. Marble, William F. Lawless, Ranjeev Mittu, Joseph T. Coyne, Myriam Abramson, Ciara Sibley:
The Human Factor in Cybersecurity: Robust & Intelligent Defense. 173-206 - Noam Ben-Asher, Cleotilde Gonzalez:
CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War. 207-220 - Rami Puzis, Yuval Elovici:
Active Discovery of Hidden Profiles in Social Networks Using Malware. 221-235 - Napoleon C. Paxton, Stephen Russell, Ira S. Moskowitz, Paul Hyden:
A Survey of Community Detection Algorithms Based On Analysis-Intent. 237-263 - Tudor Dumitras:
Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks. 265-285 - B. Aditya Prakash:
Graph Mining for Cyber Security. 287-306 - Andrew Ruef, Chris Rohlf:
Programming Language Theoretic Security in the Real World: A Mirage or the Future? 307-321
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.