Default Cover Image

2017 International Conference on Cyber Conflict (CyCon U.S.)

Nov. 7 2017 to Nov. 8 2017

Washington, DC, USA

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Army cyber instituteFreely available from IEEE.pp. iii-iii
IntroductionFreely available from IEEE.pp. iv-iv
Paper review committee membersFreely available from IEEE.pp. v-v
AcknowledgmentFreely available from IEEE.pp. vi-vi
Table of contentsFreely available from IEEE.pp. vii-viii
Author indexFreely available from IEEE.pp. 119-119
Cyber security via formal methods: A framework for implementing formal methodsFull-text access may be available. Sign in or learn about subscription options.pp. 76-81
Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stabilityFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
1st Troll Battalion: Influencing military and strategic operations through cyber-personasFull-text access may be available. Sign in or learn about subscription options.pp. 97-104
Cyber terrain mission mapping: Tools and methodologiesFull-text access may be available. Sign in or learn about subscription options.pp. 105-111
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systemsFull-text access may be available. Sign in or learn about subscription options.pp. 112-118
A framework for cybersecurity assessments of critical port infrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A timing-based covert channel for SCADA networksFull-text access may be available. Sign in or learn about subscription options.pp. 8-15
Considerations for secure and resilient satellite architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 16-22
Take the rein of cyber deterrenceFull-text access may be available. Sign in or learn about subscription options.pp. 29-35
What might be predominant form of cyber conflict?Full-text access may be available. Sign in or learn about subscription options.pp. 36-44
Establishing volunteer US cyber defense units: A holistic approachFull-text access may be available. Sign in or learn about subscription options.pp. 45-58
One year after Warsaw: The growing need for a NATO cyber commandFull-text access may be available. Sign in or learn about subscription options.pp. 59-66
The control & capabilities test: How a new legal regime is shaping attribution in cyberspaceFull-text access may be available. Sign in or learn about subscription options.pp. 67-75
Showing 23 out of 23