Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CYCON-U-S
CYCON-U-S 2017
Generate Citations
2017 International Conference on Cyber Conflict (CyCon U.S.)
Nov. 7 2017 to Nov. 8 2017
Washington, DC, USA
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Army cyber institute
Freely available from IEEE.
pp. iii-iii
Introduction
Freely available from IEEE.
pp. iv-iv
Paper review committee members
Freely available from IEEE.
pp. v-v
Acknowledgment
Freely available from IEEE.
pp. vi-vi
Table of contents
Freely available from IEEE.
pp. vii-viii
Author index
Freely available from IEEE.
pp. 119-119
Cyber security via formal methods: A framework for implementing formal methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-81
by
Joey Rivera
Proactive identification of exploits in the wild through vulnerability mentions online
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-88
by
Mohammed Almukaynizi
,
Eric Nunes
,
Krishna Dharaiya
,
Manoj Senguttuvan
,
Jana Shakarian
,
Paulo Shakarian
Quantum technologies, U.S.-China strategic competition, and future dynamics of cyber stability
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
Elsa B. Kania
,
John K. Costello
1st Troll Battalion: Influencing military and strategic operations through cyber-personas
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-104
by
Stephen W. Hart
,
Mark C. Klink
Cyber terrain mission mapping: Tools and methodologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-111
by
Jeffrey Guion
,
Mark Reith
Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-118
by
Rock Stevens
A framework for cybersecurity assessments of critical port infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Daniel Trimble
,
Jonathon Monken
,
Alexander F. L. Sand
A timing-based covert channel for SCADA networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-15
by
Antoine Lemay
,
Scott Knight
Considerations for secure and resilient satellite architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-22
by
John M. Willis
,
Robert F. Mills
,
Logan O. Mailloux
,
Scott R. Graham
Solving the fiscal challenge of real-time cyber capability development: How low-cost cyber capability development can be accelerated through the use of Operations and Maintenance funds and what congress can do to help
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-28
by
Rebecca K. Lively
,
Maj Sara Dayton Curran
Take the rein of cyber deterrence
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-35
by
Jim Q. Chen
What might be predominant form of cyber conflict?
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-44
by
Jason Healey
Establishing volunteer US cyber defense units: A holistic approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-58
by
Monica M. Ruiz
One year after Warsaw: The growing need for a NATO cyber command
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-66
by
Siim Alatalu
The control & capabilities test: How a new legal regime is shaping attribution in cyberspace
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-75
by
Peter Z. Stockburger
Showing 23 out of 23