[图书][B] Weapons and the law of armed conflict

WH Boothby - 2016 - books.google.com
Bringing together the law of armed conflict governing the use of weapons into a single
volume, the fully updated Second Edition of Weapons and the Law of Armed Conflict …

Publicly attributing cyber attacks: a framework

FJ Egloff, M Smeets - Journal of Strategic Studies, 2023 - Taylor & Francis
When should states publicly attribute cyber intrusions? Whilst this is a question governments
increasingly grapple with, academia has hardly helped in providing answers. This article …

[PDF][PDF] Military operations in cyberspace

A Brantly, M Smeets - Handbook of military sciences, 2020 - Springer
Over the years, experts–both in and outside of the military–have repeatedly stated that we
need to improve our conceptual and doctrinal thinking when it comes to military cyber …

Static malware analysis using machine learning methods

HV Nath, BM Mehtre - Recent Trends in Computer Networks and …, 2014 - Springer
Malware analysis forms a critical component of cyber defense mechanism. In the last
decade, lot of research has been done, using machine learning methods on both static as …

Key terrain in cyberspace: Seeking the high ground

D Raymond, T Cross, G Conti… - 2014 6th International …, 2014 - ieeexplore.ieee.org
In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an
attacker or defender. When applied to geographic terrain, this definition is clear. Key terrain …

Revisiting cyber definition

R Azmi - European Conference on Cyber Warfare and …, 2019 - search.proquest.com
We often use the term cyber in many recent conversations and statements, as well as
various official documents, but understanding the meaning still leaves a question mark. The …

Malware is called malicious for a reason: The risks of weaponizing code

S Cobb, A Lee - 2014 6th international conference on cyber …, 2014 - ieeexplore.ieee.org
The allure of malware, with its tremendous potential to infiltrate and disrupt digital systems, is
understandable. Criminally motivated malware is now directed at all levels and corners of …

Assessment methodology for collateral damage and military (Dis) Advantage in cyber operations

C Maathuis, W Pieters… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
Cyber Operations stopped being utopia or Sci-Fi based scenarios: they became reality.
When planning and conducting them, military actors encounter difficulties since they lack …

Operational Decision-Making for Cyber Operations

M Smeets, JD Work - The Cyber Defense Review, 2020 - JSTOR
The decision-making behind cyber operations is complex. Dynamics around issues such as
cyber arsenal management, target assessment, and the timing of dropping a destructive …

Cyberspace Geography and Cyber Terrain: Challenges Producing a Universal map of Cyberspace

A Grandin - European Conference on Cyber …, 2023 - papers.academic-conferences.org
Much in the same way that cyber has become the fifth military domain, cyberspace has also
brought forth the research area of Cyberspace Geography. The challenge of producing a …