The Virtual Battlefield: Perspectives on Cyber Warfare

作者: K Geers , C Czosseck , None

DOI:

关键词:

摘要: Part I. Strategic Viewpoints. Cyber Wars: A Paradigm Shift from Means to Ends / A. Sharma Towards an Evolving Theory of Cyberpower S.H. Starr Sub Rosa War M.C. Libicki Warfare and the Continuum Risks: Policy Perspective Cutts Terrorism: New Dimension in Battlespace J.P.I.A.G. Charvat Borders Cyberspace: Can Sovereignty Adapt Challenges Security? F. Hare a Global Regime for R. Hughes. What Analogies Tell Us About Future Cybersecurity D. Sulek N. Moran The Information Sphere Domain - Increasing Understanding Cooperation P.D. Allen D.P. Gilbert Jr. Sun Tzu Was Hacker: An Examination Tactics Operations Real World Attack B.K. Rios Belarus Context European Security Pavlyuchenko Politically Motivated Denial Service Attacks J. Nazario Brief Media Coverage Cyberattacks (2007 Present) C. Farivar II. Technical Solutions Behavioral Analysis Zombie Armies O. Thonnard, W. Mees M. Dacier Proactive Botnet Countermeasures Offensive Approach Leder, T. Werner P. Martini When Not Pull Plug Need Network Counter-Surveillance S. Knight Leblanc Autonomic Computer Defence Using Risk State Reinforcement Learning L. Beaudoin, Japkowicz Matwin Enhancing Graph-Based Automated DoS Response G. Klein, Jahnke, Tolle On nth Order Bilar Business Social Evaluation View Scaling Economic Counter-Measures L.-F. Pau Virtual Plots, Revolution Temmingh K. Geers.

参考文章(70)
S. Morgenthaler, Robustness in Statistics International Encyclopedia of the Social & Behavioral Sciences. pp. 13379- 13385 ,(2001) , 10.1016/B0-08-043076-7/00495-2
Robert Hogan, Biff Baker, Need to Share Proceedings of the Marine Safety & Security Council. ,vol. 63, ,(2006)
Mike Wawrzoniak, David A. Maltz, Richard Mortier, Srikanth Kandula, Paramvir Bahl, Richard Black, Rebecca Isaacs, Ranveer Chandra, Paul Barham, John MacCormick, Moisés Goldszmidt, Ming Zhang, Lun Li, Discovering Dependencies for Network Management. HotNets. ,(2006)
Paul Barford, Vinod Yegneswaran, An Inside Look at Botnets Advances in Information Security. pp. 171- 191 ,(2007) , 10.1007/978-0-387-44599-1_8
Paul Bracken, Net Assessment: A Practical Guide Parameters. ,vol. 36, pp. 90- ,(2006)
M. Elaine Bunn, Can deterrence be tailored ,(2007)
David Signori, John S. Hollywood, Daniel Gonzales, Gina Kingston, Network-centric operations case study : air-to-air combat with and without Link 16 ,(2005)