These proceedings represent the work of researchers participating in the 13th International Conference on Cyber Warfare and Security (ICCWS 2018) which is being hosted this year by the National Defense University in Washington DC, USA on 8-9 March 2018.
These proceedings represent the work of researchers participating in the 13th International Conference on Cyber Warfare and Security (ICCWS 2018) which is being hosted this year by the National Defense University in Washington DC, USA on 8 ...
13th International Conference on Cyber Warfare and Security (ICCWS 2018): Washington, DC, USA, 8-9 March 2018
ICCWS 2019 14th International Conference on Cyber Warfare and Security: ICCWS 2019
... automated or semi-automated system requires capabilities to maintain situational awareness. It has been seen as ... issues effectively and securely. AI-based or combined solutions such as the Industrial Internet of Things (IIoT) create ...
Power based on information resources is not new; cyberpower is (Nye Jr, 2010). Cyberpower is also defined as the strategic employment of information and communications technologies to enable economic growth, empower society and enhance ...
Lin, H. (2012) “Escalation Dynamics and Conflict Termination in Cyberspace”, Strategic Studies Quarterly, Fall 2012, pp.4670. Libicki, M. (2012) Crisis and Escalation in Cyberspace, Santa Monica, CA: Rand Corporation.
Deconstructing The Cyber Kill Chain. DARKReading, viewed 15th September 2019. Greene, T (2016). Why the cyber kill chain needs an upgrade.
contingency plan accounts for the current cybersecurity climate, however, legislation and frameworks should be reviewed as a precursor to the infrastructural development under the Policy to first create a secure cybersecurity ecosystem.
Curry, J. and Price, T. (2013): Dark Guest Training Games for Cyber Warfare Volume 1: Wargaming Internet Based Attacks (English Edition). Kindle Edition. Curry, J. and Price, T. (2017) Modern crises scenarios for matrix wargames.
Ben-Asher, N., Oltramari, A., Erbacher, R.F. & Gonzales, C. (2015) Ontology-based Adaptive Systems of Cyber Defense. ... Knight, S. & Leblanc S. (2009) When not to pull the plug – the need for network counter-surveillance operations.