Posters
© 2022 Massachusetts Institute of Technology.
This material is based upon work supported by the Office of Naval Research under Grant No. N00014-09-1-0597. Disclaimer: Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.
Recent Submissions
-
Design of action and alliance strategy in defense against anonymous cyber threats
(Explorations in Cyber International Relations, 2014-01-06)Anonymity, a major feature of the cyberspace, is a common channel to a multitude of threats. Despite efforts to defend against anonymous threats, their rapid evolution challenges the sustainability of any designed strategy ... -
The dynamics of managing undersea cables: When solution becomes the problem
(Explorations in Cyber International Relations, 2012-11-06)In the U.S., approximately 95% of all international Internet and phone traffic travels via undersea cables. Nearly all government traffic, including sensitive diplomatic and military orders, travels these cables to reach ... -
Cyber defense resources & vulnerabilities
(Explorations in Cyber International Relations, 2012-11-06)Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on ...