Browsing Posters by Issue Date
Now showing items 1-15 of 15
-
Escalation management in cyber conflict: A research proposal
(Explorations in Cyber International Relations, 2011-12-07)Research Questions • Under what conditions is cyber conflict most likely to lead to uncontrolled escalation? • Under what conditions is cyber conflict likely to lead to escalation in other domains (conventional, nuclear)? • ... -
Finding order in a contentious Internet
(Explorations in Cyber International Relations, 2011-12-07)In 1998 an attempt to remove an offensive video blocked YouTube for most of the Internet...network operators resolved the issue in three hours. Spamhaus disseminates authoritative spam blocking lists, performing a vetting ... -
Representing cyberspace using taxonomies and meta-data analysis
(Explorations in Cyber International Relations, 2011-12-07)Problem: Modeling and mapping the landscapes of emerging research fields, such as cyberspace. • Most research fields are composed of many subfields which are related in intricate ways, therefore structural organization ... -
The dynamics of managing undersea cables
(Explorations in Cyber International Relations, 2011-12-07)Problem: Can the Old Modes of Governance Meet the New Demands of the Internet? The exponential growth of the Internet may soon demand that undersea cable deployment happen as quickly as possible. Legacy institutional ... -
The Coordinates of cyber international relations
(Explorations in Cyber International Relations, 2011-12-07)As the Internet and International Relations become increasingly interwoven, the properties of information goods such as information security, control, or freedom, or those of international activities such as trade, or ... -
Comparative analysis of cybersecurity metrics to develop new hypotheses
(Explorations in Cyber International Relations, 2011-12-07)Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. ... -
Learning legal principles to enable law at cyber speeds
(Explorations in Cyber International Relations, 2011-12-07)Goal: Law at Cyber Speeds. If we are to enable the creation of Automatic Cyber Targeting Systems to respond in network time to cyberattacks, we must be able to do legal analyses at network speeds -
Diversity of user experience and alternative future internets
(Explorations in Cyber International Relations, 2012-11-06)One of the primary objectives of the ECIR project is to understand what forms the future Internet may take. This requires identification of the levers, constraints, and conditions under which each scenario may evolve. -
The dynamics of managing undersea cables: When solution becomes the problem
(Explorations in Cyber International Relations, 2012-11-06)In the U.S., approximately 95% of all international Internet and phone traffic travels via undersea cables. Nearly all government traffic, including sensitive diplomatic and military orders, travels these cables to reach ... -
Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR)
(Explorations in Cyber International Relations, 2012-11-06)Anonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. ... -
When virtual issues become real world actions
(Explorations in Cyber International Relations, 2012-11-06) -
Cyber mission assurance using STPA
(Explorations in Cyber International Relations, 2012-11-06)From Cyber Security to Mission Assurance: Improving Campaign Mission Assurance. How can we complete campaign mission across a wide range of degradations? Current gaps: 1) Emergent system properties ignored 2) Assurance ... -
Cyber defense resources & vulnerabilities
(Explorations in Cyber International Relations, 2012-11-06)Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on ... -
Understanding “Cyber Conflict”
(Explorations in Cyber International Relations., 2012-11-06)Problem: Emergence of cyber as the new arena for conflict raises three basic questions: (a) What qualifies as a Cyber Conflict? (multiple definitions exist); (b) Does intervention of cyber in conflict life-cycle requires ... -
Design of action and alliance strategy in defense against anonymous cyber threats
(Explorations in Cyber International Relations, 2014-01-06)Anonymity, a major feature of the cyberspace, is a common channel to a multitude of threats. Despite efforts to defend against anonymous threats, their rapid evolution challenges the sustainability of any designed strategy ...