Posters: Recent submissions
Now showing items 4-6 of 15
-
Cyber mission assurance using STPA
(Explorations in Cyber International Relations, 2012-11-06)From Cyber Security to Mission Assurance: Improving Campaign Mission Assurance. How can we complete campaign mission across a wide range of degradations? Current gaps: 1) Emergent system properties ignored 2) Assurance ... -
Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR)
(Explorations in Cyber International Relations, 2012-11-06)Anonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. ... -
When virtual issues become real world actions
(Explorations in Cyber International Relations, 2012-11-06)