Conference Proceedings: Recent submissions
Now showing items 13-15 of 29
-
Cyber politics: Understanding the use of social media for dissident movements in an integrated state stability framework
(© IEEE, 2012-08-19)Recent events in North Africa and the Gulf States have highlighted both the fragility of states worldwide and the ability of coordinated dissidents to challenge or topple regimes. The common processes of ‘loads’ generated ... -
Untangling attribution
(© National Academy of Sciences, 2010-01-01)In February 2010, former NSA Director Mike McConnell wrote that, “We need to develop an early- warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can ... -
The problem isn't attribution: It's multi-stage attacks
(© Association for Computing Machinery, New York, NY, USA, 2010-11-30)As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at ...