Abstract is missing.
- The Role of Military Cyber Exercises: A Case Study of Locked ShieldsMax Smeets. 9-25 [doi]
- Cyber Resilience versus Cybersecurity as Legal AspirationLee A. Bygrave. 27-43 [doi]
- Public-Private Partnerships and Collective Cyber DefenceJohn Morgan Salomon. 45-63 [doi]
- Obnoxious DeterrenceMartin C. Libicki. 65-77 [doi]
- The Promise and Perils of Allied Offensive Cyber OperationsErica D. Lonergan, Mark Montgomery. 79-92 [doi]
- 1 Disruption of the Ransomware Ecosystem Through Offensive Cyber OperationsMichael Bátrla, Jakub Harasta. 93-115 [doi]
- Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber OperationsMiguel Alberto Gomez, Gregory Winger. 117-134 [doi]
- Machine Expertise in the Loop: Artificial Intelligence Decision-Making Inputs and Cyber ConflictChristopher E. Whyte. 135-154 [doi]
- Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of ExploitationLennart Maschmeyer. 155-171 [doi]
- 'Responsibility to Detect?': Autonomous Threat Detection and its Implications for Due Diligence in CyberspaceArun Mohan Sukumar. 173-187 [doi]
- Exploring Changing Battlefields: Autonomous Weapons, Unintended Engagements and the Law of Armed ConflictTsvetelina J. van Benthem. 190-204 [doi]
- Legal Aspects of Misattribution Caused by Cyber DeceptionPetr Stejskal, Martin Faix. 205-218 [doi]
- Military Data and Information Sharing - a European Union PerspectiveSebastian Cymutta, Marten Zwanenburg, Paul Oling. 219-234 [doi]
- Cyber Threats Against and in the Space Domain: Legal RemediesSeth W. Dilworth, D. Daniel Osborne. 235-247 [doi]
- Maritime Hacking Using Land-Based SkillsMichael L. Thomas. 249-263 [doi]
- A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway SystemMikko Kiviharju, Christina Lassfolk, Sanna Rikkonen, Hannu H. Kari. 265-284 [doi]
- Security and Privacy Issues of Satellite Communication in the Avlatlon DomainGeorg Baselt, Martin Strohmeier, James Pavur, Vincent Lenders, Ivan Martinovic. 285-307 [doi]
- Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus SecuritySampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Garikayi Madzudzo, Andrei V. Petrovski. 309-330 [doi]
- Towards a Digital Twin of a Complex Maritime Site for Multi-Objective OptimizationJoseph A. J. Ross, Kimberly Tam, David J. Walker, Kevin D. Jones. 331-345 [doi]
- The Design of Cyber-Physical Exercises (CPXS)Siddhant Shrivastava, Francisco Furtado, Mark Goh, Aditya Mathur. 348-366 [doi]
- Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution ProposalEmre Halisdemir, Hacer Karacan, Mauno Pihelgas, Toomas Lepik, Sungbaek Cho. 367-383 [doi]
- JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat IntelligenceChristopher Molloy, Philippe Charland, Steven H. H. Ding, Benjamin C. M. Fung. 385-403 [doi]
- Emergence of 5G Networks and Implications for Cyber ConflictKeir Giles, Kim Hartmann. 405-419 [doi]