An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
The Cyber Defense Review
Home
About CDR
Contact
Submit
The Journal
Current Issue
Cyber Defense Review
CDR Content
Articles
Blog Posts
Book Reviews
ACI
Search The Cyber Defense Review:
Home
>
CDR Content
>
CyCon US 2018 Conference Papers
Session 1
Combining Recurrence Quantification Analysis and Adaptive Clustering to Detect DDoS Attacks
SHA256: 1CB083B580B69FA0BD1352835BAE83CBFD2D78B64DEF568F4DF17CA9CAA65657
The Calculus of Protecting Interstate Competition from Cyber Attack
SHA256: 18F0B01A76E2C21EF6EFBAFDAFE4BF5447F9859A26E9CB6BEE2EE83E3CBB51B8
Critical Infrastructure Protection at the Local Level
SHA256: 680154F549994A13FE399E55915508F4474B466B02B0A7B22DA6F7FC9271796D
Session 2
Applies computational social choice theory as a framework for new cyber-threats
SHA256: DAB2902D5D073233B854214415220D00AD421CA425B7CAB065AC4418517887E8
Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums
SHA256: 6ACB15116544259FACD4A930F9437795CC3D79BFD034B14B4A9C631CEAD28004
Cyber Acquisition
SHA256: 9C9CBA431B8E401E399E5C2F80B61B1A311F0677B538FF6CCE1304E5374B8339
Session 3
United by Necessity: Conditions for Institutional Cooperation against Cybercrime
SHA256: 32AF484283263FD24C600C516AAFCC39B96AB8F319B0F6EE44AC9CD1253ADC4E
Feed the Bears, Starve the Trolls
SHA256: 4EBF4FA7CD98471DD5ACFF4841C636E8AF6EFF1A59C8D3FC457D4247CC07177A
Beyond the United Nations Group of Governmental Experts: Norms of Responsible Nation State Behavior in Cyberspace
SHA256: ABDA094B55863C8F7E952DEBAA32210F676173E50261F92F1E5F61818F7CD024
Session 4
A Model for Evaluating Fake News
SHA256: 1BFB3F92849CBD77C9F89FD290B094F66D7A881D892B5FF730A536BCCC18476A
Strategic Cyber: Responding to Russian Online Information Warfare
SHA256: FC7DA144F2518A78CC8E6FB4EAF5EF72EAAB5B2B03D8C5B46B0D8719F9F1B6D7
Fake news,(dis)information and principle of non-intervention
SHA256: 0B5D5C00FD76DFBA618AF86AB93FAC56FE54F71E1EC0003B570D84504C9D1DD3
Session 5
Defense Support to the Private Sector: New Concepts for DoD's National Cyber Defense Mission
SHA256: D69C315CE726AF0F984FEB3DE528E36A2FF48B37DDB66FB6A53D0FD977F7D024
Borders in Cyberspace: Stratigive Information Conflict since 9/11
SHA256: 04D7131451804B40F505659575CBFE71A25A5B3B9EF523EAADAEE7F9AC8565F5
Persistent Engagement, Agreed Competition, Cyberspace Interaction Dynamics and Escalation
SHA256: 2C50BA8AAC92FB8E81AE56858E53A52050071099F61A3A167AE92006809DBD1E
Help & Support
Contact Us
U.S. Army FAQs
Resources
Army A-Z
USA.gov
Legal
Accessibility
FOIA
No FEAR Act
Terms of Use
Other Army Sites
Army
Army Knowledge Online
Army National Guard
Army Reserve
Go Army
Other DOD Sites
Department of Defense
Forces Command
Installation Management Cmd
iSALUTE
Ready Army
Ready and Resilient