Now showing items 13-15 of 15

    • Understanding “Cyber Conflict” 

      Shukla, Aadya (Explorations in Cyber International Relations., 2012-11-06)
      Problem: Emergence of cyber as the new arena for conflict raises three basic questions: (a) What qualifies as a Cyber Conflict? (multiple definitions exist); (b) Does intervention of cyber in conflict life-cycle requires ...
    • When virtual issues become real world actions 

      Houghton, James (Explorations in Cyber International Relations, 2012-11-06)
    • Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR) 

      Rady, Mina (Explorations in Cyber International Relations, 2012-11-06)
      Anonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. ...