Now showing items 11-15 of 15

    • Learning legal principles to enable law at cyber speeds 

      Finlayson, Mark A. (Explorations in Cyber International Relations, 2011-12-07)
      Goal: Law at Cyber Speeds. If we are to enable the creation of Automatic Cyber Targeting Systems to respond in network time to cyberattacks, we must be able to do legal analyses at network speeds
    • Representing cyberspace using taxonomies and meta-data analysis 

      Elbait, Gihan Daw (Explorations in Cyber International Relations, 2011-12-07)
      Problem: Modeling and mapping the landscapes of emerging research fields, such as cyberspace. • Most research fields are composed of many subfields which are related in intricate ways, therefore structural organization ...
    • Understanding “Cyber Conflict” 

      Shukla, Aadya (Explorations in Cyber International Relations., 2012-11-06)
      Problem: Emergence of cyber as the new arena for conflict raises three basic questions: (a) What qualifies as a Cyber Conflict? (multiple definitions exist); (b) Does intervention of cyber in conflict life-cycle requires ...
    • When virtual issues become real world actions 

      Houghton, James (Explorations in Cyber International Relations, 2012-11-06)
    • Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR) 

      Rady, Mina (Explorations in Cyber International Relations, 2012-11-06)
      Anonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. ...