Now showing items 1-15 of 15

    • Comparative analysis of cybersecurity metrics to develop new hypotheses 

      Fisher, D.; Madnick, Stuart E.; Choucri, Nazli; Li, X.; Ferwerda, J. (Explorations in Cyber International Relations, 2011-12-07)
      Few Internet security organizations provide comprehensive, detailed, and reliable quantitative metrics, especially in the international perspective across multiple countries, multiple years, and multiple categories. ...
    • The Coordinates of cyber international relations 

      Vaishnav, Chintan (Explorations in Cyber International Relations, 2011-12-07)
      As the Internet and International Relations become increasingly interwoven, the properties of information goods such as information security, control, or freedom, or those of international activities such as trade, or ...
    • Cyber defense resources & vulnerabilities 

      Wolff, Josephine (Explorations in Cyber International Relations, 2012-11-06)
      Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on ...
    • Cyber mission assurance using STPA 

      Young, William E. (Explorations in Cyber International Relations, 2012-11-06)
      From Cyber Security to Mission Assurance: Improving Campaign Mission Assurance. How can we complete campaign mission across a wide range of degradations? Current gaps: 1) Emergent system properties ignored 2) Assurance ...
    • Design of action and alliance strategy in defense against anonymous cyber threats 

      Rady, Mina (Explorations in Cyber International Relations, 2014-01-06)
      Anonymity, a major feature of the cyberspace, is a common channel to a multitude of threats. Despite efforts to defend against anonymous threats, their rapid evolution challenges the sustainability of any designed strategy ...
    • Diversity of user experience and alternative future internets 

      Clark, David D.; Hung, Shirley (Explorations in Cyber International Relations, 2012-11-06)
      One of the primary objectives of the ECIR project is to understand what forms the future Internet may take. This requires identification of the levers, constraints, and conditions under which each scenario may evolve.
    • The dynamics of managing undersea cables 

      Sechrist, Michael; Vaishnav, Chintan; Goldsmith, Daniel (Explorations in Cyber International Relations, 2011-12-07)
      Problem: Can the Old Modes of Governance Meet the New Demands of the Internet? The exponential growth of the Internet may soon demand that undersea cable deployment happen as quickly as possible. Legacy institutional ...
    • The dynamics of managing undersea cables: When solution becomes the problem 

      Sechrist, Michael; Vaishnav, Chintan; Goldsmith, Daniel; Choucri, Nazli (Explorations in Cyber International Relations, 2012-11-06)
      In the U.S., approximately 95% of all international Internet and phone traffic travels via undersea cables. Nearly all government traffic, including sensitive diplomatic and military orders, travels these cables to reach ...
    • Escalation management in cyber conflict: A research proposal 

      Reardon, Robert (Explorations in Cyber International Relations, 2011-12-07)
      Research Questions • Under what conditions is cyber conflict most likely to lead to uncontrolled escalation? • Under what conditions is cyber conflict likely to lead to escalation in other domains (conventional, nuclear)? • ...
    • Finding order in a contentious Internet 

      Sowell, Jesse (Explorations in Cyber International Relations, 2011-12-07)
      In 1998 an attempt to remove an offensive video blocked YouTube for most of the Internet...network operators resolved the issue in three hours. Spamhaus disseminates authoritative spam blocking lists, performing a vetting ...
    • Learning legal principles to enable law at cyber speeds 

      Finlayson, Mark A. (Explorations in Cyber International Relations, 2011-12-07)
      Goal: Law at Cyber Speeds. If we are to enable the creation of Automatic Cyber Targeting Systems to respond in network time to cyberattacks, we must be able to do legal analyses at network speeds
    • Representing cyberspace using taxonomies and meta-data analysis 

      Elbait, Gihan Daw (Explorations in Cyber International Relations, 2011-12-07)
      Problem: Modeling and mapping the landscapes of emerging research fields, such as cyberspace. • Most research fields are composed of many subfields which are related in intricate ways, therefore structural organization ...
    • Understanding “Cyber Conflict” 

      Shukla, Aadya (Explorations in Cyber International Relations., 2012-11-06)
      Problem: Emergence of cyber as the new arena for conflict raises three basic questions: (a) What qualifies as a Cyber Conflict? (multiple definitions exist); (b) Does intervention of cyber in conflict life-cycle requires ...
    • When virtual issues become real world actions 

      Houghton, James (Explorations in Cyber International Relations, 2012-11-06)
    • Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR) 

      Rady, Mina (Explorations in Cyber International Relations, 2012-11-06)
      Anonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. ...