Search
Now showing items 1-7 of 7
Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR)
(Explorations in Cyber International Relations, 2012-11-06)
Anonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. ...
When virtual issues become real world actions
(Explorations in Cyber International Relations, 2012-11-06)
Diversity of user experience and alternative future internets
(Explorations in Cyber International Relations, 2012-11-06)
One of the primary objectives of the ECIR project is to understand what forms the future Internet may take. This requires identification of the levers, constraints, and conditions under which each scenario may evolve.
The dynamics of managing undersea cables: When solution becomes the problem
(Explorations in Cyber International Relations, 2012-11-06)
In the U.S., approximately 95% of all international Internet and phone traffic travels via undersea cables. Nearly all government traffic, including sensitive diplomatic and military orders, travels these cables to reach ...
Cyber mission assurance using STPA
(Explorations in Cyber International Relations, 2012-11-06)
From Cyber Security to Mission Assurance: Improving Campaign Mission Assurance. How can we complete campaign mission across a wide range of degradations? Current gaps: 1) Emergent system properties ignored
2) Assurance ...
Cyber defense resources & vulnerabilities
(Explorations in Cyber International Relations, 2012-11-06)
Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on ...
Understanding “Cyber Conflict”
(Explorations in Cyber International Relations., 2012-11-06)
Problem: Emergence of cyber as the new arena for conflict raises three basic questions: (a) What qualifies as a Cyber Conflict? (multiple definitions exist); (b) Does intervention of cyber in conflict life-cycle requires ...