The article of record as published may be found at http://doi.org/10.1016/j.cose.2013.11.004This essay offers a broad view of active defense derived from the concept of active air and missile defense. This view admits a range of cyber defenses, many of which are widely deployed and considered essential in today’s threat environment. Instead of equating active defense to hacking back, this wider interpretation lends itself to distinguishing different types of active defense and the legal and ethical issues they raise. The essay will review the concepts of active and passive air and missile defenses, apply them to cyberspace, describe a framework for distinguishing different types of active cyber defense, and finally suggest legal and ethical...
Overview A serious approach to military modernisation requires countries to equip, train, and organ...
The ethical framework for cyber security puts out a number of ethical frameworks that can be used to...
The rise of online devices, online users, online shopping, online gaming, and online teaching has ul...
This book offers a systematic analysis of the various existing strategic cyber deterrence options an...
As cyberattacks increase in frequency and intensity around the globe, private actors have turned to ...
Active cyber defense (ACD) is an important but ill-defined concept in cyber security. This Trend Ana...
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – includin...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Technological advance is a double edge sword. Computer systems that monitor and control industrial i...
Cyber attacks pose a serious threat to all states. Therefore, states constantly seek for various met...
Cybersecurity is a national security issue. Passive cyber defense measures are no longer sufficient....
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
This article contributes to the operationalisation of military cyber operations in general, and for ...
Overview A serious approach to military modernisation requires countries to equip, train, and organ...
The ethical framework for cyber security puts out a number of ethical frameworks that can be used to...
The rise of online devices, online users, online shopping, online gaming, and online teaching has ul...
This book offers a systematic analysis of the various existing strategic cyber deterrence options an...
As cyberattacks increase in frequency and intensity around the globe, private actors have turned to ...
Active cyber defense (ACD) is an important but ill-defined concept in cyber security. This Trend Ana...
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – includin...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Technological advance is a double edge sword. Computer systems that monitor and control industrial i...
Cyber attacks pose a serious threat to all states. Therefore, states constantly seek for various met...
Cybersecurity is a national security issue. Passive cyber defense measures are no longer sufficient....
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
This article contributes to the operationalisation of military cyber operations in general, and for ...
Overview A serious approach to military modernisation requires countries to equip, train, and organ...
The ethical framework for cyber security puts out a number of ethical frameworks that can be used to...
The rise of online devices, online users, online shopping, online gaming, and online teaching has ul...