Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure
Several critical infrastructures are integrating information technology into their operations,
and as a result, the cyber attack surface extends over a broad range of these infrastructures …
and as a result, the cyber attack surface extends over a broad range of these infrastructures …
The law and politics of cyberattack attribution
KE Eichensehr - UCLA L. Rev., 2020 - HeinOnline
Attribution of cyberattacks requires identifying those responsible for bad acts, prominently
including states, and accurate attribution is a crucial predicate in contexts as diverse as …
including states, and accurate attribution is a crucial predicate in contexts as diverse as …
Shifting IP battlegrounds in the US-China trade war
JA Lee - Colum. JL & Arts, 2019 - HeinOnline
ABSTRACT Intellectual property (" IP") represents one of the main controversies of US-
China trade relations in the past three decades and remains one of the core issues behind …
China trade relations in the past three decades and remains one of the core issues behind …
The attribution problem and cyber armed attacks
L Finlay, C Payne - 2019 - cambridge.org
In late 2018, the US Secretary of Homeland Security suggested that “cyber-attacks now
exceed the risk of physical attacks.” Yet the law has not kept pace with this reality. In …
exceed the risk of physical attacks.” Yet the law has not kept pace with this reality. In …
Disinformation Operations Aimed at (Democratic) Elections in the Context of Public International Law: The Conduct of the Internet Research Agency During the 2016 …
M Rodriguez - International Journal of Legal Information, 2019 - cambridge.org
Due to new technologies, the speed and volume of disinformation is unprecedented today.
As seen in the 2016 US presidential election, especially with the conduct of the Internet …
As seen in the 2016 US presidential election, especially with the conduct of the Internet …
SamSam and the silent battle of Atlanta
K Kraszewski - 2019 11th international conference on cyber …, 2019 - ieeexplore.ieee.org
The SamSam ransomware attack on Atlanta in early 2018 crippled municipal services in a
major American city without the firing of a single shot, epitomizing the notion of a “Silent …
major American city without the firing of a single shot, epitomizing the notion of a “Silent …
Defining" Reasonable" Cybersecurity: Lessons from the States
The expansion of the digital economy has brought sustained increases in productivity, but
also new risks and vulnerabilities. 1 However, what constitutes" reasonable" cybersecurity …
also new risks and vulnerabilities. 1 However, what constitutes" reasonable" cybersecurity …
Mal-Who: Mal-What: Mal-Where: The Future Cyber-Threat of a Non-Fiction Neuromancer: Legally Un-Attributable, Cyberspace-Bound, Decentralized Autonomous …
JA Schnader - NCJL & Tech., 2019 - HeinOnline
The science fiction" cyberpunk" author William Gibson predicted a future where the rise of
powerful, disembodied artificial intelligences, living in the intangible world of" cyberspace,'2 …
powerful, disembodied artificial intelligences, living in the intangible world of" cyberspace,'2 …
Legal challenges of attributing malicious cyber activities against space activities
D Li - Leiden Journal of International Law, 2024 - cambridge.org
Malicious cyber activities against space activities (MCASAs) add to the complexities of the
legal attribution of malicious cyber activities violating international law. The 'space'implies …
legal attribution of malicious cyber activities violating international law. The 'space'implies …
Using Simulated Narratives to Understand Attribution in the Information Dimension
E Bellamy, DM Beskow - 2023 Winter Simulation Conference …, 2023 - ieeexplore.ieee.org
Conducting a measured response to cyber or information attack is predicated on attribution.
When these operations are conducted covertly or through proxies, uncertainty in attribution …
When these operations are conducted covertly or through proxies, uncertainty in attribution …