About us
Research
Library
Training
Exercises
CyCon
Careers
News
Contact
Date
Title
2024
National Cybersecurity Governance: Ukraine
This publication is part of a series of National Cybersecurity Governance Series offering a comprehensive overview of national cybersecurity governance...
Authors:
Andrii Davydiuk
Oleksandr Potii
Focus Area:
Law
PDF
2024
Report on the Conference on the Law Applicable to the Use of Biometrics by Armed Forces, Tallinn, 7th – 8th of May 2024
On the 7th and 8th of May 2024, the War Studies Research Centre of the Netherlands Defence Academy and the...
Authors:
Joep Aarts
Aleksi Kajander
Sebastian Cymutta
Marten Zwanenburg
Steven van de Put
Focus Area:
Law
PDF
2024
Tallinn Paper: Cyber Diplomacy: From Concept to Practice
The 14th Tallinn Paper, authored by George Christou, provides an overview of how cyber diplomacy has evolved, its definition, how...
Authors:
George Christou
Focus Area:
Law
Policy
PDF
2023
15th International Conference on Cyber Conflict: Meeting Reality
Over 200 abstracts were submitted in the call for papers for CyCon 2023, the highest number in CyCon’s history. The...
Focus Area:
Law
Operations
Strategy
Technology
Book
2024
16th International Conference on Cyber Conflict: Over the Horizon
CyCon 2024 "Over the Horizon" received over 200 abstracts relating to novel research and innovation in law, technology, operations, strategy,...
Focus Area:
Law
Operations
Strategy
Technology
Book
2023
A Tale of Two Draft Resolutions: A Report on the Polarizing International Law Discussions at the 2023 OEWG Substantive Session
The UN’s Open-Ended Working Group (OEWG) had its Fourth and Fifth Substantive Sessions in 2023, which included intense discussions...
Authors:
Aleksi Kajander
Focus Area:
Law
PDF
2023
Autonomous cyber capabilities and unilateral measures of self-help against malicious cyber operations
Autonomous cyber capabilities – that is, cyber capabilities able to operate without real-time human intervention – are currently being researched...
Authors:
Marta Stroppa
Focus Area:
Law
PDF
2023
Preparing for a Post-Armed Conflict Strategic Environment
Policies in response to and trends in the Russia-Ukraine armed conflict portend a post-armed conflict strategic environment that will pose...
Authors:
Michael P. Fischerkeller
Focus Area:
NATO
Strategy
PDF
2023
National CERT/CSIRT – Mandate and Organisation
This study explores the regulatory frameworks governing the functioning of national CERT/CSIRT capabilities across NATO countries. Special focus has been...
Authors:
Taťána Jančárková
Grete Toompere
Focus Area:
Law
PDF
2023
WMGIC x NATO Countering Disinformation Challenge 2022
In October 2022, the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) contributed to a global undergraduate student competition on...
Authors:
D. Gao
G. Hage
K. Pelletier
P. Pernik
K. Rachamallu
T. Sterns
S. Workinger
Focus Area:
NATO
Strategy
Book
2023
Unnecessary Repetition: Russia’s Latest Attempt at a New UN Convention on Cyberspace
Parallel to the cyber front of Russia’s illegal war of aggression in Ukraine, conflict brews within the discussions on the...
Authors:
Aleksi Kajander
Focus Area:
Law
UN
PDF
2023
Escalation Roadmap: An analysis paper
Discussing the stability of cyberspace to ensure a stable and peaceful cyberspace is an important but leaves open the question...
Authors:
Ben Valk
Focus Area:
Law
NATO
Strategy
PDF
2023
Enhancing Cyber Security of Industrial Control Systems
With the prevalence of information and communications technology, industrial control systems used by critical infrastructures are increasingly exposed to cyberattacks....
Authors:
Sungbaek Cho
Focus Area:
Strategy
Technology
PDF
2023
National approaches to the supply chain cybersecurity: Taking a more restrictive stance against high-risk vendors.
Supply chain attacks are among the most significant security concerns to nations. There are a variety of options to mitigate...
Authors:
Keiko Kono
Samuele De Tomas Colatin
Focus Area:
Law
PDF
2023
China’s Approach to Military 5G Networks and Related Military Applications
This article summarizes thinking, plans, and activities of the People’s Republic of China in leveraging 5G networks for military purposes,...
Authors:
Henry Wu
Focus Area:
Strategy
pdf
2022
NATO Cyberspace Exercises: Moving Ahead CyCon 2022 Workshop Summary
How do we effectively “train as we fight” in cyberspace? How can NATO best adapt to changes in the cyber...
Authors:
Amy Ertan
Veronika Datzer
Aurimas Kuprys
Lisa Schauss
PDF
2022
National Cybersecurity Organisation: REPUBLIC OF KOREA
Authors:
Sungbaek Cho
PDF
2022
Cybersecurity Considerations in Autonomous Ships
Autonomous transportation will profoundly change maritime traffic. Human-crewed and autonomous vessels or ships will have to share the oceans, seas,...
Authors:
Sungbaek Cho
Erwin Orye
Gabor Visky
Vasco Prates
Focus Area:
Strategy
Technology
PDF
2021
Cyber Exercises: A Vision for NATO. A CyCon 2021 Workshop Summary Report
Authors:
Amy Ertan
Lt. Col. Aurimas Kuprys
Pilleriin Lillemets
Lt. Col. Gry-Mona Nordli
Focus Area:
NATO
Policy
Strategy
PDF
2022
Trust in Cyber Exercises
Authors:
Amy Ertan
CDR. Robert Buckles
Pilleriin Lillemets
Lt. Col. Gry-Mona Nordli
Lisa Catherina Schauss
Focus Area:
NATO
Policy
Strategy
PDF
2022
Using Social Network Analysis for Cyber Threat Intelligence
Cyber threat intelligence assists organisations in understanding the threats they face and helps them make educated decisions on preparing their...
Authors:
Vasileios Anastopoulos
Focus Area:
Technology
PDF
2022
Research Report Military Movement Risks From 5G Networks
Research Report Military Movement: Risks from 5G Networks In 2020, the United States and Estonia assigned the NATO Cooperative...
Authors:
Veeli Oeselg
Rokas Šalaševičius
Hendrik Ploom
Andreas Palm
Alar Kuusik
Tony Lawrence
Kadri Peeters
Focus Area:
Strategy
Technology
PDF
PDF
2022
14th International Conference on Cyber Conflict: Keep Moving
After two virtual editions, CyCon 2022 came back as an in-person conference, from 31 May to 3 June 2022. By...
Focus Area:
Law
Operations
Strategy
Technology
Book
2022
The Rights to Privacy and Data Protection in Times of Armed Conflict
Contemporary warfare yields a profound impact on the rights to privacy and data protection. Technological advances in the fields of...
Authors:
Russell Buchan
Asaf Lubin
Focus Area:
Law
Book
2022
WMGIC x NATO ACT Cybersecurity Challenge
How can NATO enhance cyberspace situational awareness and readiness in order to combat disinformation online, in particular on social media,...
Authors:
Piret Pernik
K. Floyd
K. Hoving
T. Lawrence
T. Liu
N. Perez
Focus Area:
NATO
Policy
Strategy
Book
2022
Automated/Autonomous Incident Response
Artificial intelligence (AI) has existed for a long time in a way that seems to affect every aspect of our...
Authors:
Vasileios Anastopoulos
Davide Giovannelli
Focus Area:
Technology
PDF
2022
Comparative Study on the Cyber Defence of NATO Member States
The information environment and cyberspace have created a completely different security environment than the one we are used to. With...
Authors:
Damjan Štrucl
Focus Area:
Strategy
PDF
2022
Cyber vigilantism in support of Ukraine: a legal analysis
Hacktivist initiatives in supprt of Ukraine have been met with both praise and reprimand. As much as they are clever...
Authors:
Ann Väljataga
Focus Area:
Law
PDF
2022
Tallinn Paper: Developing Applicable Standards of Proof for Peacetime Cyber Attribution
In order to take countermeasures properly under customary international law, states must attribute the triggering internationally wrongful act to the...
Authors:
Jeremy K. Davis
Focus Area:
Law
PDF
2022
Cyberspace Strategic Outlook 2030: Horizon Scanning and Analysis
NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is proud to publish a second volume on Horizon Scanning and Analysis,...
Focus Area:
Strategy
PDF
2022
Cyber attacks and Article 5 – a note on a blurry but consistent position of NATO
In reporting on the unfolding events in Ukraine, media and social platforms have repeatedly discussed as novel the possibility of...
Authors:
Michaela Prucková
Focus Area:
Law
2021
2nd Edition of the Guide to developing a National Cybersecurity Strategy
The 2nd, revised Guide to Developing a National Cybersecurity Strategy, published in November 2021, results from a unique multistakeholder collaboration...
Authors:
Co-publication with partner organisations facilitated by ITU
Focus Area:
Law
Strategy
Book
2022
Recent Cyber Events: Considerations for Military and National Security Decision Makers
2021 was an exciting year from a cybersecurity and cyber defence perspective. After dealing with the Solarwinds breach at the...
Authors:
Sungbaek Cho
Amy Ertran
Lisa Schauss
Ann Väljataga
Jan Wünsche
Focus Area:
Strategy
PDF
2022
Battling Cybercrime Through the New Additional Protocol to the Budapest Convention
On 17 November, the Council of Europe, an international human rights body, adopted the second Additional Protocol to the Budapest Convention to...
Authors:
Dominik Zachar
Focus Area:
Law
2021
Artificial Intelligence and Autonomy in the Military: An Overview of NATO Member States’ Strategies and Deployment
The report “Artificial Intelligence and Autonomy in the Military: An Overview of NATO Member States’ Strategies and Deployment” and associated...
Authors:
Maggie Gray
Amy Ertan
Focus Area:
Strategy
PDF
PDF
2021
Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber Exercises
This paper describes a situation awareness framework, Frankenstack, that is the result of a multi-faceted endeavor to enhance the expertise...
Authors:
Mauno Pihelgas
Markus Kont
Focus Area:
Technology
PDF
2021
Recent Cyber Events No 13/ November 2021
The 13th instalment in the series designed for military and national security decision makers focuses on the analysis of usage...
Authors:
Jan Wünsche
Sungbaek Cho
Karlis Podins
Damjan Štrucl
Urmet Tomp
Grete Toompere
Ingrid Winther
Focus Area:
Law
Strategy
PDF
2021
Need for Speed — Challenges in Security Accreditation
Security accreditation is an important part of the measures taken by states and international organisations to ensure adequate cyber security...
Authors:
Jan Wünsche
Sungbaek Cho
Philippe Zotz
Focus Area:
Law
Strategy
PDF
2021
Proposal of United Nations Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes: Comment on the first draft text of the Convention
Foreword UN General Assembly Resolution 74/247 (27 December 2019), established an open-ended ad hoc intergovernmental committee of experts and representative...
Authors:
Davide Giovannelli
Focus Area:
Law
2021
Research Report Supply Chain and Network Security for Military 5G Networks
NATO needs to keep itself thoroughly informed about the opportunities 5G technologies provide for improving Euro-Atlantic deterrence and defence, as...
Authors:
Piret Pernik
Urmas Ruuto
Taťána Jančárková
Kadri Kaska
Costel-Marius Gheorghevici
Henrik Beckvard
Focus Area:
Strategy
Technology
PDF
PDF
2021
Recast dual-use regulation - EU introduces new export controls on spyware
Amidst a general sense of unrest characteristic of the last two years, EU legislators have made praiseworthy progress towards an...
Authors:
Ann Väljataga
Focus Area:
Law
2021
Recent Cyber Events No 12/ September 2021
The 12th instalment in the series designed for military and national security decision makers focuses on a global ransomware attack...
Authors:
Henrik Beckvard
Sungbaek Cho
Amy Ertan
Ben Valk
Ann Väljataga
Jan Wünsche
Focus Area:
Strategy
PDF
2021
National Cybersecurity Organisation: Slovenia
This publication is part of a series of National Cybersecurity Governance Series offering a comprehensive overview of national cybersecurity governance...
Authors:
Damjan Štrucl
Focus Area:
Law
Strategy
PDF
2021
National Cybersecurity Organisation: Turkey
This publication is part of a series of National Cybersecurity Governance Series offering a comprehensive overview of national cybersecurity governance...
Authors:
Emre Halisdemir
Focus Area:
Law
Strategy
PDF
2021
Generative Adversarial Networks from a Cyber Intelligence perspective
Generative adversarial networks (GAN) are a hot topic in cyber intelligence, as they begin to demonstrate abilities that will assist...
Authors:
Fabio Biondi
Giuseppe Buonocore
Richard Matthews
Focus Area:
Strategy
Technology
PDF
2021
Tallinn Paper: Opportunities for Public and Private Attribution of Cyber Operations
The 12th Tallinn Paper (Young Scholar Edition), authored by Garrett Derian-Toth, Ryan Walsh, Alexandra Sergueeva, Edward Kim, Alivia Coon, Hilda...
Authors:
Ryan Walsh
Alexandra Sergueeva
Edward Kim
Alivia Coon
Hilda Hadan
Jared Stancombe
Garrett Derian-Toth
Focus Area:
Law
PDF
2021
New EU’s cybersecurity package: ambitious proposals, daring tasks and deeper cooperation
As it did in 2017, the European Commission gave EU member states an early Christmas present on 16 December 2020...
Authors:
Michaela Prucková
Focus Area:
Law
2021
Recent Cyber Events No 11/ June 2021
The 11th instalment in the series designed for military and national security decision makers focuses on ransomware including the cases...
Authors:
Alejandro Granja
Emre Halisdemir
Rónán O’Flaherty
Maria Tolppa
Jan Wünsche
Philippe Zotz
Focus Area:
Strategy
PDF
2021
Tallinn Paper: Russia´s Cyber Policy Efforts in the United Nations
The 11th Tallinn Paper, authored by Elaine Korzak, presents and examines the activities and views of Russia in the United Nations...
Authors:
Elaine Korzak
Focus Area:
Law
Strategy
PDF
2021
Towards Remediating DDoS Attacks
This paper by Arturs Lavrenovs from NATO CCDCOE was presented at the 16th International Conference on Cyber Warfare and Security...
Authors:
Artūrs Lavrenovs
Focus Area:
Technology
PDF
2021
Biometric Data Processing by the German Armed Forces During Deployment
Paper on biometric data processing by the German armed forces (Bundeswehr) during deployment is authored by CCDCDOE Law Researcher Sebastian...
Authors:
Sebastian Cymutta
Focus Area:
Law
Operations
Strategy
PDF
2021
Autonomous Cyber Capabilities under International Law
NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) launched at the Workshop Day of CyCon 2021 a new volume of...
Authors:
Ann Väljataga (Ed.)
Rain Liivoja (Ed.)
Focus Area:
Law
Technology
Book
2021
13th International Conference on Cyber Conflict: Going Viral Proceedings 2021
The proceedings of the 13th International Conference on Cyber Conflict, organised in 2021 as a virtual event, gather 20 articles...
Focus Area:
Law
Operations
Strategy
Technology
Book
2021
Cyber Considerations for Military Mobility
NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) has published a food for thought paper on cyber considerations for military...
Authors:
Henrik Beckvard
Philippe Mitsuya Zotz
Focus Area:
Operations
Strategy
Technology
PDF
2021
Recent Cyber Events No 10 / May 2021
The 10th instalment in the series designed for military and national security decision makers looks at various ways a supply...
Authors:
Henrik Beckvard
Emre Halisdemir
Kadri Kaska
Gry-Mona Nordli
Damjan Štrucl
Urmet Tomp
Michael Widmann
Jan Wünsche
Philippe Zotz
Focus Area:
Strategy
PDF
2021
NATO MARSEC Proceedings: Case Study of the dispute in the South China Sea
In September 2020 the CCDCOE Law Researcher Dr. Keiko KONO presented a case study at the 1st MARSEC annual conference....
Authors:
Keiko Kono
Focus Area:
Law
PDF
2021
National Cybersecurity Organisation: Luxembourg
The country report on national cybersecurity organisation in Luxembourg is part of the National Cybersecurity Governance Series published by the...
Authors:
Philippe Mitsuya Zotz
Focus Area:
Law
Strategy
PDF
2021
CJEU’s ruling in HK vs Prosecution and the Living Spectre of Data Retention
In 2014, the CJEU’s judgement in Digital Rights Ireland revoked the Data Retention Directive, following which in the joined cases...
Authors:
Ann Väljataga
Focus Area:
Law
2021
First UN OEWG concludes with a consensus report – what does it mean for future cybersecurity discussions under the auspices of the First Committee?
Final substantial session of the OEWG The final substantive session of the United Nations Open-Ended Working Group (OEWG) on developments...
Authors:
Maria Tolppa
Focus Area:
Law
2021
Recent Cyber Events No 9 / March 2021
The 9th instalment in the series designed for military and national security decision makers looks at the potential damage of...
Authors:
Kadri Kaska
Damjan Štrucl
Urmet Tomp
Jan Wünsche
Philippe Zotz
Focus Area:
Law
Operations
Strategy
Technology
PDF
2020
Android Dumpsys Analysis to Indicate Driver Distraction
This paper by NATO CCDCOE Researchers Lukas Bortnik and Artūrs Lavrenovs was presented at the 11th EAI International Conference on...
Authors:
Lukas Bortnik
Artūrs Lavrenovs
Focus Area:
Technology
PDF
2021
Recent Cyber Events and Possible Implications for Armed Forces #8
This is the eighth instalment of a series of reports by CCDCOE identifying potential implications of cyber events to armed...
Authors:
CCDCOE Researchers
Focus Area:
Strategy
PDF
2020
National Cybersecurity Organisation: Germany
The country report on national cybersecurity organisation in Germany is part of the National Cybersecurity Governance Series published by the...
Authors:
Sebastian Cymutta
Focus Area:
Law
Strategy
PDF
2020
Cyber Threats and NATO 2030: Horizon Scanning and Analysis
NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in cooperation with King’s College London and William & Mary, has published...
Authors:
A. Ertan
K. Floyd
P. Pernik
T. Stevens Eds.
Book
2020
Towards Cyber Sensing: Venturing Beyond Traditional Security Events
This paper by NATO CCDCOE Researchers Artūrs Lavrenovs, Kimmo Heinäaro and Erwin Orye was accepted and presented in "19th European...
Authors:
Artūrs Lavrenovs
Kimmo Heinäaro
Erwin Orye
Focus Area:
Technology
PDF
2020
Recent Cyber Events and Possible Implications for Armed Forces #7
This is the seventh instalment of a series of reports by CCDCOE identifying potential implications of cyber events to armed...
Authors:
CCDCOE Researchers
Focus Area:
Strategy
PDF
2020
National Cybersecurity Organisation: Romania
The country report on national cybersecurity organisation in Romania is part of the National Cybersecurity Governance Series published by the...
Authors:
Experts from the Romanian Intelligence Service and the Ministry of National Defence
Focus Area:
Law
Strategy
PDF
2020
The Five Eyes and Offensive Cyber Capabilities: Building a ‘Cyber Deterrence Initiative’
CCDCOE Non-Resident Visiting Scholar Josh Gold investigates the narrative which promotes transparency toward state offensive cyber capabilities – OCCs. The...
Authors:
Josh Gold
Focus Area:
Strategy
PDF
2020
IDS for logs: Towards implementing a streaming Sigma rule engine
CCDCOE Technology Branch researchers Markus Kont and Mauno Pihelgas present a novel real-time pattern matching engine that functions as an...
Authors:
Markus Kont
Mauno Pihelgas
Focus Area:
Technology
PDF
2020
Recent Cyber Events and Possible Implications for Armed Forces #6
This is the sixth instalment of a series of reports by CCDCOE identifying potential implications of cyber events to armed...
Authors:
CCDCOE Researchers
Focus Area:
Strategy
PDF
2020
Cyber workforce recruitment and retention: an awareness assessment
This paper by CCDCOE Researchers Erwin Orye and Gunnar Faith-Ell focuses on how governmental organisations manage their required level of...
Authors:
Erwin Orye
Gunnar Faith-Ell
Focus Area:
Strategy
PDF
2020
Si vis cyber pacem, para sanctiones: the EU Cyber Diplomacy Toolbox in action
On 30 July 2020, for the first time, the Council of the European Union unanimously imposed restrictive measures against six...
Authors:
Samuele De Tomas Colatin
Focus Area:
Law
2020
Recent Cyber Events and Possible Implications for Armed Forces #5
This is the fifth instalment of a series of reports by CCDCOE identifying potential implications of cyber events to armed...
Authors:
CCDCOE Researchers
Focus Area:
Strategy
PDF
2020
Teaming up in Cyber Command: the preparation process
The collaborative paper from the staff officers of the CCDCOE (Tallinn, Estonia) and C2COE (Utrecht, Netherlands) focuses on most effective...
Authors:
Michael Widmann
Henrik Beckvard
Federico Clemente
Marcel Scherrenburg
Focus Area:
Strategy
PDF
2020
NetFlow Based Framework for Identifying Anomalous End User Nodes
During the last two decades, cyber attacks against end users have grown significantly both in terms of number and sophistication....
Authors:
Risto Vaarandi
Mauno Pihelgas
Focus Area:
Technology
PDF
2020
Malware Reverse Engineering Handbook
Malware is a growing threat which causes considerable cost to individuals, companies and institutions. Since basic signature-based antivirus defences are...
Authors:
Ahmet Balci
Dan Ungureanu
Jaromir Vondruška
Focus Area:
Technology
PDF
2020
Recent Cyber Events and Possible Implications for Armed Forces #4
This is the fourth instalment of a series of reports by CCDCOE identifying potential implications of cyber events to armed...
Authors:
CCDCOE Strategy and Operations Branch researchers
Focus Area:
Strategy
PDF
2020
An Overview of the Report of the UN Panel of Experts established pursuant to the Security Council resolution 1874 (2009): Investigations into North Korean cyberattacks continue
On 2 March 2020, the President of the UN Security Council circulated a Final Report of the Panel of Experts...
Authors:
Keiko Kono
Focus Area:
Law
2020
International Cyber Stability Framework at the United Nations Security Council
On 22 May, Estonia, with Belgium, the Dominican Republic, Kenya and Indonesia, brought (virtually) together fourteen United Nations Security Council...
Authors:
Maria Tolppa
Focus Area:
Law
2020
Recent Cyber Events and Possible Implications for Armed Forces #3
This is the third instalment of a series of reports by CCDCOE identifying potential implications of cyber events to armed...
Authors:
CCDCOE Strategy Branch researchers
Focus Area:
Strategy
PDF
2020
Recent Cyber Events and Possible Implications for Armed Forces #2
This is a second instalment of a series of reports by CCDCOE identifying potential implications of cyber events to armed...
Authors:
CCDCOE Strategy Branch researchers
Focus Area:
Strategy
PDF
2020
12th International Conference on Cyber Conflict. 20/20 Vision: The Next Decade. Proceedings 2020
The 12th annual International Conference on Cyber Conflict (CyCon) was cancelled due to the spread of SARS-CoV-2 and public health...
Focus Area:
Law
Operations
Strategy
Technology
Book
2020
Data as a Weapon: Refined Cyber Capabilities Under Weapon Reviews and International Human Rights Law
Article 36 of Protocol I Additional to the 1949 Geneva Conventions requires states to conduct a legal review of all...
Authors:
Samuele De Tomas Colatin
Ann Väljataga
Focus Area:
Law
Strategy
PDF
2020
Recent Cyber Events and Possible Implications for Armed Forces #1
This is a series of reports by CCDCOE identifying potential implications of cyber events to armed forces. The monthly report...
Authors:
CCDCOE Strategy Branch researchers
Focus Area:
Strategy
PDF
2020
Information Sharing Framework for Penetration Testing
In the contemporary interpretation of deterrence theory, maintaining high-level resilience against cyber attacks is one of two pillars of cyber...
Authors:
Ihsan Burak Tolga
Gunnar Faith-Ell
Focus Area:
Strategy
Technology
PDF
2020
National Cyber Security Organisation: Italy
The country report on national cyber security organisation in Italy is part of the National Cyber Security Governance Series published...
Authors:
Samuele De Tomas Colatin
Focus Area:
Law
Strategy
PDF
2020
Overview of the UN OEWG developments: continuation of discussions on how international law applies in cyberspace
General The second substantive sessions of the first United Nations Open-Ended Working Group[1] (OEWG) and the Group of Governmental Experts[2]...
Authors:
Maria Tolppa
Focus Area:
Law
2019
Designing and Implementation of an Availability Scoring System for Cyber Defence Exercises
Cyber defence exercises are instrumental for enhancing capabilities and expertise in the cyber domain. Cyberspace as an operational domain is...
Authors:
Mauno Pihelgas
Focus Area:
Technology
PDF
2019
National Cyber Security Organisation: Czechia
The country report on national cyber security organization in Czechia is part of the National Cyber Security Governance Series published...
Authors:
Tomáš Minárik
Taťána Jančárková
Focus Area:
Strategy
PDF
2019
Strategic importance of, and dependence on, undersea cables
This paper is a collaborative view of the NATO CCDCOE Strategy and Law Branch researchers highlighting the strategic importance of...
Authors:
CCDCOE Strategy and Law Branch researchers
Henrik Beckvard (Ed.)
Keiko Kono
Focus Area:
Law
Strategy
PDF
2019
European Union establishes a sanction regime for cyber-attacks
On 17 May 2019, the Council of the European Union adopted Council Decision (CFSP) 2019/797 and Council Regulation (EU) 2019/796...
Focus Area:
Law
2019
Chatham House report: Space – NATO cyber security’s weak spot
In 2018, Norwegian military and allied officials confirmed that Russia had disrupted NATO’s Trident Juncture exercise in Europe’s High North region...
Authors:
Liina Lumiste (née Hirv)
Focus Area:
Law
2019
The UN SG´s High-Level Panel on Digital Cooperation Publishes its Final Report: the 18th SDG
The High-Level Panel on Digital Cooperation Publishes its Final Report: the 18th SDG In July 2018, the Secretary General appointed...
Authors:
Taťána Jančárková
Focus Area:
Law
2019
Autonomous Cyber Capabilities under International Law
The application of international law to cyber operations and to the use of autonomous military technology continues to be the...
Authors:
Rain Liivoja
Maarja Naagel
Ann Väljataga
Focus Area:
Law
PDF
2019
11th International Conference on Cyber Conflict: Silent Battle. Proceedings 2019
The 11th annual International Conference on Cyber Conflict (CyCon) took place in Tallinn from 28 to 31 May 2019. The...
Focus Area:
Law
Operations
Strategy
Technology
Book
2019
Whole-of-Government Cyber Information Sharing
Cyberspace is expanding very fast. Naturally, there is a direct correlation between the increasing speed of cyber and the associated...
Authors:
Ihsan Burak Tolga
Focus Area:
Strategy
PDF
2019
Trends in International Law for Cyberspace
This paper by CCDCOE legal experts focuses on legal developments and trends in the domain of international law for cyberspace....
Authors:
CCDCOE Law Branch Researchers
Kadri Kaska (Ed.)
Focus Area:
Law
PDF
2019
Huawei, 5G, and China as a Security Threat
Concerns about the Chinese technology giant Huawei as the potential supplier of 5G technology for next generation wireless networks have generated lively...
Authors:
Kadri Kaska
Tomáš Minárik
Henrik Beckvard
Focus Area:
Law
Strategy
Technology
PDF
2019
Tracing opinio juris in National Cyber Security Strategy Documents
National cyber security strategies serve as useful tool to identify a state's general position in regards to the rules and...
Authors:
Ann Väljataga
Focus Area:
Law
PDF
2021
National Cyber Security Organisation: Turkey
The country report on national cybersecurity organisation in Turkey is part of the National Cybersecurity Governance Series published by the...
Authors:
Emre Halisdemir
PDF
2018
An Unsupervised Framework for Detecting Anomalous Messages from Syslog Log Files
System logs provide valuable information about the health status of IT systems and computer networks. Therefore, log file monitoring has...
Authors:
Risto Vaarandi
Bernhards Blumbergs
Markus Kont
Focus Area:
Technology
PDF
2018
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture
Already nowadays complex massively interconnected systems, isolated defense vehicles, infrastructure and other systems demand extremely low failure rates. In case...
Authors:
Agostino Panico
Alexander Kott
Benoît LeBlanc
Krzysztof Rzadca
Luigi Mancini
Martin Drašar
Mauno Pihelgas
Paul Theron
Focus Area:
Technology
PDF
2018
Guide to Developing a National Cybersecurity Strategy
Since 2016 NATO CCDCOE participated in the development of a reference guide aimed at supporting national efforts of developing cyber...
Authors:
Co-publication of 12 partner organisations facilitated by ITU
Focus Area:
Strategy
PDF
2018
Principles of Cyber Deterrence and the Challenges in Developing a Credible Cyber Deterrence Posture
The aim of this paper is to have a set of real-case practices which have practical value in building a...
Authors:
Ihsan Burak Tolga
Focus Area:
Strategy
PDF
2018
EVE and ADAM: Situation Awareness Tools for NATO CCDCOE Cyber Exercises
Authors, among them CCDCOE Technology Branch Researcher Mauno Pihelgas, present a new situation awareness visualisation tool, the Events Visualisation Environment...
Authors:
Francisco Jesús Rubio Melón
Teemu Väisänen
Mauno Pihelgas
Focus Area:
Operations
PDF
2018
Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis
As his point of departure Prof David Wallace takes the uniqueness of the environment in which cyber weapons are conceived,...
Authors:
Colonel David Wallace
Focus Area:
Law
PDF
2018
10th International Conference on Cyber Conflict. Proceedings 2018
CyCon X, the tenth iteration of the annual International Conference on Cyber Conflict, organised by the NATO Cooperative Cyber Defence...
Focus Area:
Law
Strategy
Technology
Book
2018
Enhancing international collaboration in cyber defence through national cyber security strategy development
International collaboration is a strategic goal almost unequivocally valued and pursued by all nations in their national cyber security strategies(NCSS)....
Authors:
Torsten Corall
Katriina Härma
Ann Väljataga
CCDCOE Law Branch Researchers
Focus Area:
Strategy
PDF
2018
Cyber Deterrence: A Comprehensive Approach?
Despite a growing amount of scholarly and policy attention to cyber threats, little progress seems to have been made in...
Authors:
Dr. Joe Burton
Focus Area:
Strategy
PDF
2018
A Legal View on Outer Space and Cyberspace: similarities and differences
The 10th Tallinn Paper authored by Katrin Nyman Metcalf offers a legal view on outer space and cyberspace: similarities and...
Authors:
Katrin Nyman Metcalf
Focus Area:
Law
PDF
2017
Impact on NATO of Cyberspace as a Domain of Operations: SWOT Analyses
In July 2016 at the Warsaw summit, NATO recognised a new domain of operations: cyberspace. The main goal of this...
Authors:
Alžběta Bajerová
Focus Area:
Strategy
PDF
2017
Bbuzz: A Bit-aware Fuzzing Framework for Network Protocol Systematic Reverse Engineering and Analysis
Fuzzing is a critical part of secure software development life-cycle, for finding vulnerabilities, developing exploits, and reverse engineering. This relies...
Authors:
Bernhards Blumbergs
Risto Vaarandi
Focus Area:
Technology
PDF
2017
Frankenstack: Toward Real-time Red Team Feedback
Cyber Defense Exercises have received much attention in recent years, and are increasingly becoming the cornerstone for ensuring readiness in...
Authors:
Markus Kont
Mauno Pihelgas
Kaie Maennel
Bernhards Blumbergs
Toomas Lepik
Focus Area:
Operations
Technology
PDF
2017
The Czech Republic: A Case of a Comprehensive Approach toward Cyberspace
The Czech authorities made the first steps towards a safer cyberspace on the national level a couple of years ago,...
Authors:
Lucie Kadlecová
Daniel P. Bagge
Michaela Semecká
Václav Borovička
Focus Area:
Strategy
PDF
2017
MUJLT Vol 11, No 1 (2017): The Notification Requirement in Transborder Remote Search and Seizure: Domestic and International Law Perspectives
Masaryk University Journal of Law and Technology Vol 11, No 1 (2017) has published an analysis co-authored by NATO CCDCOE Law...
Authors:
Anna-Maria Osula
M. Zoetekouw
Focus Area:
Law
PDF
2017
National Cyber Security Organisation in Poland
Report by the NATO Cooperative Cyber Defence Centre of Excellence provides a comprehensive overview of the current cyber security landscape...
Authors:
Joanna Świątkowska
Izabela Albrycht
Dominik Skokowski
Focus Area:
Strategy
PDF
2017
9th International Conference on Cyber Conflict. Proceedings 2017
The 9th International Conference on Cyber Conflict (CyCon 2017), organised by the NATO Cooperative Cyber Defence Centre of Excellence (NATO...
Authors:
Henry Rõigas
Raik Jakschis
Lauri Lindström
Tomáš Minárik (Eds.)
Focus Area:
Law
Operations
Strategy
Technology
Book
2017
National Cyber Security Organisation in Israel
A new analysis by NATO Cooperative Cyber Defence Centre of Excellence provides a comprehensive overview of cyber security structures and...
Authors:
Deborah Housen-Couriel
Focus Area:
Law
Strategy
PDF
2017
Ethics and Policies for Cyber Operation. A NATO Cooperative Cyber Defence Centre of Excellence Initiative
“Ethics and Policies for Cyber Operation. A NATO Cooperative Cyber Defence Centre of Excellence Initiative” is a valuable tool for...
Authors:
Mariarosaria Taddeo
Ludovica Glorioso (Eds.)
Focus Area:
Law
Strategy
Technology
PDF
2016
Event Log Analysis with the LogCluster Tool
Today, event logging is a widely accepted concept with a number of event formatting standards and event collection protocols. Event...
Authors:
Risto Vaarandi
Markus Kont
Mauno Pihelgas
Focus Area:
Technology
PDF
2016
Hedgehog in the Fog: Creating and Detecting IPv6 Transition Mechanism-Based Information Exfiltration Covert Channels
The Internet Protocol Version 6 (IPv6) transition opens a wide scope for potential attack vectors. Tunnel-based IPv6 transition mechanisms could...
Authors:
Bernhards Blumbergs
Mauno Pihelgas
Markus Kont
Olaf M. Maennel
Risto Vaarandi
Focus Area:
Technology
PDF
2016
China and Cyber: Attitudes, Strategies, Organisation
This comprehensive overview of Chinese cyber strategy places the country’s cyber-relevant developments in the context of governance. China continues the...
Authors:
Mikk Raud
Focus Area:
Strategy
PDF
2016
National Cyber Security Organisation Spain
This publication about the national cyber security organisational setup in Spain is part of a series which assembles a comprehensive...
Authors:
Alexander Cendoya
Focus Area:
Strategy
PDF
2016
I accidentally malware - what should I do... is this dangerous? Overcoming inevitable risks of electronic communication
The aim of this study is to find mitigation techniques for a number of risks resulting from the usage of...
Authors:
Teemu Väisänen
Lorena Trinberg
Nikolaos Pissanidis
Focus Area:
Law
Technology
PDF
2016
Battlefield Digital Forensics: Digital Intelligence and Evidence Collection in Special Operations
Troops in contact in the battlefield are very likely to be exposed to the enemy’s digital information. Digital media collection by...
Authors:
Christian Braccini
Teemu Väisänen
Michal Sadloň
Agostino Panico
Kris van der Meij
Mario Huis in ‘t veld
Focus Area:
Operations
Technology
PDF
2016
Is NATO Ready to Cross the Rubicon on Cyber Defence?
Is NATO Ready to Cross the Rubicon on Cyber Defence? by Matthijs Veenendaal, Kadri Kaska and Pascal Brangetto looks at NATO...
Authors:
Matthijs Veenendaal
Kadri Kaska
Pascal Brangetto
Focus Area:
Strategy
PDF
2016
8th International Conference on Cyber Conflict. Proceedings 2016
The 8th International Conference on Cyber Conflict focused on the theme of Cyber Power. CyCon 2016 asked how the traditional...
Authors:
N.Pissanidis
H.Rõigas
M.Veenendaal (Eds.)
Focus Area:
Law
Strategy
Technology
Book
2016
National Cyber Security Organisation: United States
This publication about the national cyber security organisational setup in the United States of America is part of a series...
Authors:
Piret Pernik
Jesse Wojtkowiak
Alexander Verschoor-Kirss
Focus Area:
Strategy
PDF
2016
International Cyber Norms: Legal, Policy & Industry Perspectives
Recent cyber security related discussions in international forums indicate ‘cyber norms’ or cyber ‘norms of behaviour’ as the most suitable...
Authors:
Anna-Maria Osula
Henry Rõigas (Eds.)
Focus Area:
Law
Strategy
Book
2016
National Cyber Security Organisation: Czech Republic
This publication about the national cyber security organisational setup in the Czech Republic is part of a series which assembles...
Authors:
Tomáš Minárik
PDF
2015
MUJLT Vol 9, No 1 (2015): Mutual Legal Assistance & Other Mechanisms for Accessing Extraterritorially Located Data
Masaryk University Journal of Law and Technology Vol 9, No 1 (2015) published a research paper by NATO CCDCOE Law Branch...
Authors:
Anna-Maria Osula
Focus Area:
Law
PDF
2015
Economic Aspects of National Cyber Security Strategies
Every organisation and government need to know how much is necessary to invest in cybersecurity and how much is enough....
Authors:
Pascal Brangetto
Mari Kert-Saint Aubyn
Focus Area:
Strategy
PDF
2015
Anti-Forensic Study
The use of anti-forensic techniques in and on IT systems is common practice for advanced and persistent actors, particularly in...
Authors:
Patrycjusz Zdzichowski
Michal Sadloň
Teemu Uolevi Väisänen
Alvaro Botas Munoz
Karina Filipczak
Focus Area:
Technology
PDF
2015
Insider Threat Detection Study
This study focuses on the threat to information security posed by insiders (i.e., insider threat) as the recent cases of...
Authors:
Markus Kont
Mauno Pihelgas
Jesse Wojtkowiak
Anna-Maria Osula
Lorena Trinberg
Focus Area:
Technology
Book
2015
Cyber War in Perspective: Russian Aggression against Ukraine
The conflict in Ukraine appears to have all the ingredients for cyber war. Moscow and Kyiv are playing for the highest...
Authors:
Kenneth Geers (Ed.)
Focus Area:
Law
Strategy
Book
2015
National Cyber Security Organisation: Hungary
This publication about the national cyber security organisational setup in Hungary is part of a series which assembles a comprehensive...
Authors:
László Kovács
Gergely Szentgáli
Focus Area:
Strategy
PDF
2015
National Cyber Security Organisation: Lithuania
This publication about the national cyber security organisational setup in Lithuania is part of a series which assembles a comprehensive...
Authors:
Vytautas Butrimas
Focus Area:
Strategy
PDF
2015
7th International Conference on Cyber Conflict. Proceedings 2015
CyCon 2015 – themed ‘Architectures in Cyberspace’ – focused on the construction of the internet and its potential future development....
Authors:
Markus Maybaum
Anna-Maria Osula
Lauri Lindström (Eds.)
Focus Area:
Law
Strategy
Technology
Book
2015
Accessing Extraterritorially Located Data: Options for States
Preventing, responding to and investigating cyber incidents relies on time-critical access to relevant data which might be located in countries...
Authors:
Anna-Maria Osula
Focus Area:
Law
PDF
2015
International Law and International Information Security: A Response to Krutskikh and Streltsov
In this Tallinn Paper, the Centre’s Senior Fellow professor Wolff Heintschel von Heinegg responds to an article by Andrey Krutskikh, senior official...
Authors:
Wolff Heintschel von Heinegg
Focus Area:
Law
PDF
2015
Mitigating Risks arising from False-Flag and No-Flag Cyber Attacks
This report on mitigating risks arising from false-flag and no-flag cyber attacks handles issues related to establishing proper attribution following...
Authors:
Mauno Pihelgas
Focus Area:
Operations
Technology
PDF
2015
National Cyber Security Organisation: Slovakia
This publication about the national cyber security organisational setup in Slovakia is part of a series which assembles a comprehensive...
Authors:
Lea Hriciková
Kadri Kaska
Focus Area:
Strategy
PDF
2015
National Cyber Security Organisation: Italy
This publication about the national cyber security organisational setup in Italy is part of a series which assembles a comprehensive...
Authors:
Ludovica Glorioso
Focus Area:
Strategy
PDF
2015
National Cyber Security Organisation: France
This publication about the national cyber security organisational setup in France is part of a series which assembles a comprehensive...
Authors:
Pascal Brangetto
Focus Area:
Strategy
PDF
2015
Tallinn Paper: The Role of Offensive Cyber Operations in NATO's Collective Defence
In this new Tallinn Paper, Dr. James A. Lewis, an internationally recognised expert and a frequent commentator on cyber security matters,...
Authors:
James A. Lewis
Focus Area:
Strategy
PDF
2015
Regulating Cross-Border Dependencies of Critical Information Infrastructure
One of the least explored areas of cyber vulnerabilities concerns cross-border dependencies of critical information infrastructure. The provision of vital...
Authors:
Kadri Kaska
Lorena Trinberg
Focus Area:
Law
Strategy
PDF
2015
National Cyber Security Organisation: United Kingdom
This publication about the national cyber security organisational setup in the United Kingdom is part of a series which assembles...
Authors:
Anna-Maria Osula
Focus Area:
Strategy
PDF
2015
National Cyber Security Organisation: The Netherlands
This publication about the national cyber security organisational setup in the Netherlands is part of a series which assembles a...
Authors:
Kadri Kaska
Focus Area:
Strategy
PDF
2015
National Cyber Security Organisation: Estonia
This publication about the national cyber security organisational setup in Estonia is part of a series which assembles a comprehensive...
Authors:
Anna-Maria Osula
Focus Area:
Strategy
PDF
2015
Workshop on Ethics and Policies for Cyber Warfare. Report
The report on “Workshop on Ethics and Policies for Cyber Warfare” held in close cooperation with University of Oxford and...
Authors:
Corinne J.N. Cath
Ludovica Glorioso
Maria Rosaria Taddeo
Focus Area:
Law
PDF
2015
Cyber Red Teaming. Organisational, technical and legal implications in a military context
Cybersecurity is about managing risks and to ascertain that, to a certain extent, proper procedures and adequate security measures are...
Authors:
Pascal Brangetto
Emin Çalışkan
Henry Rõgas
Focus Area:
Law
Operations
Technology
PDF
2015
Technical and Legal Overview of the Tor Anonymity Network
In this paper an overview of the Tor anonymisation network is presented from the technical perspective and also several legal...
Authors:
Emin Çalışkan
Tomáš Minárik
Anna-Maria Osula
Focus Area:
Technology
PDF
2015
Defending mobile devices for high level officials and decision-makers
Smartphones are an inevitable presence in everyday life. High-level officials and decision-makers use mobile devices to handle and store sensitive...
Authors:
Teemu Väisänen
Alexandria Farar
Nikolaos Pissanidis
Christian Braccini
Bernhards Blumbergs
Enrique Diez
Focus Area:
Technology
PDF
2015
Tallinn Paper: The Law of Cyber Targeting
Cyber activities have become an indelible facet of contemporary warfare, not just for cyber-empowered militaries but also for low-tech forces....
Authors:
Michael N. Schmitt
Focus Area:
Law
PDF
2014
Information Warfare: The Ontological and Regulatory Gap
Dr Mariarosaria Taddeo's talk 'Information Warfare: The Ontological and Regulatory Gap' at the Workshop on Ethics and Policies for Cyber Warfare....
Authors:
Dr Mariarosaria Taddeo
Focus Area:
Law
VIDEO
2014
The Critical Need for International Consensus on "Cyber Weapons"
Dr Sana Saleh's talk 'The Critical Need for International Consensus on "Cyber Weapons"' at the Workshop on Ethics and Policies for...
Authors:
Dr Sana Saleh
Focus Area:
Law
VIDEO
2014
Towards a Model Facilitating Discussions about Cyber Attacks and Defences
Dr Jassim Happa's talk 'Towards a Model Facilitating Discussions about Cyber Attacks and Defences' at the Workshop on Ethics and Policies...
Authors:
Dr Jassim Happa
VIDEO
2014
Perfidy in Cyberwarfare
Prof Neil C. Rowe's talk 'Perfidy in Cyberwarfare' at the Workshop on Ethics and Policies for Cyber Warfare. The workshop was...
Authors:
Prof Neil C. Rowe
Focus Area:
Law
VIDEO
2014
Cyberattacks as Casus Belli: A Sovereignty Based Account
Dr Patrick Taylor's talk 'Cyberattacks as Casus Belli: A Sovereignty Based Account' at the Workshop on Ethics and Policies for Cyber...
Authors:
Dr Patrick Taylor
Focus Area:
Law
VIDEO
2014
How to Apply the Principle of Porportionality to Cyber Targeting
Dr Marco Roscini's talk 'How to Apply the Principle of Porportionality to Cyber Targeting' at the Workshop on Ethics and Policies...
Authors:
Dr Marco Roscini
Focus Area:
Law
VIDEO
2014
Deterrence as the Basis for Ethical Constraints on Conflict in the Cyber Domain
Prof Paul Cornish's talk 'Deterrence as the Basis for Ethical Constraints on Conflict in the Cyber Domain' at the Workshop on...
Authors:
Prof Paul Cornish
Focus Area:
Strategy
VIDEO
2014
Open Source Intelligence, Open Social Intelligence and Privacy by Design. A meta-level Rule of Law?
Prof Pompeu Casanovas's talk 'Open Source Intelligence, Open Social Intelligence and Privacy by Design. A meta-level Rule of Law?' at the...
Authors:
Prof Pompeu Casanovas
Focus Area:
Law
VIDEO
2014
Technical Analysis of Advanced Threat Tactics Targeting Critical Information Infrastructure
Critical information infrastructure (CII) provides vital functions for a nation’s existence and the wellbeing of its citizens. This makes CII...
Authors:
Bernhards Blumbergs
PDF
2014
Locked Shields 2014 After Action Report: Executive Summary
Locked Shields is a real-time network defence exercise which in 2014 involved close to 300 participants from 17 nations. Running...
Authors:
NATO CCDCOE
Focus Area:
Operations
PDF
2014
From Active Cyber Defence to Responsive Cyber Defence: A Way for States to Defend Themselves-Legal Implications
This article explores, from a legal perspective, the possibility of states taking responsive measures that enhance their cyber defence capabilities....
Authors:
Pascal Brangetto
Jan Stinissen
Tomáš Minárik
Focus Area:
Law
Strategy
PDF
2014
Responsible Attribution: A Prerequisite for Accountability
In this new Tallinn Paper, Jeffrey Carr, an internationally recognised author and speaker on cyber conflict, the founder of the...
Authors:
Jeffrey Carr
Focus Area:
Law
Strategy
PDF
2014
Tallinn Paper: The Nature of International Law Cyber Norms
This article explores the nature, formation and evolution of international legal norms pertaining to cyber activities. At present, this category...
Authors:
Michael N. Schmitt
Liis Vihul
Focus Area:
Law
PDF
2014
Using Security Logs for Collecting and Reporting Technical Security Metrics
During recent years, establishing proper metrics for measuring system security has received increasing attention. Security logs contain vast amounts of...
Authors:
Mauno Pihelgas
Risto Vaarandi
Focus Area:
Technology
PDF
2014
Lilliputian States in Digital Affairs and Cyber Security
In this Tallinn Paper, Liina Areng, a Centre Ambassador and the Head of International Relations at the Estonian Information System Authority, discusses the...
Authors:
Liina Areng
Focus Area:
Strategy
PDF
2014
6th International Conference on Cyber Conflict. Proceedings 2014
Content missing.
Authors:
Pascal Brangetto
Markus Maybaum
Jan Stinissen (Eds.)
Focus Area:
Law
Strategy
Technology
Book
2014
The Liability of Software Manufacturers for Defective Products
The most effective and cost-efficient route to cyber security is the development of secure code. The fewer the vulnerabilities in...
Authors:
Liis Vihul
PDF
2014
NATO on Its Way Towards a Comfort Zone in Cyber Defence
This Tallinn Paper concentrates on the political principles related to cyber defence of NATO in the context of the Summit in 2014....
Authors:
Hannes Krause
PDF
2014
Pandemonium: Nation States, National Security, and the Internet
The first Tallinn Paper looks into numerous countries to record some of the most famous examples of international cyber attack and...
Authors:
Kenneth Geers
PDF
2014
Proxy Wars in Cyberspace. The Evolving International Law of Attribution
The article examines the use of non-State actors by States to conduct cyber operations against other States. In doing so,...
Authors:
Michael N. Schmitt
Liis Vihul
PDF
2014
IPv6 Transition and Security Threat Report
Internet Protocol version 6 (IPv6) is the next version of Internet Protocol which is currently in the transition phase from...
Authors:
Emin Çalışkan
PDF
2014
Peacetime Regime for State Activities in Cyberspace
The publication covers in a multi-disciplinary approach the technical, legal, policy and diplomacy aspects of State activities in cyberspace during...
Authors:
Dr Katharina Ziolkowski (Ed.)
Book
2014
Workshop on Ethics of Cyber Conflict. Proceedings
This publication is a compilation of articles and research presented at the Workshop on Ethics of Cyber Conflict’, held at the Centre for High...
Authors:
Ludovica Glorioso (Ed.)
Anna-Maria Osula (Ed.)
Book
2013
Cyber Defence Exercise Locked Shields 2013. After Action Report
Ten Blue Teams, consisting of up to 10 experts in IT and 1-2 legal advisors, were the main training audience....
PDF
2013
The Cyber Defence Unit of the Estonian Defence League: Legal, Policy and Organisational Analysis
The Cyber Defence Unit of the Estonian Defence League, or the ‘Estonian Cyber Defence League’ as it is widely referred...
Authors:
Kadri Kaska
Anna-Maria Osula
LTC Jan Stinissen
PDF
2013
A Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics
This paper focuses on open-source solutions for log management and discusses recent developments in this field, covering novel technologies and...
Authors:
Risto Vaarandi
Pawel Nizinski
PDF
2013
Confidence Building Measures for Cyberspace – Legal Implications
Content missing.
Authors:
Katharina Ziolkowski
PDF
2013
Detecting Anomalous Network Traffic in Organizational Private Networks
During the last decade, network monitoring and intrusion detection have become essential techniques of cyber security. Nowadays, many institutions are...
Authors:
Risto Vaarandi
2013
National Cyber Security Strategy Guidelines
The NATO CCD COE National Cyber Security Strategy Guidelines were developed in 2013 as a tool to assist policy planners...
Authors:
NATO CCDCOE
Focus Area:
Strategy
PDF
2013
5th International Conference in Cyber Conflict. Proceedings 2013
Content missing.
Authors:
Jan Stinissen
Karlis Podins
Markus Maybaum (Eds.)
Focus Area:
Law
Strategy
Technology
Book
2013
Violence, Just War and the Twofold Dimension of Cyber War
Dr Massimo Durante's (University of Turin) talk 'Violence, Just War and the Twofold Dimension of Cyber War. An Informational Approach'...
Authors:
Dr Massimo Durante
VIDEO
2013
Cyber Warfare - An Ethical Analysis to Address the Policy Vacuum
Dr Mariarosaria Taddeo's (University of Warwick and University of Oxford) talk 'Cyber Warfare, an Ethical Analysis to Adress the Policy...
Authors:
Dr Mariarosaria Taddeo
VIDEO
2013
By Disanalogy, Cyberwarfare is Utterly New
Prof. Selmer Bringsjord's (Rensselaer Polytechnic Institute) talk 'By Disanalogy, Cyberwarfare is Utterly New' at the Workshop on Ethics of Cyber...
Authors:
Prof. Selmer Bringsjord
VIDEO
2013
The Applicability of the Just War Tradition to Military Cyber Operations
Dr Edward Barrett's (United States Naval Academy) talk on 'Reliable Old Wineskins: The Applicability of the Just War Tradition to...
Authors:
Dr Edward Barrett
VIDEO
2013
The Ethics of Cyber-conflicts in Hyperhistorical Societies
Prof. Luciano Floridi's (Philosophy and Ethics of Information, Oxford Internet Institute, University of Oxford) talk on The Ethics of Cyber-conflicts...
Authors:
Prof. Luciano Floridi
Focus Area:
Strategy
VIDEO
2013
Cybersecurity Ethics at the Boundaries
Prof. Sandra Braman's (University of Wisconsin-Milwaukee) talk 'Cybersecurity Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual' at the...
Authors:
Prof. Sandra Braman
Focus Area:
Strategy
VIDEO
2013
Legal Issues of Autonomous Weapons
Prof. Giovanni Sartor's (University of Bologna and European University Institute of Florence) talk on 'Legal Issues of Autonomous Weapons' at...
Authors:
Prof. Giovanni Sartor
Focus Area:
Law
VIDEO
2013
Emerging Ethical and Legal Considerations in Cyberwarfare and Cyberespionage
Prof. Randall Dipert's (University of Buffalo) talk on 'Emerging Ethical and Legal Considerations in Cyberwarfare and Cyberespionage' at the Workshop...
Authors:
Prof. Randall Dipert
Focus Area:
Law
VIDEO
2013
The Ethical Basis of the Law
Dr Bill Boothby's (Geneva Centre for Security Policy) presentation at the Workshop on Ethics of Cyber Conflict. The workshop was organised...
Authors:
Dr Bill Boothby
Focus Area:
Law
VIDEO
2012
Application Level Attacks Study
The study looks into application-level attacks. An application-layer attack targets computers by deliberately causing a fault in a computer’s operating system or...
Authors:
Karlis Podins
Pablo Andreu Barasoain
PDF
2012
Cyber Defence Exercise Locked Shields 2012. After Action Report
Nine Blue Teams (defenders) representing small telecommunications companies had to defend a pre-built network against hostile attacks conducted by 40...
PDF
2012
Stuxnet - Legal Considerations
Legally assessing the implications of the creation, installation and control of the Stuxnet worm is especially challenging because of the lack...
Authors:
Katharina Ziolkowski
PDF
2012
Security Event Processing with Simple Event Correlator
The paper focuses on Simple Event Correlator (SEC) – a lightweight event correlator written by one of the authors which...
Authors:
Risto Vaarandi
Michael R. Grimaila
2012
A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict
Throughout history, mankind has developed and employed novel weapon systems and equally novel countermeasures. Naturally, both offensive and defensive systems...
Authors:
Karlis Podins
Christian Czosseck
LINK
2012
Legal Implications of Countering Botnets
Information security specialists have developed various techniques and methods to reduce the threat that botnets pose to the security of...
Authors:
Liis Vihul
Christian Czosseck
Katharina Ziolkowski
Lauri Aasmann
Ivo A. Ivanov
Sebastian Brüggemann
Focus Area:
Law
Technology
PDF
2012
Conficker: Considerations in Law and Legal Policy
While the present paper will give a short synopsis of the known facts about the spread and characteristics of Conficker,...
Authors:
Kadri Kaska
Focus Area:
Law
PDF
2012
Stuxnet Facts Report. A Technical and Strategic Analysis
At some time in every developing technology, a new outcome will mark an important step and will be remembered as...
Authors:
Marco De Falco
PDF
2012
Strategic Cyber Defense: Which Way Forward?
Cyber security has evolved from a technical discipline to a strategic, geopolitical concept. The question for national security thinkers today...
Authors:
Kenneth Geers
Focus Area:
Strategy
2012
Evaluation of Nation-state Level Botnet Mitigation Strategies Using DEMATEL
Botnets have been recognised as a possible threat to national security, and over recent years national cyber security thinkers have...
Authors:
Christian Czosseck
LINK
2012
4th International Conference on Cyber Conflict. Proceedings 2012
CyCon 2013 conference concentrates on technical, strategic and legal implications of using automatic methods in cyber conflicts. The three-day conference,...
Authors:
Christian Czosseck
Katharina Ziolkowski (Eds.)
Rain Ottis
Focus Area:
Law
Operations
Strategy
Technology
Book
2012
National Cyber Security Framework Manual
What, exactly, is “National Cyber Security”? The rise of cyberspace as a field of human endeavour is probably nothing less...
Authors:
Alexander Klimburg (Ed.)
Book
2011
Methods for Detecting Important Events and Knowledge from Data Security Logs
In modern computer networks and IT systems, event logging is commonly used for collecting system health information, in order to...
Authors:
Risto Vaarandi
2011
Ten Rules for Cyber Security
Politically and ideologically motivated cyber attacks on critical infrastructure have been a wake-up call for security experts and have shown...
Authors:
Eneken Tikk
2011
International Criminal Cooperation in the Context of Cyber Incidents
The borderless and increasingly sophisticated nature of cyber crime calls for effective and timely responses from numerous stakeholders worldwide –...
Authors:
Anna-Maria Talihärm (Osula)
2011
Theoretical Offensive Cyber Militia Models
Volunteer based non-state actors have played an important part in many international cyber conflicts of the past two decades. In...
Authors:
Rain Ottis
2011
Composition of Services on Hierarchical Service Models
In this paper the authors introduce hierarchical service models suitable for large service parks. They describe a method for handling...
Authors:
Riina Maigre
Enn Tõugu
2011
Applying Time-dependent Algebraic Systems for Describing Situations
Situation management requires means for describing various things, both situation states and developments. For this reason the authors turn to...
Authors:
Peeter Lorents
Erika Matsak
2011
Evolutionary Algorithms for Optimal Selection of Security Measures
A very important issue in IT Security or Cyber Security management is to provide cost-efficient security measures to achieve needed...
Authors:
Jüri Kivimaa
Toomas Kirt
Focus Area:
Technology
LINK
2011
Sun Tzu and Cyber War
Cyberspace is a new warfare domain. Computers and the information they contain are prizes to be won during any military...
Authors:
Kenneth Geers
Focus Area:
Strategy
PDF
2011
Heading off Hackers
Computers and computer networks have provided a new delivery mechanism that can increase the speed, diffusion and significance of national...
Authors:
Kenneth Geers
PDF
2011
Estonia After the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security
At the time of the state-wide cyber attacks in 2007, Estonia was one of the most developed nations in Europe...
Authors:
Christian Czosseck
Rain Ottis
Anna-Maria Talihärm (Osula)
Focus Area:
Law
Strategy
LINK
2011
An Usage-Centric Botnet Taxonomy
Botnets have been a recognized threat to computer security for years. On the timeline of malware development, they can be...
Authors:
Christian Czosseck
Karlis Podins
LINK
2011
Quantitative System Reliability Approach for Optimizing IT Security Costs in an AI Environment
The Graded Security Model (GSM) addresses the IT Security cost optimization, problem by trying to find an answer to the...
Authors:
Geert Alberghs
Pavel Grigorenko
Jüri Kivimaa
2011
Strategic Cyber Security
Book details: Author: Kenneth Geers Publisher: NATO CCD COE Publications, 2011 Language: English ISBN 978-9949-9040-5-1 (print) ISBN 978-9949-9040-6-8 (epub) ISBN...
Authors:
Kenneth Geers
Book
2011
3rd International Conference on Cyber Conflict. Proceedings 2011
The NATO Cooperative Cyber Defence Centre of Excellence will hold its annual international cyber defence conference with 300 participants from...
Authors:
Christian Czosseck
Enn Tõugu
Thomas Wingfield (Eds.)
Focus Area:
Law
Operations
Strategy
Technology
Book
2010
Current Trends in Botnet Development and Defense Expert Opinion
In this study, the authors give an overview about current trends in botnet development and defense. They start off by...
Authors:
Felix Leder
Gabriel Klein
PDF
2010
Knowledge and Information
The article studies the role of fundamental concepts and principles from the viewpoint of the reliability of applied intelligent systems....
Authors:
Peeter Lorents
2010
From Chaos to Collective Defense
There are essentially two types of arms control: structural, which limits things such as missiles and tanks, and operational, which...
Authors:
Eneken Tikk
James Bret Michael
Peter Wahlgren
Thomas C. Wingfield
Focus Area:
Law
Strategy
LINK
2010
Baltic Cyber Shield Cyber Defence Exercise 2010 After Action Report
The aim of the exercise was to increase the understanding of the international cyber environment and to enhance international cooperation...
Focus Area:
Operations
PDF
2010
Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering
Network IDS is a well-known security measure for network monitoring and protection. Unfortunately, IDSs are known to generate large amounts...
Authors:
Risto Vaarandi
Karlis Podins
Focus Area:
Technology
LINK
2010
Detection of Illegal Gateways in Protected Networks
The authors discuss possible solutions for illegal gateway detection in protected networks. They describe several techniques for addressing this problem, and...
Authors:
Risto Vaarandi
Karlis Podins
PDF
2010
Enhancing Response Selection in Impact Estimation Approaches
The number of attacks against computer systems is steadily increasing. Network administration personnel often have a wide variety of response...
Authors:
Gabriel Klein
Andres Ojamaa
Pavel Grigorenko
Marko Jahnke
Enn Tõugu
Focus Area:
Technology
PDF
2010
Legal Cooperation to Investigate Cyber Incidents: Estonian Case Study and Lessons
To investigate and prosecute the 2007 cyber attacks against its governmental and critical private information infrastructure, Estonia requested legal cooperation...
Authors:
Eneken Tikk
Kadri Kaska
Focus Area:
Law
PDF
2010
Global Cyber Security - Thinking About The Niche for NATO
This paper examines developments in the legal and policy framework for international cyber security. It elaborates on major international organizations’...
Authors:
Eneken Tikk
Focus Area:
Law
Strategy
LINK
2010
Frameworks for International Cyber Security
Content missing.
Authors:
Eneken Tikk (Ed.)
Focus Area:
Law
Strategy
Book 1
Book 2
2010
Cyber Terrorism: in Theory or in Practice?
Numerous attempts to define cyber terrorism have not resulted in a commonly accepted interpretation. Cyber terrorism is frequently discussed in...
Authors:
Anna-Maria Talihärm (Osula)
Focus Area:
Law
2010
The Virtual Battlefield: Perspectives on Cyber Warfare (Proceedings 2009)
The conference agenda consisted of 29 presentations from 13 countries, given by some of the best and brightest minds in...
Authors:
Christian Czosseck
Kenneth Geers (Eds.)
Focus Area:
Law
Strategy
Technology
Book
2010
Proactive Defence Tactics Against On-Line Cyber Militia
There is a developing trend of “popular” cyber campaigns that mirror political, economic or military conflicts in cyberspace. The Estonian...
Authors:
Rain Ottis
2010
Cyberspace: Definition and Implications
The term “cyber” has been used to describe almost anything that has to do with networks and computers, especially in...
Authors:
Peeter Lorents
Rain Ottis
2010
System Mining Inference Rules from Natural Language Texts
The ability to use logical deduction is important for various intelligent systems. Specifically, the ability to apply logic inference rules...
Authors:
Peeter Lorents
Erika Matsak
2010
Digital Solutions for Inference Rules in Decision-supporting Systems
In this paper, the authors discuss the use of digital circuits in decision support systems. For this, it is first...
Authors:
Peeter Lorents
Erika Matsak
2010
Live Fire Exercise: Preparing for Cyber War
In May 2010, the Cooperative Cyber Defence Centre of Excellence and the Swedish National Defence College hosted the Baltic Cyber...
Authors:
Kenneth Geers
2010
Cyber Weapons Convention
World leaders are beginning to look beyond temporary fixes to the challenge of securing the Internet. One possible solution may...
Authors:
Kenneth Geers
Focus Area:
Strategy
LINK
2010
The Challenge of Cyber Attack Deterrence
National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include...
Authors:
Kenneth Geers
Focus Area:
Strategy
LINK
2010
A Brief Introduction to Cyber Warfare
Twenty-five years after War Games, cyber attacks remain somewhat of a mystery. Specifically, is computer hacking a threat to national...
Authors:
Kenneth Geers
Focus Area:
Strategy
2010
Conference on Cyber Conflict. Proceedings 2010
The publication includes the proceedings of the first interdisciplinary conference organised by the Centre where the topic of cyber conflict...
Authors:
Christian Czosseck
Karlis Podins (Eds.)
Focus Area:
Law
Strategy
Technology
Book
2010
International Cyber Incidents: Legal Considerations
Table of Contents: ESTONIA 2007 RADIO FREE EUROPE/RADIO LIBERTY 2008 LITHUANIA 2008 GEORGIA 2008 CONCLUSIONS. GENERAL OBSERVATIONS FROM CYBER CONFLICTS...
Authors:
Eneken Tikk
Kadri Kaska
Liis Vihul
Focus Area:
Law
Book
2009
Real-time Classification of IDS Alerts with Data Mining Techniques
Abstract: During the last decade, intrusion detection systems (IDSs) have become a widely used measure for security management. However, these...
Authors:
Risto Vaarandi
Focus Area:
Technology
PDF
2009
Lattices of Knowledge Systems
This paper uses an abstract form of knowledge representation and introduces knowledge lattices. A formal concept of knowledge system is...
Authors:
Peeter Lorents
Enn Tõugu
Focus Area:
Technology
PDF
2010
International Cyber Security Legal & Policy Proceedings
The conference was aimed at promoting closer collaboration among the international community of leaders and experts in government, private sector,...
Authors:
Eneken Tikk
Anna-Maria Talihärm (Osula) (Eds.)
Focus Area:
Law
Book
2009
Defining Critical Information Infrastructure in the Context of Cyber Threats: The Privacy Perspective
Cyber incidents may range anywhere from simple deviations from internal security regulations to criminal acts, acts of cyber terrorism, and...
Authors:
Eneken Tikk
Focus Area:
Law
PDF
2009
Cellular Warfare
In this paper the possibilities of cyber warfare activities connected to cell phone networks are. We analyze known attacks that...
Authors:
Karlis Podins
Focus Area:
Technology
PDF
2009
Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability
Recent events in Estonia and Georgia have elevated the threat of cyber attacks to the international consciousness. While this has...
Authors:
Rain Ottis
Focus Area:
Strategy
PDF
2009
Cyber Society and Cooperative Cyber Defence
Emergence of cyber societies places new emphasis on the protection of information and information services. The paper provides a definition...
Authors:
Peeter Lorents
Rain Ottis
Raul Rikk
Focus Area:
Strategy
PDF
2009
Managing Evolving Security Situations
A method is described that takes into account the investments done in the security and/or achieved security confidence in planning...
Authors:
Jüri Kivimaa
Andres Ojamaa
Enn Tõugu
Focus Area:
Operations
Technology
PDF
2009
Graded Security Expert System
A method for modeling graded security is presented and its application in the form of a hybrid expert system is...
Authors:
Jüri Kivimaa
Andres Ojamaa
Enn Tõugu
Focus Area:
Technology
PDF
2009
The Cyber Threat to National Critical Infrastructures: Beyond Theory
Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from...
Authors:
Kenneth Geers
Focus Area:
Strategy
PDF
2009
Applying a Cost Optimizing Model for IT Security
Information security is a growing priority for organizations, many of which are struggling to decide the appropriate amounts of investments...
Authors:
Jüri Kivimaa
Focus Area:
Technology
PDF
2008
Mining Event Logs with SLCT and LogHound
With the growth of communication networks, event logs are increasing in size at a fast rate. Today, it is not...
Authors:
Risto Vaarandi
Focus Area:
Technology
PDF
2008
Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective
Following the relocation of a Soviet-era statue in Tallinn in April of 2007, Estonia fell under a politically motivated cyber...
Authors:
Rain Ottis
Focus Area:
Strategy
Technology
PDF
2008
Cyberspace and the Changing Nature of Warfare
Aggressive cyber warfare strategies and tactics offer many advantages to their prospective employers, and current events demonstrate that cyber conflict...
Authors:
Kenneth Geers
Focus Area:
Strategy
PDF
Publications
INCYDER
Strategy and Governance
Clear filter
Filter
Type:
Article
Book
Paper
Report
Short Analysis
Video
Focus areas:
Law
NATO
Operations
Policy
Strategy
Technology
UN
Years:
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
Authors:
A. Ertan
Adam Botek
Agostino Panico
Ahmet Balci
Alar Kuusik
Alejandro Granja
Aleksi Kajander
Alexander Cendoya
Alexander Klimburg (Ed.)
Alexander Kott
Alexander Verschoor-Kirss
Alexandra Sergueeva
Alexandria Farar
Alivia Coon
Alvaro Botas Munoz
Alžběta Bajerová
Amy Ertan
Amy Ertran
Andreas Palm
Andres Ojamaa
Andrii Davydiuk
Ann Väljataga
Ann Väljataga (Ed.)
Anna-Maria Osula
Anna-Maria Osula (Ed.)
Anna-Maria Talihärm (Osula)
Anna-Maria Talihärm (Osula) (Eds.)
Arthur Oliver Thomson
Artūrs Lavrenovs
Asaf Lubin
Aurimas Kuprys
Ben Valk
Benoît LeBlanc
Berend Valk
Bernhards Blumbergs
CCDCOE Contributors
CCDCOE Law Branch Researchers
CCDCOE Researchers
CCDCOE Strategy and Law Branch researchers
CCDCOE Strategy and Operations Branch researchers
CCDCOE Strategy and Tech Branch researchers
CCDCOE Strategy Branch researchers
CDR. Robert Buckles
Christian Braccini
Christian Czosseck
Co-publication of 12 partner organisations facilitated by ITU
Co-publication with partner organisations facilitated by ITU
Colonel David Wallace
Corinne J.N. Cath
Costel-Marius Gheorghevici
D. Gao
Damjan Štrucl
Dan Ungureanu
Daniel P. Bagge
David van Weel
Davide Giovannelli
Deborah Housen-Couriel
Dominik Skokowski
Dominik Zachar
Dr Bill Boothby
Dr Edward Barrett
Dr Jassim Happa
Dr Katharina Ziolkowski (Ed.)
Dr Marco Roscini
Dr Mariarosaria Taddeo
Dr Massimo Durante
Dr Patrick Taylor
Dr Sana Saleh
Dr. Joe Burton
Edward Kim
Elaine Korzak
Emin Çalışkan
Emre
Emre Halisdemir
Eneken Tikk
Eneken Tikk (Ed.)
Enn Tõugu
Enrique Diez
Ensar Şeker
Erika Matsak
Erwin Orye
Experts experts from the Romanian Intelligence Service and the Ministry of National Defence
Experts from the Romanian Intelligence Service and the Ministry of National Defence
Fabio Biondi
Federico Clemente
Felix Leder
Francisco Jesús Rubio Melón
Franz-Stefan Gady
Frederico Clemente
G. Hage
gabor
Gabor Visky
Gabriel Klein
Garret Derian-Toth
Garrett Derian-Toth
Geert Alberghs
George Christou
Gergely Szentgáli
Giuseppe Buonocore
Grete Toompere
Gry-Mona Nordli
Gunnar Faith-Ell
H.Rõigas
Hannes Krause
Hayretdin Bahşi
Hendrik Ploom
Henrik Beckvard
Henrik Beckvard (Ed.)
Henry Rõgas
Henry Rõigas
Henry Rõigas (Eds.)
Henry Wu
Hilda Hadan
Ihsan Burak Tolga
Ihsan Tolga
Ingrid Winther
Ivo A. Ivanov
Izabela Albrycht
James A. Lewis
James Bret Michael
Jan Stinissen
Jan Stinissen (Eds.)
Jan Wünsche
Jared Stancombe
Jaromir Vondruška
Jason Healey
Jeffrey Carr
Jeremy K. Davis
Jesse Wojtkowiak
Joanna Świątkowska
Joep Aarts
Josh Gold
Jüri Kivimaa
K. Floyd
K. Hoving
K. Pelletier
K. Rachamallu
Kadri Kaska
Kadri Kaska (Ed.)
Kadri Peeters
Kaie Maennel
Karina Filipczak
Karlis Podins
Karlis Podins (Eds.)
Katharina Ziolkowski
Katharina Ziolkowski (Eds.)
Katriina Härma
Katrin Nyman Metcalf
Keiko Kono
Kenneth Geers
Kenneth Geers (Ed.)
Kenneth Geers (Eds.)
Kimmo Heinäaro
Kris van der Meij
Krzysztof Rzadca
László Kovács
Laura G. Brent
Lauri Aasmann
Lauri Lindström
Lauri Lindström (Eds.)
Lea Hriciková
Liina Areng
Liina Lumiste (née Hirv)
Liis Vihul
Lisa Catherina Schauss
Lisa Schauss
Lorena Trinberg
Lt. Col. Aurimas Kuprys
Lt. Col. Gry-Mona Nordli
LTC Jan Stinissen
Lucie Kadlecová
Ludovica Glorioso
Ludovica Glorioso (Ed.)
Ludovica Glorioso (Eds.)
Luigi Mancini
Lukas Bortnik
M. Zoetekouw
M.Veenendaal (Eds.)
Maarja Naagel
Maggie Gray
Marcel Scherrenburg
Marco De Falco
Mari Kert-Saint Aubyn
Maria Rosaria Taddeo
Maria Tolppa
Mariarosaria Taddeo
Mario Huis in ‘t veld
Marko Jahnke
Markus Kont
Markus Maybaum
Markus Maybaum (Eds.)
Marta Stroppa
Marten Zwanenburg
Martin Drašar
Massimiliano Signoretti
Matthijs Veenendaal
Mauno Pihelgas
Michael N. Schmitt
Michael P. Fischerkeller
Michael R. Grimaila
Michael Widmann
Michaela Prucková
Michaela Semecká
Michal Sadloň
Mikk Raud
N. Perez
N.Pissanidis
NATO CCDCOE
Nikolaos Pissanidis
Olaf M. Maennel
Oleksandr Potii
P. Pernik
Pablo Andreu Barasoain
Pascal Brangetto
Patrycjusz Zdzichowski
Paul Theron
Pavel Grigorenko
Pawel Nizinski
Peeter Lorents
Peter Wahlgren
Philippe Mitsuya Zotz
Philippe Zotz
Pilleriin Lillemets
Piret Pernik
Prof Neil C. Rowe
Prof Paul Cornish
Prof Pompeu Casanovas
Prof. Giovanni Sartor
Prof. Luciano Floridi
Prof. Randall Dipert
Prof. Sandra Braman
Prof. Selmer Bringsjord
Raik Jakschis
Rain Liivoja
Rain Liivoja (Ed.)
Rain Ottis
Raul Rikk
Richard Matthews
Riina Maigre
Risto Vaarandi
Rokas Šalaševičius
Rónán O’Flaherty
Russell Buchan
Ryan Walsh
S. Workinger
Samuele De Tomas Colatin
Sebastian Brüggemann
Sebastian Cymutta
Steven van de Put
Sungbaek Cho
Sungbaek Cho; Kārlis Podiņš; Damjan Štrucl; Urmet Tomp; Grete Toompere; Ingrid Winther;
T. Lawrence
T. Liu
T. Sterns
T. Stevens Eds.
Taťána Jančárková
Teemu Uolevi Väisänen
Teemu Väisänen
Thomas C. Wingfield
Thomas Wingfield (Eds.)
Tomáš Minárik
Tomáš Minárik (Eds.)
Tony Lawrence
Toomas Kirt
Toomas Lepik
Torsten Corall
Urmas Ruuto
Urmet Tomp
Václav Borovička
Vasco Prates
Vasileios Anastopoulos
Veeli Oeselg
Veronika Datzer
Virpratap Vikram
Vytautas Butrimas
Wolff Heintschel von Heinegg