02065oam 2200553 450 991071537010332120210219080521.0(CKB)5470000002510331(OCoLC)680242606(OCoLC)621824184(OCoLC)667911770(OCoLC)974646848(OCoLC)1153330007(OCoLC)995470000002510331(EXLCZ)99547000000251033120101110d1990 ua 0engurbn|||||||||txtrdacontentcrdamediacrrdacarrierEstimates of ground-water flow components for Lyman Lake, Apache County, Arizona /by Donald J. Bills and H.W. Hjalmarson ; with a section on Geochemistry of surface water and ground water in the Lyman Lake area, by Frederick N. Robertson ; prepared in cooperation with the Salt River ProjectTucson, Arizona :U.S. Geological Survey,1990.1 online resource (v, 55 pages) illustrations, mapsWater-resources investigations report ;89-4151Includes bibliographical references (pages 53-55).Geochemistry of surface water and ground water in the Lyman Lake areaGroundwater flowArizonaApache CountyHydrogeologyArizonaApache CountyGroundwater flowfastHydrogeologyfastLyman Lake (Ariz.)Groundwater flowHydrogeologyGroundwater flow.Hydrogeology.Bills Donald J.1387261Hjalmarson H. W.Robertson Frederick N.Geological Survey (U.S.),Salt River Project.OCLCEOCLCEOCLCQOCLCOOCLCQCOPOCLCFGPOBOOK9910715370103321Estimates of ground-water flow components for Lyman Lake, Apache County, Arizona3527562UNINA04149oam 2200457zu 450 991013083150332120241212220409.097899499040999949904099(CKB)3420000000000597(SSID)ssj0000781114(PQKBManifestationID)12386125(PQKBTitleCode)TC0000781114(PQKBWorkID)10803381(PQKB)10981283(NjHacI)993420000000000597(EXLCZ)99342000000000059720160829d2012 uy engur|||||||||||txtccr2012 4th International Conference on Cyber Conflict[Place of publication not identified]IEEE20121 online resource (viii, 453 pages) illustrationsBibliographic Level Mode of Issuance: Monograph9781467312707 1467312703 Legal implications of territorial sovereignty in cyberspace / Wollff Heintschel von Heinegg When "Not my problem" isn't enough: political neutrality and national responsibility in cyber conflict / Jason Healey Neutrality in cyberspace / Wolff Heintschel von Heinegg Impact of cyberspace on human rights and democracy / Vittorio Fanchiotti, Jean Paul Pierini Russia's public stance on cyber/information warfare / Keir Giles French cyberdefense policy / Patrice Tromparent A treaty for governing cyber-weapons: potential benefits and practical limitations / Louise Arimatsu Internet as a critical infrastructure: a framework for the measurement of maturity and awareness in the cyber sphere / Assaf Y. Keren, Keren Elazari The significance of attribution to cyberspace coercion: a political perspective / Forrest Hare The militarisation of cyberspace: why less may be better / Myriam Dunn Cavelty Beyond domains, beyond commons: the context and theory of conflict in cyberspace / Jeffrey L. Caton Applying traditional military principles to cyber warfare / Samuel Liles, J. Eric Dietz, Marcus Rogers, Dean Larson The principle of maneuver in cyber operations / Scott D. Applegate Countering the offensive advantage in cyberspace: an integrated defensive strategy / David T. Fahrenkrug An analysis for a just cyber warfare / Mariarosaria Taddeo Socially engineered commoners as cyber warriors: Estonian future or present? / Birgy Lorenz, Kaido Kikkas The notion of combatancy in cyber warfare / Sean Watts Direct participation in cyber hostilities: terms of reference for like-minded states? / Jody Prescott Attack trends in present computer networks / Robert Koch, Björn Stelte, Mario Golling "Attack" as a term of art in international law: the cyber operations context / Michael N. Schmitt Ius ad bellum in cyberspace: some thoughts on the "Schmitt-criteria" for use of force / Katharina Ziolkowski The "Use of force" in cyberspace: a reply to Dr. Ziolkowski / Michael N. Schmitt A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict / Robert Fanelli, Gregory Conti Command and control of cyber weapons / Enn Tyugu A case study on the Miner botnet / Daniel Plohmann, Elmar Gerhards-Padilla Natural privacy preservation protocol for electronic mail / Kim Hartmann, Christoph Steup Paradigm change of vehicle cyber-security / Hiro Onishi Sensing for suspicion at scale: a Bayesian approach for cyber conflict attribution and reasoning / Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James The role of COTS products for high security systems / Robert Koch, Gabi Dreo Rodosek Conceptual framework for cyber defense information sharing within trust relationships / Diego Fernández Vázquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid.Computer securityCongressesCyberterrorismComputer securityCyberterrorism.005.8IEEE StaffPQKBPROCEEDING99101308315033212012 4th International Conference on Cyber Conflict2497277UNINA