Dr Clement Guitton
Title
Cited by
Cited by
Year
A review of the available content on Tor hidden services: The case against further development
C Guitton
Computers in Human Behavior 29 (6), 2805-2815, 2013
472013
Cyber insecurity as a national threat: overreaction from Germany, France and the UK?
C Guitton
European Security 2 (1), 21-35, 2012
472012
Criminals and Cyber Attacks: The Missing Link Between Attribution and Deterrence.
C Guitton
International Journal of Cyber Criminology 6 (2), 2012
352012
The sophistication criterion for attribution: Identifying the perpetrators of cyber-attacks
C Guitton, E Korzak
The RUSI Journal 158 (4), 62-68, 2013
332013
Inside the Enemy's Computer: Identifying Cyber-attackers
C Guitton
Oxford University Press, 2017
162017
Emotions estimation from eeg recordings
C Guitton
London: Imperial Collage of Science, Technology & Medicine Department of …, 2010
72010
Achieving Attribution
C Guitton
King's College London, 2014
62014
Beyond appearances: cooperation, structure, and constraints of the Swiss intelligence service
C Guitton
Journal of Policing, Intelligence and Counter Terrorism 12 (2), 175-189, 2017
32017
Foiling cyber attacks
C Guitton
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
32017
A Typology of Automatically Processable Regulation
SM Clement Guitton, Aurelia Tamò-Larrieux
Law, Innovation, and Technology 14 (2), 2022
2022
Der Schweizer Nachrichtendienst seit der Fichenaffäre
C Guitton
2018
The Evidence Supporting the Fear of Chinese Telecommunication Providers
C Guitton
e-International Relations, 2012
2012
Preventing State Conflict in Cyberspace
C Guitton
A Global Village, 29-33, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–13