A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar - ACM Computing Surveys, 2023 - dl.acm.org
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …

Threat defense: Cyber deception approach and education for resilience in hybrid threats model

W Steingartner, D Galinec, A Kozina - Symmetry, 2021 - mdpi.com
This paper aims to explore the cyber-deception-based approach and to design a novel
conceptual model of hybrid threats that includes deception methods. Security programs …

Multi-domain effects and the internet of battlefield things

S Russell, T Abdelzaher, N Suri - MILCOM 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
This paper reviews the definitions and characteristics of military effects, the Internet of
Battlefield Things (IoBT), and their impact on decision processes in a Multi-Domain …

[PDF][PDF] Cyber threats and cyber deception in hybrid warfare

W Steingartner, D Galinec - Acta Polytechnica Hungarica, 2021 - epa.niif.hu
Paper deals with the design of the model of hybrid threats and cyber deception platform and
solution for cyber threat detection. National networks face a broad range of cyber threats. It …

Should 'RuNet 2020'be taken seriously? Contradictory views about cyber security between Russia and the West

M Ristolainen - Journal of information warfare, 2017 - JSTOR
Russia aims to create an independent state information system that ensures the network's
overall stability by controlling the Internet routing architecture inside Russia. A tightly …

Strategic studies and cyber warfare

S Zilincik, I Duyvesteyn - Journal of Strategic Studies, 2023 - Taylor & Francis
This article explores the fashion/popularity of the idea that the exercise of cyber power is a
form of warfare. Specifically, the article explains the recent decline of the cyber warfare …

[图书][B] Routledge companion to global cyber-security strategy

SN Romaniuk, M Manjikian - 2021 - books.google.com
This companion provides the most comprehensive and up-to-date comparative overview of
the cyber-security strategies and doctrines of the major states and actors in Europe, North …

[PDF][PDF] Cyber threats: taxonomy, impact, policies, and way forward.

AW Malik, A Abid, S Farooq, I Abid, NA Nawaz… - KSII Transactions on …, 2022 - itiis.org
The continuous evolution and proliferation of computer technology and our increasing
dependence on computer technology have created a new class of threats:" cyber threats." …

A computational ontology for cyber operations

C Maathuis, W Pieters… - Proceedings of the 17th …, 2018 - books.google.com
Due to the advancement of technology and continuing emergence of international conflict
situations, wars are now also conducted into the official new battlefield: cyberspace …

The multi-domain operations effect loop: from future concepts to research challenges

T Abdelzaher, A Taliaferro, P Sullivan… - … Machine Learning for …, 2020 - spiedigitallibrary.org
In a defense landscape driven by increasing automation, larger operation scale, higher op-
tempo, and tighter integrations across multiple domains, how do emerging advances in …