[PDF][PDF] Ontology-based Automation of Penetration Testing.

G Chu, A Lisitsa - ICISSP, 2020 - scitepress.org
Ontology is a widely used knowledge representation formalism in artificial intelligence area
in recent years. In this paper, we propose an ontology-based automated penetration testing …

[PDF][PDF] A cyber threat model of a nation cyber infrastructure based on goel-okumoto port approach

F Ogîgău-Neamțiu, H Moga - Land Forces Academy Review, 2018 - sciendo.com
Information assurance plays a critical role in modern countries around the globe and IT
systems are key elements in this environment. Enabling or disabling such capabilities are …

[PDF][PDF] Refined Concepts of Massive and Flexible Cyber Attacks with Information Warfare Strategies.

H Moga, M Boscoianu, DA Ungureanu, FD Sandu… - J. Commun., 2017 - jocm.us
The purpose of this research is to deepen the concepts of massive and respectively flexible
cyber-attacks. These two concepts have been connected with three macroeconomic …

Using BDI agents in flexible patterns for cyber-attacks over electrical power infrastructures

H Moga, M Boşcoianu, D Ungureanu… - Applied Mechanics …, 2016 - Trans Tech Publ
This work aims to assess how the infrastructure of production & transport of the electric
energy can be annihilated in a nation-state through a cyber attack, as a particular form of …

[PDF][PDF] Poliheurisitc Approach of Cyberwarfare Based on Cyber Power Index

H Moga, A Luchian, R Boboc - AFASES 2019, 2019 - afahc.ro
This research paper presents a merging way for study the cyberwarfare based on two
theoretical approaches. The first one poliheuristic approach proposed by Alex Mintz in study …

[PDF][PDF] Toward a Bounded Rationality Approach of Cyberwarfare

H Moga, A Luchian, R Boboc - Review of the Air Force Academy, 2019 - 213.177.9.66
Research seeks a cognitive alternative to current rationalist studies on cyberwarfare. The
purpose of this study is to present the cultural and intentional boundaries in the rationality of …

Network of Unmanned Systems Cyber Attacks over National Economy Infrastructures

H Moga, M Boşcoianu, D Ungureanu… - Applied Mechanics …, 2017 - Trans Tech Publ
This paper aims to analyze the resource management of a Network of Unmanned Systems
(NUMS-sensor network system), using a BDI (belief–desire–intention) agent algorithm in …

Poliheuristic Approach of Hybrid Warfare Actions Based on Information Warfare Canonic Strategies

H Moga, AM Bolborici, EV Constantinescu - Bulletin of the Transilvania …, 2018 - ceeol.com
This research aims to provide a poliheuristic approach of the decisions that form the
foundation of hybrid war acts which have a strong component of informational war. Through …

[引用][C] Harnessing Kali Linux for Advanced Penetration Testing and Cybersecurity Threat Mitigation

N Richardson, VK Yarlagadda, SKR Anumandla… - Am. Digit. J. Comput. Digit …, 2024