Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace
Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N., Williams, C.
Journal: Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience Csr 2024
Publication Date: 01/01/2024
Pages: 726-731
DOI: 10.1109/CSR61664.2024.10679440
Abstract:Conscientious military attackers deciding to perform targeted Electromagnetic attacks have an ethical problem because their actions may adversely impact non-target victim systems. Their decision-making process should account for the assessed risk to victim systems before engaging in Electromagnetic attacks. In short: Risk-Informed Decision-Making within a complex, dynamic, uncertain environment involving Systems-of-Systems is essential. But how is the related risk assessment performed? This paper identifies some important foundations for modelling this context.
https://eprints.bournemouth.ac.uk/40544/
Source: Scopus
Foundations for modelling conscientious attacking in electromagnetic cyberspace
Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N., Williams, C.
Journal: 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR
Publication Date: 2024
Pages: 726-731
DOI: 10.1109/CSR61664.2024.10679440
https://eprints.bournemouth.ac.uk/40544/
Source: Web of Science
Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace
Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N., Williams, C.
Conference: 2024 IEEE International Conference on Cyber Security and Resilience (CSR)
Dates: 02/09/2024
Publication Date: 22/09/2024
DOI: 10.1109/CSR61664.2024.10679440
Abstract:Conscientious military attackers deciding to perform targeted Electromagnetic attacks have an ethical problem because their actions may adversely impact non-target victim systems. Their decision-making process should account for the assessed risk to victim systems before engaging in Electromagnetic attacks. In short: Risk-Informed Decision-Making within a complex, dynamic, uncertain environment involving Systems-of-Systems is essential. But how is the related risk assessment performed? This paper identifies some important foundations for modelling this context.
https://eprints.bournemouth.ac.uk/40544/
Source: Manual