Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace

Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N., Williams, C.

Journal: Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience Csr 2024

Publication Date: 01/01/2024

Pages: 726-731

DOI: 10.1109/CSR61664.2024.10679440

Abstract:

Conscientious military attackers deciding to perform targeted Electromagnetic attacks have an ethical problem because their actions may adversely impact non-target victim systems. Their decision-making process should account for the assessed risk to victim systems before engaging in Electromagnetic attacks. In short: Risk-Informed Decision-Making within a complex, dynamic, uncertain environment involving Systems-of-Systems is essential. But how is the related risk assessment performed? This paper identifies some important foundations for modelling this context.

https://eprints.bournemouth.ac.uk/40544/

Source: Scopus

Foundations for modelling conscientious attacking in electromagnetic cyberspace

Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N., Williams, C.

Journal: 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR

Publication Date: 2024

Pages: 726-731

DOI: 10.1109/CSR61664.2024.10679440

https://eprints.bournemouth.ac.uk/40544/

Source: Web of Science

Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace

Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N., Williams, C.

Conference: 2024 IEEE International Conference on Cyber Security and Resilience (CSR)

Dates: 02/09/2024

Publication Date: 22/09/2024

DOI: 10.1109/CSR61664.2024.10679440

Abstract:

Conscientious military attackers deciding to perform targeted Electromagnetic attacks have an ethical problem because their actions may adversely impact non-target victim systems. Their decision-making process should account for the assessed risk to victim systems before engaging in Electromagnetic attacks. In short: Risk-Informed Decision-Making within a complex, dynamic, uncertain environment involving Systems-of-Systems is essential. But how is the related risk assessment performed? This paper identifies some important foundations for modelling this context.

https://eprints.bournemouth.ac.uk/40544/

Source: Manual