Filters








3,695 Hits in 4.7 sec

Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge [article]

Marco Antonio Sotelo Monge, Jorge Maestre Vidal
2021 arXiv   pre-print
On these grounds, the main purpose of the conducted research is to review and in depth analyze the risks and opportunities of jeopardizing the sustainability of the military tactical clouds at the edge  ...  Along with a 1) comprehensively formulation of the researched problematic, the study 2) formalizes the Tactical Denial of Sustainability (TDoS) concept; 3) introduces the phasing, potential attack surfaces  ...  of a specific family of cyber threats to the Tactical Cloud concept: the Economical Denial of Sustainability (EDoS) attacks; and their evolution on the military context as Tactical Denial of Sustainability  ... 
arXiv:2101.08676v1 fatcat:y76tm3syjjgzrkmlhgdh6h3kre

Australia's Offset and the A2/AD Strategies

Ian Langford
2017 Parameters  
Clouds, fog, rain, and snow are all enemies of directed energy.  ...  These forces could still pose a considerable area denial challenge due to their ability to operate among the local population and employ irregular tactics to strike land forces at times and places of their  ... 
doi:10.55540/0031-1723.2839 fatcat:dca7dqonv5ew3jhtzzpw6u2p2q

Cybersecurity risk assessment subjects in information flows

Jouni Pöyhönen
2022 Proceedings of the ... European conference on information warfare and security  
In this context, a new concept of information flows at the technical level will be based partly on cloud servers.  ...  a cloud server.  ...  type than denial or loss of view.  ... 
doi:10.34190/eccws.21.1.263 fatcat:fdl6fo3navgztfefqkqt6k3mh4

Command and Control Strategies in a Broader Hibryd Combat Environment

Cezar Vasilescu
2018 Journal of Defense Resources Management  
military conflict), followed by a comprehensive plea regarding the necessity of changing the current military operating concepts.  ...  The main goal of this paper is to analyze the new theoretical concepts that provide a vision regarding the future armed conflicts, determined by the technological advance and the increased dynamics of  ...  area denial capabilities, and the emergence of cyber and electromagnetic threats.  ... 
doaj:e5b2c8331c264a3f8c3a6a374b1e381a fatcat:bbcq53poqvbjvbsurnwesdmuga

Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions

Theresa Sobb, Benjamin Turnbull, Nour Moustafa
2020 Electronics  
This paper explains the nature of the military supply chains 4.0 and how it uniquely differs from the commercial supply chain, revealing their strengths, weaknesses, dependencies and the fundamental technologies  ...  Current and emerging semantic models related to the standardization, development and safety assurance considerations for implementing new technologies into military supply chains 4.0 are also discussed  ...  Conflicts of Interest: The authors declare no potential conflict of interests.  ... 
doi:10.3390/electronics9111864 fatcat:h54irum3krb77gsj4x76w2mabm

Cyber Warfare – from Science Fiction to Reality

Mika Kerttunen
2018 S+F. Sicherheit und Frieden. Security and Peace  
Cyber military capabilities promise better tactical and operational effects and better ways to conduct military operations.  ...  of military networks.  ...  sustainment in the full scale and scope of military activities. 17 The following table exemplifies the use of ICTs in joint functions.  ... 
doi:10.5771/0175-274x-2018-1-27 fatcat:ha56s6v7kfdi3oxhr2iks3eega

A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures [article]

Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar
2022 arXiv   pre-print
on the cybersecurity of C3I systems.  ...  Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern.  ...  For example, Britishers eavesdropped on German military communications through compromised Enigma machines during World War II, which was one of the main reasons behind the defeat of German military [  ... 
arXiv:2104.11906v2 fatcat:nvz3bssy55fwlcwqzkd7n3zism

Cyber Operations and Gray Zones: Challenges for NATO

Oliver Fitton
2016 Connections The Quarterly Journal  
Cyber Operations, because of the attribution problem, lend themselves to this kind of conflict.  ...  This concept of conflict is best illustrated by Russia's actions in Eastern Ukraine in 2014.  ...  In 2014 Russia used a combination of conventional military forces (for example, amassing on the Russia/Ukraine boarder and naval patrols) and unconventional tactics (for example, "the little green men"  ... 
doi:10.11610/connections.15.2.08 fatcat:acotbvnrcjbhpba4tg6my2u5n4

Towards a discipline of mission-aware cloud computing

Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff, Josh Zachry
2010 Proceedings of the 2010 ACM workshop on Cloud computing security workshop - CCSW '10  
The cloud must therefore evolve from its current mission-oblivious state to become mission-aware. This position paper speculates on the research challenges in making this happen.  ...  We argue that this concept of mission assurance is equally applicable to the commercial sector, and has high relevance to the availability and security concerns of cloud computing.  ...  Acknowledgment This work is partially supported by a grant from the State of Texas Emerging Technology Fund.  ... 
doi:10.1145/1866835.1866839 dblp:conf/ccs/SandhuBKRWZ10 fatcat:ua5fb3yo2fa6xc2achybngll5m

Implementation of Cloud Technologies for Building Data Centers in Defence and Security

Rosen Iliev, Kristina Ignatova
2019 Information & Security An International Journal  
Specific requirements have been formulated for building a sustainable system of modern data centres for defence and security needs, and attention has been paid to data protection when using cloud technologies  ...  A B S T R A C T : This article presents an analysis of cloud technologies as key current trend in the development of IT infrastructure, their main characteristics, security levels and the increased requirements  ...  the reliability and reduce the denial of service.  ... 
doi:10.11610/isij.4308 fatcat:i2vln2jeunavvgpfb27wwbtfd4

What if …"China Attacks Taiwan!"

Richard L. Russell
2001 Parameters  
The United States, meanwhile, clings to a policy of "strategic ambiguity," recognizing only one China, with diplomatic ties to Beijing and withholding diplomatic recognition from Taiwan.  ...  The United States argues that any Chinese military aggression against Taiwan would be a serious threat to American interests, but so far has stopped short of extending formal security guarantees to Taiwan  ...  There is evidence that the Chinese place a high priority on surprise and the enabling features of denial and deception in their military planning.  ... 
doi:10.55540/0031-1723.2055 fatcat:bl56o2qf6bbzpogon2bu4y7dmm

Water and Warfare: The Evolution and Operation of the Water Taboo

Charlotte Grech-Madin
2021 International Security  
For much of human history, water was a standard weapon of war.  ...  Distinct from realist and rationalist explanations, the historical record reveals that water has come to be governed by a set of intersubjective standards of behavior that denounce water's involvement  ...  crucially under the ofªcial guise of "military in- terdiction" (i.e., tactical use) to inundate rail lines.  ... 
doi:10.1162/isec_a_00404 fatcat:mgnx23vzfzby7h2g4uffk3qgz4

A Measure for Assessing the Adequacy of DDOS Defenses

Jordan Shropshire, Jack A. Gowan
2013 Americas Conference on Information Systems  
The measure was developed in three stages: first, a review of contemporary detection algorithms was conducted in order to identify specific tactics.  ...  Finally, a Delphi group provided recommendations and feedback via two rounds of revision. The result is a formative measure consisting of 28 separate tests organized into 10 categories.  ...  Protection against distributed denial of service attacks remains crucial, especially as companies integrate the cloud into their infrastructures.  ... 
dblp:conf/amcis/ShropshireG13 fatcat:gzkgre64hfdtvguwzsu56o5q4i

Autonomous, Collaborative Control for Resilient Cyber Defense (ACCORD)

Stuart Wagner, Eric Van Den Berg, Jim Giacopelli, Andrei Ghetie, Jim Burns, Miriam Tauil, Soumya Sen, Michael Wang, Mung Chiang, Tian Lan, Robert Laddaga, Paul Robertson (+1 others)
2012 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops  
Our results illustrate how a distributed, ACCORD-enabled cloud architecture autonomously adapts to the loss of computing resources (e.g., due to failures, poor network connectivity, or cyber attack) while  ...  ensuring that users receive maximal, prioritized utility from available cloud resources.  ...  The ability to support physically dispersed cloud resources has two critical advantages in tactical military and other similarly challenged environments.  ... 
doi:10.1109/sasow.2012.16 dblp:conf/saso/WagnerBGGBTSWCLLRM12 fatcat:uaqul6oemnantkpcfvg3gizit4

AFTER GLOBALIZATION: FUTURE SECURITY IN A TECHNOLOGY RICH WORLD

THOMAS J. GILMARTIN
2002 AIDS and Infectious Diseases  
These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology.  ...  National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology.  ...  All of these activities are already ongoing. 8 intrusion and denial of service to complex tapestries of financial, infrastructure, and military system attacks.  ... 
doi:10.1142/9789812776945_0021 fatcat:e63bnhpdjfa5vghjlybcmfmjqq
« Previous Showing results 1 — 15 out of 3,695 results