A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge
[article]
2021
arXiv
pre-print
On these grounds, the main purpose of the conducted research is to review and in depth analyze the risks and opportunities of jeopardizing the sustainability of the military tactical clouds at the edge ...
Along with a 1) comprehensively formulation of the researched problematic, the study 2) formalizes the Tactical Denial of Sustainability (TDoS) concept; 3) introduces the phasing, potential attack surfaces ...
of a specific family of cyber threats to the Tactical Cloud concept: the Economical Denial of Sustainability (EDoS) attacks; and their evolution on the military context as Tactical Denial of Sustainability ...
arXiv:2101.08676v1
fatcat:y76tm3syjjgzrkmlhgdh6h3kre
Australia's Offset and the A2/AD Strategies
2017
Parameters
Clouds, fog, rain, and snow are all enemies of directed energy. ...
These forces could still pose a considerable area denial challenge due to their ability to operate among the local population and employ irregular tactics to strike land forces at times and places of their ...
doi:10.55540/0031-1723.2839
fatcat:dca7dqonv5ew3jhtzzpw6u2p2q
Cybersecurity risk assessment subjects in information flows
2022
Proceedings of the ... European conference on information warfare and security
In this context, a new concept of information flows at the technical level will be based partly on cloud servers. ...
a cloud server. ...
type than denial or loss of view. ...
doi:10.34190/eccws.21.1.263
fatcat:fdl6fo3navgztfefqkqt6k3mh4
Command and Control Strategies in a Broader Hibryd Combat Environment
2018
Journal of Defense Resources Management
military conflict), followed by a comprehensive plea regarding the necessity of changing the current military operating concepts. ...
The main goal of this paper is to analyze the new theoretical concepts that provide a vision regarding the future armed conflicts, determined by the technological advance and the increased dynamics of ...
area denial capabilities, and the emergence of cyber and electromagnetic threats. ...
doaj:e5b2c8331c264a3f8c3a6a374b1e381a
fatcat:bbcq53poqvbjvbsurnwesdmuga
Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions
2020
Electronics
This paper explains the nature of the military supply chains 4.0 and how it uniquely differs from the commercial supply chain, revealing their strengths, weaknesses, dependencies and the fundamental technologies ...
Current and emerging semantic models related to the standardization, development and safety assurance considerations for implementing new technologies into military supply chains 4.0 are also discussed ...
Conflicts of Interest: The authors declare no potential conflict of interests. ...
doi:10.3390/electronics9111864
fatcat:h54irum3krb77gsj4x76w2mabm
Cyber Warfare – from Science Fiction to Reality
2018
S+F. Sicherheit und Frieden. Security and Peace
Cyber military capabilities promise better tactical and operational effects and better ways to conduct military operations. ...
of military networks. ...
sustainment in the full scale and scope of military activities. 17 The following table exemplifies the use of ICTs in joint functions. ...
doi:10.5771/0175-274x-2018-1-27
fatcat:ha56s6v7kfdi3oxhr2iks3eega
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures
[article]
2022
arXiv
pre-print
on the cybersecurity of C3I systems. ...
Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern. ...
For example, Britishers eavesdropped on German military communications through compromised Enigma machines during World War II, which was one of the main reasons behind the defeat of German military [ ...
arXiv:2104.11906v2
fatcat:nvz3bssy55fwlcwqzkd7n3zism
Cyber Operations and Gray Zones: Challenges for NATO
2016
Connections The Quarterly Journal
Cyber Operations, because of the attribution problem, lend themselves to this kind of conflict. ...
This concept of conflict is best illustrated by Russia's actions in Eastern Ukraine in 2014. ...
In 2014 Russia used a combination of conventional military forces (for example, amassing on the Russia/Ukraine boarder and naval patrols) and unconventional tactics (for example, "the little green men" ...
doi:10.11610/connections.15.2.08
fatcat:acotbvnrcjbhpba4tg6my2u5n4
Towards a discipline of mission-aware cloud computing
2010
Proceedings of the 2010 ACM workshop on Cloud computing security workshop - CCSW '10
The cloud must therefore evolve from its current mission-oblivious state to become mission-aware. This position paper speculates on the research challenges in making this happen. ...
We argue that this concept of mission assurance is equally applicable to the commercial sector, and has high relevance to the availability and security concerns of cloud computing. ...
Acknowledgment This work is partially supported by a grant from the State of Texas Emerging Technology Fund. ...
doi:10.1145/1866835.1866839
dblp:conf/ccs/SandhuBKRWZ10
fatcat:ua5fb3yo2fa6xc2achybngll5m
Implementation of Cloud Technologies for Building Data Centers in Defence and Security
2019
Information & Security An International Journal
Specific requirements have been formulated for building a sustainable system of modern data centres for defence and security needs, and attention has been paid to data protection when using cloud technologies ...
A B S T R A C T : This article presents an analysis of cloud technologies as key current trend in the development of IT infrastructure, their main characteristics, security levels and the increased requirements ...
the reliability and reduce the denial of service. ...
doi:10.11610/isij.4308
fatcat:i2vln2jeunavvgpfb27wwbtfd4
What if …"China Attacks Taiwan!"
2001
Parameters
The United States, meanwhile, clings to a policy of "strategic ambiguity," recognizing only one China, with diplomatic ties to Beijing and withholding diplomatic recognition from Taiwan. ...
The United States argues that any Chinese military aggression against Taiwan would be a serious threat to American interests, but so far has stopped short of extending formal security guarantees to Taiwan ...
There is evidence that the Chinese place a high priority on surprise and the enabling features of denial and deception in their military planning. ...
doi:10.55540/0031-1723.2055
fatcat:bl56o2qf6bbzpogon2bu4y7dmm
Water and Warfare: The Evolution and Operation of the Water Taboo
2021
International Security
For much of human history, water was a standard weapon of war. ...
Distinct from realist and rationalist explanations, the historical record reveals that water has come to be governed by a set of intersubjective standards of behavior that denounce water's involvement ...
crucially under the ofªcial guise of "military in- terdiction" (i.e., tactical use) to inundate rail lines. ...
doi:10.1162/isec_a_00404
fatcat:mgnx23vzfzby7h2g4uffk3qgz4
A Measure for Assessing the Adequacy of DDOS Defenses
2013
Americas Conference on Information Systems
The measure was developed in three stages: first, a review of contemporary detection algorithms was conducted in order to identify specific tactics. ...
Finally, a Delphi group provided recommendations and feedback via two rounds of revision. The result is a formative measure consisting of 28 separate tests organized into 10 categories. ...
Protection against distributed denial of service attacks remains crucial, especially as companies integrate the cloud into their infrastructures. ...
dblp:conf/amcis/ShropshireG13
fatcat:gzkgre64hfdtvguwzsu56o5q4i
Autonomous, Collaborative Control for Resilient Cyber Defense (ACCORD)
2012
2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops
Our results illustrate how a distributed, ACCORD-enabled cloud architecture autonomously adapts to the loss of computing resources (e.g., due to failures, poor network connectivity, or cyber attack) while ...
ensuring that users receive maximal, prioritized utility from available cloud resources. ...
The ability to support physically dispersed cloud resources has two critical advantages in tactical military and other similarly challenged environments. ...
doi:10.1109/sasow.2012.16
dblp:conf/saso/WagnerBGGBTSWCLLRM12
fatcat:uaqul6oemnantkpcfvg3gizit4
AFTER GLOBALIZATION: FUTURE SECURITY IN A TECHNOLOGY RICH WORLD
2002
AIDS and Infectious Diseases
These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. ...
National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. ...
All of these activities are already ongoing. 8 intrusion and denial of service to complex tapestries of financial, infrastructure, and military system attacks. ...
doi:10.1142/9789812776945_0021
fatcat:e63bnhpdjfa5vghjlybcmfmjqq
« Previous
Showing results 1 — 15 out of 3,695 results