Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace
Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N. and Williams, C.
Journal: Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR 2024
Pages: 726-731
DOI: 10.1109/CSR61664.2024.10679440
Abstract:Conscientious military attackers deciding to perform targeted Electromagnetic attacks have an ethical problem because their actions may adversely impact non-target victim systems. Their decision-making process should account for the assessed risk to victim systems before engaging in Electromagnetic attacks. In short: Risk-Informed Decision-Making within a complex, dynamic, uncertain environment involving Systems-of-Systems is essential. But how is the related risk assessment performed? This paper identifies some important foundations for modelling this context.
https://eprints.bournemouth.ac.uk/40544/
Source: Scopus
Foundations for modelling conscientious attacking in electromagnetic cyberspace
Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N. and Williams, C.
Journal: 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR
Pages: 726-731
DOI: 10.1109/CSR61664.2024.10679440
https://eprints.bournemouth.ac.uk/40544/
Source: Web of Science (Lite)
Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace
Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N. and Williams, C.
Conference: 2024 IEEE International Conference on Cyber Security and Resilience (CSR)
Dates: 2-4 September 2024
DOI: 10.1109/CSR61664.2024.10679440
Abstract:Conscientious military attackers deciding to perform targeted Electromagnetic attacks have an ethical problem because their actions may adversely impact non-target victim systems. Their decision-making process should account for the assessed risk to victim systems before engaging in Electromagnetic attacks. In short: Risk-Informed Decision-Making within a complex, dynamic, uncertain environment involving Systems-of-Systems is essential. But how is the related risk assessment performed? This paper identifies some important foundations for modelling this context.
https://eprints.bournemouth.ac.uk/40544/
Source: Manual
Foundations for Modelling Conscientious Attacking in Electromagnetic Cyberspace
Authors: Davies, N., Dogan, H., Ki-Aries, D., Jiang, N. and Williams, C.
Pages: 726-731
Publisher: IEEE
Place of Publication: New York, NY
ISBN: 9798350375367
Abstract:Conscientious military attackers deciding to perform targeted Electromagnetic attacks have an ethical problem because their actions may adversely impact non-target victim systems. Their decision-making process should account for the assessed risk to victim systems before engaging in Electromagnetic attacks. In short: Risk-Informed Decision-Making within a complex, dynamic, uncertain environment involving Systems-of-Systems is essential. But how is the related risk assessment performed? This paper identifies some important foundations for modelling this context.
https://eprints.bournemouth.ac.uk/40544/
Source: BURO EPrints