Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 31 - 40 of 350 references
2018 - Brian Thompson, James Morris-King - SAGE Publications

Mobile tactical networks facilitate communication, coordination, and information dissemination between soldiers in the field. Their increasing use provides important benefits, yet also makes them a prime enemy target. Furthermore, their dynamic, distributed, and ad-hoc nature makes them particularly vulnerable to cyber attack. Unfortunately, most existing research on cybersecurity in mobile ad-hoc networks either uses simplistic mobility models that are easier to analyze mathematically or focuses on modeling the dynamics of civilian networks. In this work, we present an agent-based modeling framework to study malware spread in mobile tactical networks. Our framework includes military-inspired models of hierarchical command structure, unit movement, communication over short-range radio, self-propagating malware, and cyber defense mechanisms. We implement several example scenarios representing military units engaged in tactical operations on a synthetic battlefield. Finally, we conduct a case study, using agent-based simulation to analyze the impact of hierarchy and cybersecurity policies on malware spread. Our results support the claim that agent-based modeling is particularly well-suited for representing the complex organizational and spatial structures inherent to military operations, and we urge others to incorporate the key elements of our framework into existing modeling tools when performing studies of cyber attacks on mobile tactical networks and corresponding cybersecurity measures. © 2017, © The Author(s) 2017.

Cybersecurity and defense
2020 - Sungrim Cho - Innovative Defense Acquisition Society

this paper examines the trends in cybersecurity competency assessment at domestic and foreign countries, and presents a defense cybersecurity competency assessment model as a way to strengthen the cybersecurity competency level. The model will contribute to establishing cyber warfare preparedness by diagnosing the level of cybersecurity capabilities of the military and supporting decision-making so that cybersecurity forces can be efficiently equipped.

Cybersecurity and defense
2023 - Seth Sarefo, Maurice Dawson, Mphago Banyatsang - Elsevier BV

Investigating the cybersecurity threat landscape is important as it increases situational awareness and defensive agility. Therefore, in this study the cybersecurity threat landscape for Botswana was investigated from the perspective of Information Technology (IT) and Cybersecurity professionals in Botswana. Since Botswana has no publicized empirical data on cyber threats, a cybersecurity incidences dataset from the United Kingdom (UK) was first analyzed to understand cybersecurity trends there. Insights obtained from the UK dataset were used as a baseline to design a questionnaire which was sent out to 31 participants from 20 organizations in Botswana.

Cybersecurity and defense
2021 - Sean Atkins, Chappell Lawson - Wiley

Qualitative analysis based on in-depth interviews with over 40 policymakers and senior private sector managers, as well as public documents, reveals considerable variation in how well this approach has worked in practice. The main predictors of policy success appear to be (a) the nature of the cyber threat to firms’ operations and (b) regulatory pressure on firms. However, other factors—such as the nature of intra-industry competition—also affect how well the current regime works in specific sectors. Our findings have implications for public administration on civilian cybersecurity, as well as ramifications for regulation in other policy domains.

Civilian cybersecurity
2023 - Nazik Alturki, Turki Aljrees, Muhammad Umer, Abid Ishaq, Shtwai Alsubai, Oumaima Saidani, Sirojiddin Djuraev, Imran Ashraf - MDPI AG

The small-drone technology domain is the outcome of a breakthrough in technological advancement for drones. The Internet of Things (IoT) is used by drones to provide inter-location services for navigation. But, due to issues related to their architecture and design, drones are not immune to threats related to security and privacy. Establishing a secure and reliable network is essential to obtaining optimal performance from drones. While small drones offer promising avenues for growth in civil and defense industries, they are prone to attacks on safety, security, and privacy. The current architecture of small drones necessitates modifications to their data transformation and privacy mechanisms to align with domain requirements. This research paper investigates the latest trends in safety, security, and privacy related to drones, and the Internet of Drones (IoD), highlighting the importance of secure drone networks that are impervious to interceptions and intrusions. To mitigate cyber-security threats, the proposed framework incorporates intelligent machine learning models into the design and structure of IoT-aided drones, rendering adaptable and secure technology. Furthermore, in this work, a new dataset is constructed, a merged dataset comprising a drone dataset and two benchmark datasets. The proposed strategy outperforms the previous algorithms and achieves 99.89% accuracy on the drone dataset and 91.64% on the merged dataset. Overall, this intelligent framework gives a potential approach to improving the security and resilience of cyber–physical satellite systems, and IoT-aided aerial vehicle systems, addressing the rising security challenges in an interconnected world. © 2023 by the authors.

Dual-use cybersecurity
2018 - Patrick Gontar, Julia Behrend, Hendrik Homans, Frédéric Dehais, Klaus Bengler, Michelle Rostalski - Elsevier BV

The increasing prevalence of technology in modern airliners brings not just advantages, but also the potential for cyber threats. Fortunately, there have been no significant attacks on civil aircraft to date, which allows the handling of these emerging threats to be approached proactively. Although an ample body of research into technical defense strategies exists, current research neglects to take the human operator into account. In this study, we present an exploratory experiment focusing on pilots confronted with a cyber-attack. Results show that the occurrence of an attack affects all dependent variables: pilots' workload, trust, eye-movements, and behavior. Pilots experiencing an attack report heavier workload and weakened trust in the system than pilots whose aircraft is not under attack. Further, pilots who experienced an attack monitored basic flying instruments less and their performance deteriorated. A warning about a potential attack seems to moderate several of those effects. Our analysis prompts us to recommend incorporating cyber-awareness into pilots' recurrent training; we also argue that one has to consider all affected personnel when designing such training. Future research should target the development of appropriate procedures and training techniques to prepare pilots to correctly identify and respond to cyber-attacks. © 2018 Elsevier Ltd

Civilian cybersecurity
2023 - Haruki Ueno - Springer International Publishing

This chapter discusses dual-use technologies (DUT), technologies that have potential to be used for both peaceful and military aims, from a global perspective, especially with regard to Artificial Intelligence (AI). Strategic research and development (R&D) of DUT has its roots in the Defense Advanced Research Projects Agency (DARPA) in the United States (US).

Dual-use cybersecurity
2022 - Joint Force - National Institute of Standards and Technology (U.S.)

This publication provides a methodology and set of procedures for conducting assessments of
security and privacy controls employed within systems and organizations within an effective risk
management framework. The assessment procedures, executed at various phases of the system
development life cycle, are consistent with the security and privacy controls in NIST Special
Publication 800-53, Revision 5. The procedures are customizable and can be easily tailored to
provide organizations with the needed flexibility to conduct security and privacy control
assessments that support organizational risk management processes and are aligned with the
stated risk tolerance of the organization. Information on building effective security and privacy
assessment plans is also provided with guidance on analyzing assessment results.

Cybersecurity and defense
2023 - Francisco José Callado-Muñoz, Natalia María Utrero-González, Marta Fernández-Olmos, Marisa Ramírez-Alesón - Informa UK Limited

The aim of this paper is to evaluate the effects of civilian, military and dual (both military and civilian) R&D investments on the profitability of firms. In particular, this paper analyses the role of different types of R&D investment in a sample of firms that collaborate with the Spanish Ministry of Defence. This database contains detailed information about the R&D activities taking place and accounting and financial information. Our final sample consists of 935 observations from 158 firms during the period 2011-2018. The methodology used is the Generalised Method of Moments.

Dual-use cybersecurity
2021 - Aristotle Onumo, Irfan Ullah-Awan, Andrea Cullen - Association for Computing Machinery (ACM)

The increase in cybersecurity threats and the challenges for organisations to protect their information technology assets has made adherence to organisational security control processes and procedures a critical issue that needs to be adequately addressed. Drawing insight from organisational theory literature, we develop a multi-theory model, combining the elements of the theory of planned behaviour, competing value framework, and technology—organisational and environmental theory to examine how the organisational mechanisms interact with espoused cultural values and employee cognitive belief to influence cybersecurity control procedures. Using a structured questionnaire, we deployed structural equation modelling (SEM) to analyse the survey data obtained from public sector information technology organisations in Nigeria to test the hypothesis on the relationship of socio-organisational mechanisms and techno-cultural factors with other key determinants of employee security behaviour.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.