Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework
Date
2021-01-01
Author
Sengul, Zafer
Acartürk, Cengiz
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
173
views
0
downloads
Cite This
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer networks and kinetic warfare. We employ a probabilistic learning approach, namely Bayesian Network analysis, to develop integrated combat models that characterize the spread of malware. The overall aim of the models is to predict which side will likely have the superiority at the end of the war, given the parameters that address the kinetic and cyber-effect influences of the fighting forces at the beginning.
Subject Keywords
Bayesian Network Framework
,
Combat Models
,
Cyber Warfare
,
Epidemic Models
URI
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85124380031&origin=inward
https://hdl.handle.net/11511/98960
DOI
https://doi.org/10.1109/iscturkey53027.2021.9654297
Conference Name
14th International Conference on Information Security and Cryptology, ISCTURKEY 2021
Collections
Graduate School of Informatics, Conference / Seminar
Suggestions
OpenMETU
Core
SWIR objective design using seidel aberration theory
Aslan, Serhat Hasan; Yerli, Sinan Kaan; Keskin, Onur; Department of Physics (2016)
Optical systems are used for increasing the situational awareness and Intelligence, Surveillance and Reconnaissance (ISR) capabilities for military purposes. MWIR (Midwave infrared) and LWIR (Long wave infrared) waveband informations are the first two wavebands information in the atmospheric transmission window that are harnessed in military night vision optical systems. Another candidate of these operable wavebands is the SWIR (Shortwave infrared). Shortwave infrared (SWIR) imaging is an extension of Near ...
Challenges of countering cyber terrorism in the hybrid war contexts
Tanrısever, Oktay Fırat (null; 2019-10-15)
This conference paper seeks to explore the characteristics of cyber terrorism and challenges of countering cyber terrorism in the hybrid war contexts. This conference paper also intends to highlight the difficulties of coping with the terrorist uses of the cyber space and social media when the perpetrators of cyber terrorist acts remain anonymous and the parties of hybrid warfare adhere to the principle of deniability constantly The conference paper puts forward the argument that the concept of cyber terror...
Cognitive Modelling of Opposing Forces at the Simulation Analysis Lab
Topcu, Yeliz; Zeyrek Bozşahin, Deniz; Ulubay, Murat; Department of Cognitive Sciences (2021-12-09)
In modern military systems, engagement simulations are used to assist in conceptual design and verification of weapon systems. The quality of these simulations is directly proportional to the level of authenticity of the behavior of the components that are modeled. For this reason, it is important to represent the behavior of human controlled components by accounting for the cognitive aspects including human limitations and flaws. In various studies, the behaviors of these components are modeled using cogni...
Using Continuous Integration and Automated Test Techniques for a Robust C4ISR System
Yuksel, H. Mehmet; Tuzun, Eray; Gelirli, Erdogan; Biyikli, Emrah; Baykal, Buyurman (2009-09-16)
We have used Cl (Continuous Integration) and various software testing techniques to achieve a robust C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) multi-platform system. Because of rapid changes in the C4ISR domain and in the software technology, frequent critical design adjustments and in turn vast code modifications or additions become inevitable. Defect fixes might also incur code changes. These unavoidable code modifications may put a big risk in the...
Optical design and analysis of a riflescope system
Bayar, Cevdet; Esendemir, Akif; Department of Physics (2009)
Today, riflescope systems are used widely, mostly by military forces. In this study, a riflescope working in the visible range (400-700 nm) will be designed. The riflescope will have 3 degrees field of view and maximum 15 cm total track. Total design length is limited to 15 cm because a short riflescope is more stabilized than a long one with respect to thermal instability and vibrational effects. Taken into account the cost factor, only two types of glasses will be used in the design. One of them is NBK7 a...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Z. Sengul and C. Acartürk, “Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework,” presented at the 14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2021, Accessed: 00, 2022. [Online]. Available: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85124380031&origin=inward.