Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework

2021-01-01
Sengul, Zafer
Acartürk, Cengiz
© 2021 IEEE.Malware propagation is capable of introducing adverse effects in military operations since today's high-tech military weapons and command, control, and communication systems are essentially interconnected ICT systems. Conventional warfare models have been recently upgraded to include cyber warfare elements to reflect the potential influence of cyber-attacks. In the present study, we propose and evaluate a framework for modeling the integrated effect of the spread of malware through computer networks and kinetic warfare. We employ a probabilistic learning approach, namely Bayesian Network analysis, to develop integrated combat models that characterize the spread of malware. The overall aim of the models is to predict which side will likely have the superiority at the end of the war, given the parameters that address the kinetic and cyber-effect influences of the fighting forces at the beginning.
14th International Conference on Information Security and Cryptology, ISCTURKEY 2021

Suggestions

SWIR objective design using seidel aberration theory
Aslan, Serhat Hasan; Yerli, Sinan Kaan; Keskin, Onur; Department of Physics (2016)
Optical systems are used for increasing the situational awareness and Intelligence, Surveillance and Reconnaissance (ISR) capabilities for military purposes. MWIR (Midwave infrared) and LWIR (Long wave infrared) waveband informations are the first two wavebands information in the atmospheric transmission window that are harnessed in military night vision optical systems. Another candidate of these operable wavebands is the SWIR (Shortwave infrared). Shortwave infrared (SWIR) imaging is an extension of Near ...
Challenges of countering cyber terrorism in the hybrid war contexts
Tanrısever, Oktay Fırat (null; 2019-10-15)
This conference paper seeks to explore the characteristics of cyber terrorism and challenges of countering cyber terrorism in the hybrid war contexts. This conference paper also intends to highlight the difficulties of coping with the terrorist uses of the cyber space and social media when the perpetrators of cyber terrorist acts remain anonymous and the parties of hybrid warfare adhere to the principle of deniability constantly The conference paper puts forward the argument that the concept of cyber terror...
Cognitive Modelling of Opposing Forces at the Simulation Analysis Lab
Topcu, Yeliz; Zeyrek Bozşahin, Deniz; Ulubay, Murat; Department of Cognitive Sciences (2021-12-09)
In modern military systems, engagement simulations are used to assist in conceptual design and verification of weapon systems. The quality of these simulations is directly proportional to the level of authenticity of the behavior of the components that are modeled. For this reason, it is important to represent the behavior of human controlled components by accounting for the cognitive aspects including human limitations and flaws. In various studies, the behaviors of these components are modeled using cogni...
Using Continuous Integration and Automated Test Techniques for a Robust C4ISR System
Yuksel, H. Mehmet; Tuzun, Eray; Gelirli, Erdogan; Biyikli, Emrah; Baykal, Buyurman (2009-09-16)
We have used Cl (Continuous Integration) and various software testing techniques to achieve a robust C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) multi-platform system. Because of rapid changes in the C4ISR domain and in the software technology, frequent critical design adjustments and in turn vast code modifications or additions become inevitable. Defect fixes might also incur code changes. These unavoidable code modifications may put a big risk in the...
Optical design and analysis of a riflescope system
Bayar, Cevdet; Esendemir, Akif; Department of Physics (2009)
Today, riflescope systems are used widely, mostly by military forces. In this study, a riflescope working in the visible range (400-700 nm) will be designed. The riflescope will have 3 degrees field of view and maximum 15 cm total track. Total design length is limited to 15 cm because a short riflescope is more stabilized than a long one with respect to thermal instability and vibrational effects. Taken into account the cost factor, only two types of glasses will be used in the design. One of them is NBK7 a...
Citation Formats
Z. Sengul and C. Acartürk, “Cyber Warfare Integration to Conventional Combat Modeling: A Bayesian Framework,” presented at the 14th International Conference on Information Security and Cryptology, ISCTURKEY 2021, Ankara, Türkiye, 2021, Accessed: 00, 2022. [Online]. Available: https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85124380031&origin=inward.