Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Defense and Security Studies (2)
- Engineering (2)
- Public Affairs, Public Policy and Public Administration (2)
- Social and Behavioral Sciences (2)
- Artificial Intelligence and Robotics (1)
-
- Business (1)
- Communication (1)
- Computational Engineering (1)
- Computer Engineering (1)
- Computer Sciences (1)
- Industrial Engineering (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Organizational Behavior and Theory (1)
- Organizational Communication (1)
- Other Computer Engineering (1)
- Other Operations Research, Systems Engineering and Industrial Engineering (1)
- Physical Sciences and Mathematics (1)
- Science and Technology Studies (1)
- Strategic Management Policy (1)
Articles 1 - 4 of 4
Full-Text Articles in Entire DC Network
Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka
Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka
Military Cyber Affairs
The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units …
Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier
Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier
Military Cyber Affairs
Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We …
Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers
Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers
Military Cyber Affairs
Today’s defensive cyber sensors are dominated by signature-based analytical methods that require continuous maintenance and lack the ability to detect unknown threats. Anomaly detection offers the ability to detect unknown threats, but despite over 15 years of active research, the operationalization of anomaly detection and machine learning for Defensive Cyber Operations (DCO) is lagging. This article provides an introduction to machine learning concepts with a focus on the unique challenges to using machine learning for DCO. Traditional machine learning evaluation methods are challenged in favor of a value-focused evaluation method that incorporates evaluator-specific weights for classifier and sensitivity threshold selection …
Cyberspace Operations Planning: Operating A Technical Military Force Beyond The Kinetic Domains, Don E. Barber, T. Alan Bobo, Kevin P. Sturm
Cyberspace Operations Planning: Operating A Technical Military Force Beyond The Kinetic Domains, Don E. Barber, T. Alan Bobo, Kevin P. Sturm
Military Cyber Affairs
Cyber operations can be very complex, and it is useful to conceptualize a deeper, fourth technical level of warfare in order to conduct effective planning. The technical details associated with cyberspace operations are not grasped as intuitively by planners and commanders as are the capabilities and limitations of tanks, ships, and aircraft. The complex and dynamic nature of cyberspace often drives technical analysis and planning to a level beyond those planning practices and procedures accommodated by traditional Joint doctrine.