Better Timing of Cyber Conflict∗

نویسندگان

  • Elisabeth Paulson
  • Christopher Griffin
چکیده

In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict. Proceedings of the National Academy of Science, (1322638111), 2013.), showing that our model accurately captures four real-world scenarios and has fewer quantities that are difficult to measure than the aforementioned approach. Under simplifying assumptions, we prove rules of thumb for determining when and wether a cyber-weapon should be deployed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Timing of cyber conflict.

Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situatio...

متن کامل

The Model of Structural Relationships of Cyber Aggression Based on Self-Control with the Mediation of Mobile Phone Addiction in Adolescents: A Descriptive Study

Background and Objectives: Increasingly, cyberbullying has become a common phenomenon eroding the social media environment. The present study was conducted with the aim of determining the structural relationship pattern of cyber aggression based on self-control with the mediation of mobile phone addiction in adolescents. Materials and Methods: In this descriptive study, the statistical populat...

متن کامل

The Civil Responsibility of Government in the Cyberspace: Looking at the Cyber Ethics

Background: Given the appropriateness of cyberspace and its interconnectedness, each country is expected to minimize the possibility of harmful actions by securing and continuously monitoring the Internet and the virtual world. Of course, part of this goal will be achieved through the adoption of appropriate national laws and, in part, through proper education of citizens and the development of...

متن کامل

Cyber Conflicts as a New Global Threat

In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of ...

متن کامل

From MetroII to Metronomy, Designing Contract-based Function-Architecture Co-simulation Framework for Timing Verification of Cyber-Physical Systems

From MetroII to Metronomy, Designing Contract-based Function-Architecture Co-simulation Framework for Timing Verification of Cyber-Physical Systems

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014