2022
DOI: 10.34190/eciair.4.1.765
|View full text |Cite
|
Sign up to set email alerts
|

An Outlook of Digital Twins in Offensive Military Cyber Operations

Abstract: The outlook of military cyber operations is changing due to the prospects of data generation and accessibility, continuous technological advancements and their (public) availability, technological and human (inter)connections increase, plus the dynamism, needs, diverse nature, perspectives, and skills of experts involved in their planning, execution, and assessment phases respecting (inter)national aims, demands, and trends. Such operations are daily conducted and recently empowered by AI to reach or protect t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Further, it can be extended with multiple data sources and multiple clusters of effects while evaluating it using different types of military operations carried out in different domains using both real and synthetical data. In this way, this research paves the way to build explainable, responsible, and trustable intelligent solutions (Chockalingam & Maathuis, 2022;Maathuis, 2022a;Maathuis, 2022b) for supporting planning, execution, and assessment of (digitally prepared) military operations.…”
Section: Discussionmentioning
confidence: 99%
“…Further, it can be extended with multiple data sources and multiple clusters of effects while evaluating it using different types of military operations carried out in different domains using both real and synthetical data. In this way, this research paves the way to build explainable, responsible, and trustable intelligent solutions (Chockalingam & Maathuis, 2022;Maathuis, 2022a;Maathuis, 2022b) for supporting planning, execution, and assessment of (digitally prepared) military operations.…”
Section: Discussionmentioning
confidence: 99%
“…In terms of the model development, we adapt and extend the Responsible Digital Security Behaviour model proposed by Maathuis & Chockalingam (2022a) to combat social media manipulation. Consequently, the model proposed represents to the best of our knowledge the first modelling effort in this direction while stressing the necessity of further building explainable and responsible AI-based models for tackling societal challenges (Maathuis, 2022a;Maathuis, 2022b). Consequently, the following research activities are taken:…”
Section: Methodsmentioning
confidence: 99%
“…AI design, development, and use which represents the technical layer that encompasses the AI life cycle phases used in a military Cyber Operation including the following core elements (Maathuis, 2022b):…”
Section: Figure1: the Hcai Triad And Frameworkmentioning
confidence: 99%