You are previewing International Journal of Cyber Warfare and Terrorism (IJCWT) Volume 6, Issue 3.
O'Reilly logo
International Journal of Cyber Warfare and Terrorism (IJCWT) Volume 6, Issue 3

Book Description

The International Journal of Cyber Warfare and Terrorism (IJCWT) publishes original innovative findings on ethical, political, legal, and social issues relating to security and cybernetic wars. This journal focuses on cyber warfare and terrorism using examples from around the world. IJCWT covers technical aspects, management issues, social issues, and government issues that relate to cyber warfare and terrorism.

This issue contains the following articles:

  • Cyber-Security for ICS/SCADA: A South African Perspective
  • Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion
  • Deception Detection in Cyber Conflicts: A Use Case for the Cybersecurity Strategy Formation Framework
  • The Next Generation of Scientific-Based Risk Metrics: Measuring Cyber Maturity
  • Semantic Technologies and Big Data Analytics for Cyber Defence
  • Using an Ontology for Network Attack Planning
  • SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Special Issue on the 10th International Conference on Cyber Warfare and Security (ICCWS)
  5. Cyber-Security for ICS/SCADA:
    1. ABSTRACT
    2. INTRODUCTION
    3. CYBER-SECURITY AND GOVERNANCE OF ICS/SCADA ENVIRONMENTS
    4. PROPOSED FRAMEWORK
    5. CONCLUSION
    6. REFERENCES
  6. Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion
    1. ABSTRACT
    2. INTRODUCTION
    3. RESPONSIBILITY AND DEMARCATION OF A NATION’S INTERNET DOMAIN
    4. ATTACK SURFACE
    5. DATA FUSION IN THE CYBER DOMAIN
    6. ADAPTATION OF THE JDL MODEL FOR CYBER SECURITY DATA FUSION
    7. ADAPTATION OF THE JDL MODEL FOR NATIONAL CYBER SECURITY DATA FUSION
    8. CASE STUDY
    9. CONCLUSION
    10. REFERENCES
  7. Deception Detection in Cyber Conflicts:
    1. ABSTRACT
    2. INTRODUCTION
    3. CHALLENGES
    4. OPERATIONAL-LEVEL CYBERSECURITY STRATEGY FORMATION FRAMEWORK
    5. DISCUSSION AND CASE STUDY
    6. CONCLUSION
    7. REFERENCES
  8. The Next Generation of Scientific-Based Risk Metrics:
    1. ABSTRACT
    2. INTRODUCTION
    3. THE TRIAD: CITIZENS, DEFENSE AND INTELLIGENCE
    4. RELATED WORKS
    5. SCIENTIFIC-BASED RISK SCORING
    6. CASE STUDY #1: RIGHTING THE WRONG WITH CVSS
    7. CASE STUDY #2: MEASURING RISK ASSOCIATED WITH INSIDER THREAT AND BREAKING CYBER POLICIES
    8. CONCLUSION
    9. REFERENCES
  9. Semantic Technologies and Big Data Analytics for Cyber Defence
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BIG DATA ANALYTICS IN CYBER DEFENCE
    4. 3. CURRENT CYBER DEFENCE APPLICATIONS USING SEMANTIC TECHNOLOGIES
    5. 4. EMERGING RESEARCH AREAS IN THE COMBINED DOMAINS
    6. 5. CONCLUSION
    7. REFERENCES
  10. Using an Ontology for Network Attack Planning
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BACKGROUND
    4. 3. THE CYBER NETWORK ATTACK PLANNING ONTOLOGY
    5. 4. CONCLUSION AND FUTURE WORK
    6. REFERENCES
  11. SCADA Systems Cyber Security for Critical Infrastructures:
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. TRANSPORT SECTOR
    4. 3. ENERGY SECTOR
    5. 4. WATER AND SEWAGE SECTOR
    6. 5. TERRORIST DECISION MAKING AND DISCUSSIONS
    7. 6. CYBER-TERRORIST CAPABILITIES AND DISCUSSIONS
    8. 7. CONCLUSION, LIMITATIONS AND FUTURE WORK
    9. REFERENCES
  12. Call For Articles