This paper outlines the requirements for a series of ontologies necessary to provide a meaningful answer to the question: How do we model and simulate the System of Systems effects of a cyber attack on an organization or military unit? This work provides the data model specification for a simulation to answer this question by explaining the required domains of knowledge. We introduce mechanisms to federate these domains, and then provide an exemplar use-case to contextualize one type of scenario the model must be capable of representing within a simulation environment. The model demonstrates the granularity necessary for the modeling and simulation of a SoS effect of a cyber attack on an organization or military unit
Several fields have created ontologies for their subdomains. For example, the biological sciences ha...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terro...
As cyber operations are evolving to become a major military enabler, cyber activities and their resu...
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge....
The growing demand for cyber security professionals with practical knowledge is boosting the develop...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Abstract—Ontologies have been used in a variety of domains for multiple purposes such as establishin...
In this article, we present an experiment we conducted with discrete event simulations to analyze th...
Ontologies have been used in a variety of domains for multiple purposes such as establishing common ...
We consider critical infrastructures as cyber-physical systems (CPS). Although simulations play an i...
International audienceAn ontology driven domain model approach for improving the fidelity of the sim...
AbstractThe number of connections between physical and cyber security systems is rapidly increasing ...
Abstract—This paper describes a new semantic framework for model-based systems engineering, requirem...
This white paper presents the initial requirements for developing a new computer model for simulatin...
Several fields have created ontologies for their subdomains. For example, the biological sciences ha...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terro...
As cyber operations are evolving to become a major military enabler, cyber activities and their resu...
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge....
The growing demand for cyber security professionals with practical knowledge is boosting the develop...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Abstract—Ontologies have been used in a variety of domains for multiple purposes such as establishin...
In this article, we present an experiment we conducted with discrete event simulations to analyze th...
Ontologies have been used in a variety of domains for multiple purposes such as establishing common ...
We consider critical infrastructures as cyber-physical systems (CPS). Although simulations play an i...
International audienceAn ontology driven domain model approach for improving the fidelity of the sim...
AbstractThe number of connections between physical and cyber security systems is rapidly increasing ...
Abstract—This paper describes a new semantic framework for model-based systems engineering, requirem...
This white paper presents the initial requirements for developing a new computer model for simulatin...
Several fields have created ontologies for their subdomains. For example, the biological sciences ha...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terro...