2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2017
DOI: 10.1109/ficloudw.2017.79
|View full text |Cite
|
Sign up to set email alerts
|

Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Intra and inter-connections are key in Industry 4.0 applications, so it is necessary to protect the systems involved in such connections. In addition, security is essential for industrial critical systems, which have been widely targeted by cyber-attacks in the last years [146], affecting both complex industrial systems and simpler physical access systems [147], [148], [149].…”
Section: Cybersecuritymentioning
confidence: 99%
“…Intra and inter-connections are key in Industry 4.0 applications, so it is necessary to protect the systems involved in such connections. In addition, security is essential for industrial critical systems, which have been widely targeted by cyber-attacks in the last years [146], affecting both complex industrial systems and simpler physical access systems [147], [148], [149].…”
Section: Cybersecuritymentioning
confidence: 99%
“…Therefore, it is not possible to secure the battlefield superiority with traditional defensive cyber warfare strategy or cyber operations. We propose a leading cyber warfare strategy in terms of strategic, operational and tactical aspects considering the change of cyber battlefield environment and the function of cyber-attack technology [14].…”
Section: A Leading Cyber Warfare Strategymentioning
confidence: 99%
“…A cross-domain means space where the distinction between physical space and cyber battlefield is broken by CPS. Super intelligent space means that human-oriented software is developed by artificial intelligence technology to do autonomous learning, decision and execution [14]. In order to secure superiority in cyber battlefield, it is necessary to collect information, determine procedures, and conduct actions ahead of opponent in advance.…”
Section: A Leading Cyber Warfare Strategymentioning
confidence: 99%
“…The later one becomes our main concern in this paper. Some literatures may refer this information related attack in this super connected cyber world as 'cyber-attack' instead of 'cyberwar' or 'cyberwarfare' [15], [16]. The Cyber-attack is considered as "the new front of 4th generation warfare" (1948 until the 9/11 incident) in which the idea of "warfare" is no longer perceived as a state affair, but open for non-state actors including individuals, or extremist groups [17].…”
Section: A Cyberwar and Netwarmentioning
confidence: 99%
“…The Cyber-attack is considered as "the new front of 4th generation warfare" (1948 until the 9/11 incident) in which the idea of "warfare" is no longer perceived as a state affair, but open for non-state actors including individuals, or extremist groups [17]. In addition, the future cyber-attack, particularly in the fourth industrial revolution, aims to create social, political, and psychological disturbance by using social networking sites [16].…”
Section: A Cyberwar and Netwarmentioning
confidence: 99%