Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
DOI: 10.1109/discex.2001.932180
|View full text |Cite
|
Sign up to set email alerts
|

Cyber ecology: looking to ecology for insights into information assurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Furthermore, they advocated for an imperative to strengthen the scientific rigor of resilience research endeavors [23]. Moreover, Jane Jorgensen et al [24] examined the context of cyber ecology and suggested that ecological models depicting intricate biological communities and strategies for disease control can serve as valuable inputs for intricate dynamic models of computer networks. These models can help in devising novel approaches to systems management when confronted with ever-evolving cyber threats and generate initial hypotheses for further investigation [24].…”
Section: From Ecology To Cyber Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, they advocated for an imperative to strengthen the scientific rigor of resilience research endeavors [23]. Moreover, Jane Jorgensen et al [24] examined the context of cyber ecology and suggested that ecological models depicting intricate biological communities and strategies for disease control can serve as valuable inputs for intricate dynamic models of computer networks. These models can help in devising novel approaches to systems management when confronted with ever-evolving cyber threats and generate initial hypotheses for further investigation [24].…”
Section: From Ecology To Cyber Securitymentioning
confidence: 99%
“…Moreover, Jane Jorgensen et al [24] examined the context of cyber ecology and suggested that ecological models depicting intricate biological communities and strategies for disease control can serve as valuable inputs for intricate dynamic models of computer networks. These models can help in devising novel approaches to systems management when confronted with ever-evolving cyber threats and generate initial hypotheses for further investigation [24]. In 2002, during a highly competitive business environment, it was imperative for organizations to have a comprehensive vision for resiliency.…”
Section: From Ecology To Cyber Securitymentioning
confidence: 99%
“…First, in [28], the behavior of predators is predicted using equations from epidemiology [19]. We have developed a discrete simulation tool which simulates the behavior of predators and viruses on small scale (1600 node) networks.…”
Section: Introductionmentioning
confidence: 99%
“…and convoluted ecologies in which we are nested. Borrowing cyber ecology from Jorgensen et al (2001), who maintain that cyberspaces have real effects on the social and vice-versa, I suggest that the unquantifiable scale of interactions between social and internet publics blur such distinctions as computer mediated environments versus socio-culturally mediated domains. Cyber ecologies demonstrate that queer slacktivism does not occur in a vacuum, and like the sociocultural and political environments in which they are situated, they are neither monolithic nor homogenous.…”
mentioning
confidence: 99%