Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) 2012
DOI: 10.1109/cybersec.2012.6246114
|View full text |Cite
|
Sign up to set email alerts
|

Cyber military strategy for cyberspace superiority in cyber warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
4

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 0 publications
0
6
0
4
Order By: Relevance
“…It consists of 4 modules; Cyber infrastructure list, Cyber targets list, Cyber order of battle, and Pre-CTO(Cyber Tasking Order) [6].…”
Section: Fig 2 Architecture Of Proposed Systemmentioning
confidence: 99%
“…It consists of 4 modules; Cyber infrastructure list, Cyber targets list, Cyber order of battle, and Pre-CTO(Cyber Tasking Order) [6].…”
Section: Fig 2 Architecture Of Proposed Systemmentioning
confidence: 99%
“…Eom, Kim, Kim, and Chung (2012) make the argument for the need for cyber superiority as well as for the development of a "cyber warrior." They contend that the cyber warrior should have thorough knowledge of military policies, cyber strategy, cyber tactics, cyber operations, cyber intelligence collection, as well as cyber attack and cyber defense technology.…”
Section: Cyberspace Damage Controlmentioning
confidence: 99%
“…The information needed to make a command order decision is very important factor in achieving superiority in battle. Victory depends on how much of your opponent's data you possess, along with data on the general situation of the friendly side [2,3,4].…”
Section: Introductionmentioning
confidence: 99%