2022
DOI: 10.1109/access.2022.3182383
|View full text |Cite
|
Sign up to set email alerts
|

ICSTASY: An Integrated Cybersecurity Training System for Military Personnel

Abstract: Cyberwarfare can occur at any moment, anywhere on the planet, and it happens more often than we realize. The new form of warfare is wreaking havoc on not only the military but also on every aspect of our daily lives. Since cybersecurity has only recently established itself as a critical element of the military, the military community relies heavily on the private sector to ensure cyber mission assurance. Given the military's secrecy, such reliance may increase the danger of mission degradation or failure. To a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…These concerns primarily relate to security, accuracy, and trust. Security mainly refers to the level of protection these robots have against various types of cyber-attacks [37]. Safety refers to reducing the chance of an accident occurring, while accuracy is based on performing the intended task without error.…”
Section: Agi Related Security Problemsmentioning
confidence: 99%
“…These concerns primarily relate to security, accuracy, and trust. Security mainly refers to the level of protection these robots have against various types of cyber-attacks [37]. Safety refers to reducing the chance of an accident occurring, while accuracy is based on performing the intended task without error.…”
Section: Agi Related Security Problemsmentioning
confidence: 99%
“…Additionally, the increase in cyber threats and the explosive growth of network traffic due to the advancement of network systems and related technologies, as well as the widespread use of various network devices in daily life, industry, national facilities, etc., are expected to further escalate cyber security threats in various countries [3]. Especially with the development of artificial intelligence (AI) technology through learning models, attack scenarios [4] and automated attacks [5] are being carried out in various places, and internationally, numerous countries are establishing cyber training [6] and training systems [7] to respond to cyber security threats. This cyber training mainly takes place in virtual spaces constructed to resemble reality based on actual cases [8], and is carried out by generating network traffic [9] identical to real networks through simulators [10].…”
Section: Introductionmentioning
confidence: 99%