Developing a Cyber Operations Computational Ontology

C Maathuis, W Pieters, J van den Berg

Research output: Contribution to journalArticleScientificpeer-review

18 Downloads (Pure)

Abstract

Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To tackle these issues, this article proposes a knowledge model for cyber operations implemented as a computational ontology following a design science approach grounded on extensive technical-military research. This model classifies the essential entities of cyber operations and is exemplified in three case studies. Validation results show that this model can be used to describe cyber operations clearly and concisely.
Original languageEnglish
Pages (from-to)33-52
JournalJournal of Information Warfare
Volume17
Issue number3
Publication statusPublished - 2018

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Cyber Operations
  • Cyber Warfare
  • Cyber Weapons
  • Cyber Security
  • Ontology
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Developing a Cyber Operations Computational Ontology'. Together they form a unique fingerprint.

Cite this