ArticleCS - Dashboard
News & Announcements

Published Work From Our Faculty in the Journal of Information Warfare

By | November 15, 2016

Ryan, J. J.C.H. & Ryan, D. J. (2016) How Secure is Our Information Infrastructure? Journal of Information Warfare, Vol. 15 (Issue 3). https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: Managers of critical information infrastructures need better tools for managing risk than the qualitative or compliance-based metrics commonly used today in critical infrastructure protection. This paper provides a performance-based metric that can be used to obtain a quantitative measure of the security of information infrastructures.


MacNulty, C. & Ryan, J.J.C.H. (2016) Using Values-Based Cultural Data to Shape Information Operations Strategies. Journal of Information Warfare, Vol. 15, Issue 3. https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: People are important: they design, use, and defend information systems, and are the targets of ‘softer’ information operations. People can be understood from many different perspectives, including national culture characteristics, personality traits, and cultural history. An intriguing research question to explore is how values, beliefs, and cultures affect the design, strategy, and implementation of information operations.


Watkins, L., Hurley, J.S., Xie, S., & Yang, T. (2016) Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications. Journal of Information Warfare, Vol. 15, Issue 3. https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: Attacks are usually orchestrated based upon the motivation of the attackers, who are becoming increasingly savvy, better resourced, and more committed. This article examines cyber threats and vulnerabilities through the eyes of the perpetrator. To begin, the authors discuss some counter approaches that have produced limited benefits at best, and then introduce a novel approach that details the use of mobile device resource usage to discern unauthentic mobile applications from authentic applications.


Chen, J. (2016) Dynamic Cyber Defence Framework. Journal of Information Warfare, Vol. 15, Issue 3. https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: There are flaws in the current approaches in cyber defence as they are generally static in nature and fortress-based. They are thus not flexible in dealing with variations of attacks or with zero-day attacks. To address this issue, researchers have looked into dynamic cyber defence. However, the available approaches are either only about strategies or only about tactics.