Skip to main content (Press Enter).
College of Information and Cyberspace
Mission & Vision
Faculty & Staff
Hall of Fame
Academic Advising and Policies
Bring Your Own Device
Completion and Records
SSC Incoming Students
CIO Leadership Development Program
Master of Science Degree Program
Course Delivery Formats
News & Announcements
ArticleCS - Dashboard
News & Announcements
Published Work From Our Faculty in the Journal of Information Warfare
| November 15, 2016
Ryan, J. J.C.H. & Ryan, D. J. (2016) How Secure is Our Information Infrastructure? Journal of Information Warfare, Vol. 15 (Issue 3). https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: Managers of critical information infrastructures need better tools for managing risk than the qualitative or compliance-based metrics commonly used today in critical infrastructure protection. This paper provides a performance-based metric that can be used to obtain a quantitative measure of the security of information infrastructures.
MacNulty, C. & Ryan, J.J.C.H. (2016) Using Values-Based Cultural Data to Shape Information Operations Strategies. Journal of Information Warfare, Vol. 15, Issue 3. https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: People are important: they design, use, and defend information systems, and are the targets of ‘softer’ information operations. People can be understood from many different perspectives, including national culture characteristics, personality traits, and cultural history. An intriguing research question to explore is how values, beliefs, and cultures affect the design, strategy, and implementation of information operations.
Watkins, L., Hurley, J.S., Xie, S., & Yang, T. (2016) Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications. Journal of Information Warfare, Vol. 15, Issue 3. https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: Attacks are usually orchestrated based upon the motivation of the attackers, who are becoming increasingly savvy, better resourced, and more committed. This article examines cyber threats and vulnerabilities through the eyes of the perpetrator. To begin, the authors discuss some counter approaches that have produced limited benefits at best, and then introduce a novel approach that details the use of mobile device resource usage to discern unauthentic mobile applications from authentic applications.
Chen, J. (2016) Dynamic Cyber Defence Framework. Journal of Information Warfare, Vol. 15, Issue 3. https://www.jinfowar.com/journal-issue/volume-15-issue- 3.
Abstract: There are flaws in the current approaches in cyber defence as they are generally static in nature and fortress-based. They are thus not flexible in dealing with variations of attacks or with zero-day attacks. To address this issue, researchers have looked into dynamic cyber defence. However, the available approaches are either only about strategies or only about tactics.
Photos & Videos
DoD Inspector General
No FEAR Act
Join the Military
Privacy & Security