A Study on Cyber Target Importance Quantification and Ranking Algorithm
Most of the challenges and conflicts facing countries and groups today involve cyberspace. Therefore, military forces around the world are developing methods (doctrines) and weapon systems to conduct cyberspace operations in order to dominate cyberspace. To conduct cyberspace operations, cyber targe...
| Published in: | Applied Sciences |
|---|---|
| Main Authors: | Kookjin Kim, Seunghwan Oh, Donghwan Lee, Jiwon Kang, Jungsik Lee, Dongkyoo Shin |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2022-02-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/12/4/1833 |
Similar Items
Study on Cyber Common Operational Picture Framework for Cyber Situational Awareness
by: Kookjin Kim, et al.
Published: (2023-02-01)
by: Kookjin Kim, et al.
Published: (2023-02-01)
Cyberspace: A Digital Ecosystem
by: Kari J. Lippert, et al.
Published: (2021-06-01)
by: Kari J. Lippert, et al.
Published: (2021-06-01)
Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
by: Kookjin Kim, et al.
Published: (2022-01-01)
by: Kookjin Kim, et al.
Published: (2022-01-01)
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures
by: Jang Jisoo, et al.
Published: (2024-01-01)
by: Jang Jisoo, et al.
Published: (2024-01-01)
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
by: Aybala Lale Kahraman
Published: (2024-12-01)
by: Aybala Lale Kahraman
Published: (2024-12-01)
I.R.I Army cybersecurity effective factors. (Case study: I.R.I Army general staff )
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
Securing the Required Cyber Defence Capabilities
by: Miroslav Feix, et al.
Published: (2017-12-01)
by: Miroslav Feix, et al.
Published: (2017-12-01)
Optimizing offensive cyber operation planner‘s development: exploring tailored training paths and framework evolution
by: Marko Arik, et al.
Published: (2024-06-01)
by: Marko Arik, et al.
Published: (2024-06-01)
Recent Objectives of Cyber Defence in the Department of Defence
by: Miroslav Feix, et al.
Published: (2017-09-01)
by: Miroslav Feix, et al.
Published: (2017-09-01)
FROM CYBER WARFARE TO CYBER PEACE
by: Gheorghe BOARU
Published: (2025-09-01)
by: Gheorghe BOARU
Published: (2025-09-01)
Modelling Cyberspace to Determine Cybersecurity Training Requirements
by: Adrian Venables
Published: (2021-11-01)
by: Adrian Venables
Published: (2021-11-01)
Islamic Republic of Iran Army Cyber Offensive Evaluation Model
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
Cyber Potential Metaphorical Map Method Based on GMap
by: Dongyu Si, et al.
Published: (2025-01-01)
by: Dongyu Si, et al.
Published: (2025-01-01)
CYBER THREATS TO OT SYSTEMS IN THE ENERGY INDUSTRY
by: Grzegorz Pilarski, et al.
Published: (2023-08-01)
by: Grzegorz Pilarski, et al.
Published: (2023-08-01)
Justin Joque, Deconstruction Machines: Writing in the Age of Cyberwar
by: Brett van Niekerk
Published: (2019-10-01)
by: Brett van Niekerk
Published: (2019-10-01)
The system of cybersecurity bodies in Ukraine
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
Promoting the Cyber Wellness of Internet Users in Papua New Guinea
by: Olugbenga Adedayo Ige
Published: (2023-03-01)
by: Olugbenga Adedayo Ige
Published: (2023-03-01)
Cybersecurity education for South African school children through the action Cybercrime Prevention Programme: A systematic literature review
by: Olufiropo Emmanuel Alalade, et al.
Published: (2023-12-01)
by: Olufiropo Emmanuel Alalade, et al.
Published: (2023-12-01)
New Cybersecurity Challenges: Digital Transformation and the Political Implications of their Implementation
by: Anna Sisoyan
Published: (2025-07-01)
by: Anna Sisoyan
Published: (2025-07-01)
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
by: O. V. Demidov
Published: (2013-10-01)
by: O. V. Demidov
Published: (2013-10-01)
LAW OF 11 MARCH 2022 ON HOMELAND DEFENSE IMPLICATIONS FOR THE CYBERSECURITY OF POLAND
by: Piotr Kobielski
Published: (2022-11-01)
by: Piotr Kobielski
Published: (2022-11-01)
The influence of the digital environment on the spread of cyber terrorism
by: Baltezarević Ivana Ž., et al.
Published: (2022-01-01)
by: Baltezarević Ivana Ž., et al.
Published: (2022-01-01)
Collateral Damage from Offensive Cyber Operations—A Systematic Literature Review
by: Emil Larsson
Published: (2025-06-01)
by: Emil Larsson
Published: (2025-06-01)
Design and Implementation of Multi-Cyber Range for Cyber Training and Testing
by: Moosung Park, et al.
Published: (2022-12-01)
by: Moosung Park, et al.
Published: (2022-12-01)
Challenges for Ukraine’s cyber security: National dimensions
by: Pavlo Katerynchuk
Published: (2019-12-01)
by: Pavlo Katerynchuk
Published: (2019-12-01)
Complexity Science and Cyber Operations: A Literature Survey
by: Briant Becote, et al.
Published: (2023-12-01)
by: Briant Becote, et al.
Published: (2023-12-01)
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
The Impact of Cyberwarfare on the National Security
by: Temur Digmelashvili
Published: (2023-08-01)
by: Temur Digmelashvili
Published: (2023-08-01)
Cyber Diplomacy: A New Frontier for Global Cooperation in the Digital Age
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
Model and application of cyberspace information system
by: Jilong WANG, et al.
Published: (2020-02-01)
by: Jilong WANG, et al.
Published: (2020-02-01)
Model and application of cyberspace information system
by: Jilong WANG, et al.
Published: (2020-02-01)
by: Jilong WANG, et al.
Published: (2020-02-01)
Research of public infrastructure system and security policy in cyberspace
by: Jie QIU, et al.
Published: (2021-12-01)
by: Jie QIU, et al.
Published: (2021-12-01)
Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues
by: Małgorzata Czuryk
Published: (2022-09-01)
by: Małgorzata Czuryk
Published: (2022-09-01)
Cyber Sanctions as a Tool of Competition in Global Cyberspace
by: S. I. Balakhonova
Published: (2023-04-01)
by: S. I. Balakhonova
Published: (2023-04-01)
Security pattern in the cyberspace of the Islamic Republic of Iran with a futuristic approach
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
Possibility of applying the rules of international humanitarian law to cyber warfare
by: Sanela Veljković
Published: (2024-10-01)
by: Sanela Veljković
Published: (2024-10-01)
Cyber Peacekeeping: Critical Evaluation of Digital Blue Helmets Program
by: Fahad Nabeel
Published: (2020-07-01)
by: Fahad Nabeel
Published: (2020-07-01)
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
Assessing Attribution and Credible Deterrence in Cyberspace
by: Muhammad Imtiaz Sabir
Published: (2024-07-01)
by: Muhammad Imtiaz Sabir
Published: (2024-07-01)
The use of cyberspace in the context of hybrid warfare
by: Vuletić Dejan V.
Published: (2017-01-01)
by: Vuletić Dejan V.
Published: (2017-01-01)
Similar Items
-
Study on Cyber Common Operational Picture Framework for Cyber Situational Awareness
by: Kookjin Kim, et al.
Published: (2023-02-01) -
Cyberspace: A Digital Ecosystem
by: Kari J. Lippert, et al.
Published: (2021-06-01) -
Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method
by: Kookjin Kim, et al.
Published: (2022-01-01) -
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures
by: Jang Jisoo, et al.
Published: (2024-01-01) -
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
by: Aybala Lale Kahraman
Published: (2024-12-01)
