A Knowledge Graph-Based Framework for Integrated Network-Centric Warfare Strategies for Cyber-Physical-Social World

被引:1
作者
Malick, Rauf Ahmed Shams [1 ]
Murtaza, Mir [1 ]
Qureshi, Khubaib Ahmed [2 ]
机构
[1] FAST NU, Sch Comp, Karachi, Pakistan
[2] DHA SUFFA Univ, Karachi, Pakistan
来源
2022 INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS) | 2022年
关键词
Knowledge Graph; Network Science; Social Networks; Modern Warfare; Information Warfare; MEDIA; RIOTS;
D O I
10.1109/ICCWS56285.2022.9998467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The availability of multichannel data in the cyber, physical and social world has challenged Artificial Intelligence (AI) based methods to develop novel tools for integrated modern warfare strategies. Networks are widely being used to represent enriched data in combination with AI tools for deeper insights. The formation of static and dynamic networks from audio, video, GPS, text and social data has shaped network-centric warfare strategies in an integrated setting. The present paper highlights a set of challenges related to inference methods in the cyber, physical and social world. A novel framework is presented in this paper that allows the representation of multidimensional data with a single network-driven viewpoint and representing multidimensional networks in the form of knowledge graphs. The knowledge graphs are presented as an effective tool that has the ability to be utilized in surveillance, strategy development and real-time information sharing for cyber-physical-social worlds. The presented components in the strategic framework are implemented and validated under certain constraints for better understanding.
引用
收藏
页码:42 / 48
页数:7
相关论文
共 47 条
[1]  
Abrardo A., 2021, Information Fusion in Distributed Sensor Networks With Byzantines
[2]  
Akinode JL., 2011, Mediterranean Journal of Social Sciences, V2, P75
[3]   Polarization and social media: A systematic review and research agenda [J].
Arora, Swapan Deep ;
Singh, Guninder Pal ;
Chakraborty, Anirban ;
Maity, Moutusy .
TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2022, 183
[4]  
Baheti R., 2011, The Impact of Control Technology, P161, DOI DOI 10.1145/1795194.1795205
[5]  
Beskow D.M., 2019, Social cybersecurity: an emerging national security requirement
[6]   Cascading behaviour in complex socio-technical networks [J].
Borge-Holthoefer, Javier ;
Banos, Raquel A. ;
Gonzalez-Bailon, Sandra ;
Moreno, Yamir .
JOURNAL OF COMPLEX NETWORKS, 2013, 1 (01) :3-24
[7]   A review: Knowledge reasoning over knowledge graph [J].
Chen, Xiaojun ;
Jia, Shengbin ;
Xiang, Yang .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 141
[8]   Collect it all: national security, Big Data and governanceY [J].
Crampton, Jeremy W. .
GEOJOURNAL, 2015, 80 (04) :519-531
[9]   Better Safe Than Sorry: an Adversarial Approach to improve Social Bot Detection [J].
Cresci, Stefano ;
Petrocchi, Marinella ;
Spognardi, Angelo ;
Tognazzi, Stefano .
PROCEEDINGS OF THE 11TH ACM CONFERENCE ON WEB SCIENCE (WEBSCI'19), 2019, :47-56
[10]  
Farooq A., 2020, J SOC POLIT SCI, V3