A Knowledge Graph-Based Framework for Integrated Network-Centric Warfare Strategies for Cyber-Physical-Social World

被引:1
作者
Malick, Rauf Ahmed Shams [1 ]
Murtaza, Mir [1 ]
Qureshi, Khubaib Ahmed [2 ]
机构
[1] FAST NU, Sch Comp, Karachi, Pakistan
[2] DHA SUFFA Univ, Karachi, Pakistan
来源
2022 INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS) | 2022年
关键词
Knowledge Graph; Network Science; Social Networks; Modern Warfare; Information Warfare; MEDIA; RIOTS;
D O I
10.1109/ICCWS56285.2022.9998467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The availability of multichannel data in the cyber, physical and social world has challenged Artificial Intelligence (AI) based methods to develop novel tools for integrated modern warfare strategies. Networks are widely being used to represent enriched data in combination with AI tools for deeper insights. The formation of static and dynamic networks from audio, video, GPS, text and social data has shaped network-centric warfare strategies in an integrated setting. The present paper highlights a set of challenges related to inference methods in the cyber, physical and social world. A novel framework is presented in this paper that allows the representation of multidimensional data with a single network-driven viewpoint and representing multidimensional networks in the form of knowledge graphs. The knowledge graphs are presented as an effective tool that has the ability to be utilized in surveillance, strategy development and real-time information sharing for cyber-physical-social worlds. The presented components in the strategic framework are implemented and validated under certain constraints for better understanding.
引用
收藏
页码:42 / 48
页数:7
相关论文
共 47 条
[21]   AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports [J].
Li, Zhenyuan ;
Zeng, Jun ;
Chen, Yan ;
Liang, Zhenkai .
COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 :589-609
[22]  
Libicki MC, 2007, CONQUEST IN CYBERSPACE: NATIONAL SECURITY AND INFORMATION WARFARE, P1, DOI 10.1017/CBO9780511804250
[23]   Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges [J].
Mahmoud, Magdi S. ;
Hamdan, Mutaz M. ;
Baroudi, Uthman A. .
NEUROCOMPUTING, 2019, 338 :101-115
[24]  
Matteo C, 2019, Journal of Information Warfare, V18, P83
[25]   Defeating Terrorist Networks with Game Theory [J].
Michalak, Tomasz P. ;
Rahwan, Talal ;
Skibski, Oskar ;
Wooldridge, Michael .
IEEE INTELLIGENT SYSTEMS, 2015, 30 (01) :53-61
[26]   FogSurv: A Fog-Assisted Architecture for Urban Surveillance Using Artificial Intelligence and Data Fusion [J].
Munir, Arslan ;
Kwon, Jisu ;
Lee, Jong Hun ;
Kong, Joonho ;
Blasch, Erik ;
Aved, Alexander J. ;
Muhammad, Khan .
IEEE ACCESS, 2021, 9 (09) :111938-111959
[27]   An integrated approach: using knowledge graph and network analysis for harnessing digital advertisement [J].
Munir, Siraj ;
Malick, Rauf Ahmed Shams ;
Jami, Syed Imran ;
Ahmed, Ghufran ;
Khan, Suleman ;
Rodrigues, Joel J. P. C. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (06) :8883-8898
[28]   Industry 4.0: Industrial Internet of Things (IIOT) [J].
Munirathinam, Sathyan .
DIGITAL TWIN PARADIGM FOR SMARTER SYSTEMS AND ENVIRONMENTS: THE INDUSTRY USE CASES, 2020, 117 :129-164
[29]  
Oxlund B., 2016, Anthropology Now, V8, P1, DOI [10.1080/19428200.2016.1202574, DOI 10.1080/19428200.2016.1202574]
[30]  
Pant K, 2020, AACL-IJCNLP 2020: THE 1ST CONFERENCE OF THE ASIA-PACIFIC CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS AND THE 10TH INTERNATIONAL JOINT CONFERENCE ON NATURAL LANGUAGE PROCESSING: PROCEEDINGS OF THE STUDENT RESEARCH WORKSHOP, P37