ORCID Profile
0000-0002-0599-8362
Current Organisations
University of South Australia
,
École Polytechnique Fédérale de Lausanne
,
Cygence
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: IEEE
Date: 10-2014
Publisher: IGI Global
Date: 10-2017
Abstract: Modern military forces rely heavily on cyber-enabled systems for logistics, communication, and control. Modern military platforms are heavily integrated with computing capability. This integration and reliance will only increase over time. Modern military operations require the support of flexible, responsive and resilient cyber-capabilities. Current information system security models and information assurance constructs seek to achieve information assurance, a high degree of certainty in the confidentiality, integrity and availability of cyber-systems supporting combat operations. However, this approach assumes that an information assurance approach is a complete and comprehensive defense. History though, has proven otherwise. This work argues that the information assurance approach, whilst a worthy goal, is not reflective of the lessons of history or warfare. Specifically, this work outlines the need for, and introduces The Military Cyber-Maturity Model, a pragmatic model that assumes a technically capable and intelligent adversary. This model assumes the possibility of an adversary utilizing an unknown vulnerability to attack the system, and expends resources to minimise the impact of the successful attack rather than relying entirely on an impregnable defense. This approach extends beyond the assumption that a cyber-attack immediately causes mission failure, by recognizing that each cyber-attack has different requirements and outcomes and will affect different assets and processes. The Military Cyber-Maturity Model seeks to model business continuity through a high degree of cultural change, embedded work practices that parallel analogue and digital work practices with deceptive counterintelligence behavior. The Military Cyber-Maturity Model incorporates the concepts of behavioral defense and mission assurance to provide agility and increase the likelihood of success in combat. Information deception provides a behavioral defense, creating uncertainty and doubt in the adversary's mind and reducing the degree of trust they have in the information available. This paper introduces the model, outlines its aims, components and justifications. This work also outlines the need for simulation and testing to validate the model's effectiveness, and introduces a number of potential use-cases.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 12-2015
Publisher: IEEE
Date: 06-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Springer International Publishing
Date: 30-05-2018
Publisher: Frontiers Media SA
Date: 16-12-2020
DOI: 10.3389/FPSYG.2020.537612
Abstract: The misleading and propagandistic tendencies in American news reporting have been a part of public discussion from its earliest days as a republic ( Innis, 2007 Sheppard, 2007 ). “Fake news” is hardly new ( McKernon, 1925 ), and the term has been applied to a variety of distinct phenomenon ranging from satire to news, which one may find disagreeable ( Jankowski, 2018 Tandoc et al., 2018 ). However, this problem has become increasingly acute in recent years with the Macquarie Dictionary declaring “fake news” the word of the year in 2016 ( Lavoipierre, 2017 ). The international recognition of fake news as a problem ( Pomerantsev and Weiss, 2014 Applebaum and Lucas, 2016 ) has led to a number of initiatives to mitigate perceived causes, with varying levels of success ( Flanagin and Metzger, 2014 Horne and Adali, 2017 S le et al., 2018 ). The inability to create a holistic solution continues to stymie researchers and vested parties. A significant contributor to the problem is the interdisciplinary nature of digital deception. While technology enables the rapid and wide dissemination of digitally deceptive data, the design and consumption of data rely on a mixture of psychology, sociology, political science, economics, linguistics, marketing, and fine arts. The authors for this effort discuss deception’s history, both old and new, from an interdisciplinary viewpoint and then proceed to discuss how various disciplines contribute to aiding in the detection and countering of fake news narratives. A discussion of various fake news types (printed, staged events, altered photographs, and deep fakes) ensues with the various technologies being used to identify these the shortcomings of those technologies and finally the insights offered by the other disciplines can be incorporated to improve outcomes. A three-point evaluation model that focuses on contextual data evaluation, pattern spread, and archival analysis of both the author and publication archives is introduced. While the model put forth cannot determine fact from fiction, the ability to measure distance from fact across various domains provides a starting point for evaluating the veracity of a new story.
Publisher: IGI Global
Date: 10-2019
Abstract: Despite the academic and military interest in the use of combined cyber-kinetic effects in future warfare, there is little that seeks to scientifically analyse the impact of combined cyber and kinetic military action. Current approaches to simulation focus on either the physical or cyber, but there are no current simulation approaches that combine these two domains. Military simulations in particular favor physical domains over cyber ones, relegating the uniqueness and nuances of cyber a second order consideration. Future warfare will incorporate a combined multi-domain conflict, and this includes cyber. To effectively simulate this, the uniqueness of each domain must be considered, including the interaction between domains to produce combined effects. This work introduces the Battlespace Integrated Cyber-Kinetic Effects (BICKE) simulation framework. The BICKE framework is designed specifically to combine the cyber and physical domains for the purposes of simulating mission impact. There is a requirement for researchers to measure the synergistic effects across domains.
Publisher: Informa UK Limited
Date: 31-05-2016
Publisher: Royal Society of Chemistry (RSC)
Date: 2023
DOI: 10.1039/D2BM01405J
Abstract: We present a novel oxygen therapeutic where hemoglobin is encapsulated within metal–organic framework nanocarriers. Antioxidant gold nanozymes are also being entrapped within the platform to minimize the conversion of Hb into nonfunctional metHb.
Publisher: Informa UK Limited
Date: 08-04-2021
Publisher: SAGE Publications
Date: 02-2017
Abstract: Agent-based military combat simulation models make use of a variety of methods to determine in idual engagement and casualty effects. The agent-based approach differs to the deterministic approach of Lanchester and Osipov, whose combat attrition calculations pre-dated computationally intensive physics-based simulation models. Deterministic approaches to analyze force attrition rates and the outcomes of combat have been noted by many authors to lack realism and to ignore many fundamental aspects of modern combat. However, there is little available evidence to suggest that modern simulations provide a more realistic attrition rate, despite their complexity. This paper seeks to explain the importance of understanding the implications of the tactical aspects of multiple simulation packages and to ensure these are considered within the underlying combat model. The principle factor this paper will discuss is attrition and its relationship to maneuver. This work analyzes the macro-attrition rates emergent within a number of unclassified agent-based simulations using the Helmbold space. The results demonstrate insufficient sensitivity to the influence of maneuver and the inconsistent influence of force ratios on combat outcomes. Simulation supported by well-documented testing and validation is necessary for analysts to support the military training imperative and provide realistic experimental engagement results.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
No related grants have been discovered for David Ormrod.