Search Results - "Kott, Alexander"
-
1
From cockroaches to tanks: The same power-mass-speed relation describes both biological and artificial ground-mobile systems
Published in PloS one (26-04-2021)“…This paper explores whether artificial ground-mobile systems exhibit a consistent regularity of relation among mass, power, and speed, similar to that which…”
Get full text
Journal Article -
2
Operational resilience: concepts, design and analysis
Published in Scientific reports (19-01-2016)“…Building resilience into today’s complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural…”
Get full text
Journal Article -
3
To Improve Cyber Resilience, Measure It
Published in Computer (Long Beach, Calif.) (01-02-2021)“…Measuring cyber resilience is vital to our security. In this article, we examine the importance of measuring cyber resilience and potential approaches to…”
Get full text
Journal Article -
4
-
5
Long-term forecasts of military technologies for a 20–30 year horizon: An empirical assessment of accuracy
Published in Technological forecasting & social change (01-12-2018)“…During the 1990s, while exploring the impact of the collapse of the Soviet Union on developments in future warfare, a number of authors offered forecasts of…”
Get full text
Journal Article -
6
Toward universal laws of technology evolution: modeling multi-century advances in mobile direct-fire systems
Published in Journal of defense modeling and simulation (01-10-2020)“…This paper explores the question of whether a single regularity of technological growth might apply to a broad range of technologies, over a period of multiple…”
Get full text
Journal Article -
7
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach
Published in IEEE transactions on information forensics and security (01-10-2017)“…We analyze sets of intrusion detection records observed on the networks of several large, nonresidential organizations protected by a form of intrusion…”
Get full text
Journal Article -
8
The Internet of Battle Things
Published in Computer (Long Beach, Calif.) (01-12-2016)“…On the battlefields of the future, multitudes of intelligent things will be communicating, acting, and collaborating with one another and with human…”
Get full text
Journal Article -
9
Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk?
Published in Computer (Long Beach, Calif.) (01-10-2021)“…We discuss the human role in the design and control of cyberdefenses. We focus on machine learning training and algorithmic feedback and constraints, with the…”
Get full text
Journal Article -
10
Introduction to the second part of the special issue on model-driven paradigms for integrated approaches to cyber defense
Published in Journal of defense modeling and simulation (01-04-2018)Get full text
Journal Article -
11
The significance of model-driven paradigms in cyber security: an introduction
Published in Journal of defense modeling and simulation (01-01-2018)Get full text
Journal Article -
12
How Do You Command an Army of Intelligent Things?
Published in Computer (Long Beach, Calif.) (01-12-2017)“…The future workforce will be made up of both humans and intelligent things. We'll need to understand and leverage the strengths and weaknesses of human…”
Get full text
Journal Article -
13
Anticipating the Next Technology: The Study of the 800-year Evolution in Small Arms
Published in Research technology management (04-07-2021)“…Overview: Moore's Law has driven innovation in computing for decades by providing a future target and set of expectations that drives innovation. In this…”
Get full text
Journal Article -
14
Cyber Resilience: by Design or by Intervention?
Published in Computer (Long Beach, Calif.) (01-08-2021)“…The term "cyber resilience by design" (RBD) is growing in popularity. But what is the other resilience, not by design? In this article, we explore the…”
Get full text
Journal Article -
15
Size and History Combine in Allometry Relation of Technology Systems
Published in Journal of defense modeling and simulation (01-07-2022)“…Complex systems often exhibit amazingly regular behavior through allometry relations (ARs) between their functional attributes and their size. An empirical…”
Get full text
Journal Article -
16
Cybertrust: From Explainable to Actionable and Interpretable Artificial Intelligence
Published in Computer (Long Beach, Calif.) (01-09-2020)“…We argue that artificial intelligence (AI) systems should be designed with features that build trust by bringing decision-analytic perspectives into AI…”
Get full text
Journal Article -
17
Russian Cyber Onslaught Was Blunted by Ukrainian Cyber Resilience, Not Merely Security
Published in Computer (Long Beach, Calif.) (01-08-2024)“…Russian cyberattacks on Ukraine largely failed to produce meaningful outcomes not merely due to robust Ukrainian cyber defenses but also because of Ukraine’s…”
Get full text
Journal Article -
18
Security Outlook: Six Cyber Game Changers for the Next 15 Years
Published in Computer (Long Beach, Calif.) (01-12-2014)“…Six potential cyber game changers gleaned from a recent long-range planning symposium can help experts identify priorities for future cybersecurity research…”
Get full text
Journal Article -
19
Will Cybersecurity Dictate the Outcome of Future Wars?
Published in Computer (Long Beach, Calif.) (01-12-2015)“…A recent workshop envisions the impacts that information and communications technology advances will have on warfare by 2050 and the challenges these pose for…”
Get full text
Journal Article -
20
Mathematical Modeling of Cyber Resilience
Published in MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (28-11-2022)“…We identify quantitative characteristics of responses to cyber compromises that can be learned from repeatable, systematic experiments. We model a vehicle…”
Get full text
Conference Proceeding