Logo: to the web site of the Swedish Defence University

fhs.se
Endre søk
Begrens søket
12 1 - 50 of 94
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Andersson, Kent
    Solid State Physics Group, Department of Technology, Uppsala University.
    Preparation and Characterisation of Sputtered Titanium- and Zirconium Nitride Optical Films1993Licentiatavhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Multilayered interference coatings based on titanium- and zirconium nitride and designed for solar control have been prepared using reactive d c magnetron sputtering. Preparation effects and degradation mechanisms were investigated. It was shown that the quality of the nitride strongly depends on the degree of crystallinity in the underlying oxide. It has been shown that the nitride layer partly oxidizes as the top oxide layer is deposited. The degradation is enhanced with temperature. A thin sacrificial layer of aluminium deposited between successive depositions of nitride and oxide is shown to improve the optical performance of the coating as preparedm as well as after accelerated ageing tests.

    The optical properties of opaque and semitransparent films of zirconium nitride have been studied. A thorough investigation of the influence of composition, deposition rate, substrate temperature and film thickness on the optical response of the film was performed. Both photometric and ellipsometric methods were used to determine thicknesses and the optical constants at wavelengths ranging from 0.23 to 25 μm. The resulting values of n and k, in the wavelength intervals where these independent methods are applicable, have been shown to agree extremely well. The results so far indicate an even larger potential for zirconium nitride based solar control coatings as compared to the titanium nitride based.

    Access to optical constants derived from films of zirconium nitride of variable quality made multilayer modelling a powerful tool in the design and analysis of solar control coatings.

    Fulltekst (pdf)
    fulltext
  • 2.
    Andersson, Kent
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA).
    Åkerlind, Christina
    Totalförsvarets forskningsinstitut (FOI).
    A review of materials for spectral design coatings in signature management applications2014Inngår i: Optics and Photonics for Counterterrorism, Crime Fighting, and Defence X; and Optical Materials and Biomaterials in Security and Defence Systems Technology XI (vol. 9253) / [ed] Douglas Burgess; Gari Owen; Harbinder Rana; Roberto Zamboni; François Kajzar; Attila A. Szep, SPIE - International Society for Optical Engineering, 2014Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The current focus in Swedish policy towards national security and high-end technical systems, together with a rapid development in multispectral sensor technology, adds to the utility of developing advanced materials for spectral design in signature management applications. A literature study was performed probing research databases for advancements. Qualitative text analysis was performed using a six-indicator instrument: spectrally selective reflectance; low gloss; low degree of polarization; low infrared emissivity; non-destructive properties in radar and in general controllability of optical properties. Trends are identified and the most interesting materials and coating designs are presented with relevant performance metrics. They are sorted into categories in the order of increasing complexity: pigments and paints, one-dimensional structures, multidimensional structures (including photonic crystals), and lastly biomimic and metamaterials. The military utility of the coatings is assessed qualitatively. The need for developing a framework for assessing the military utility of incrementally increasing the performance of spectrally selective coatings is identified.

    Fulltekst (pdf)
    fulltext
  • 3.
    Becker, Per
    Avdelningen för Riskhantering och Samhällssäkerhet, Lund universitet, (SWE).
    Politikerna struntar i klimatforskningen 420 forskare: Regeringens politik är katastrofal – nu måste fler svenskar kräva en omställning2023Inngår i: Aftonbladet DebattArtikkel i tidsskrift (Annet (populærvitenskap, debatt, mm))
  • 4.
    Becker, Per
    Avdelningen för Riskhantering och Samhällssäkerhet, Lunds universitet, (SWE).
    Sustainability Science: Managing Risk and Resilience for Sustainable Development2023 (oppl. 2)Bok (Fagfellevurdert)
    Abstract [en]

    Continues to fill gaps between the descriptive, conceptual, and transformative sustainability science.

    Sustainability is increasingly important across functional sectors and scientific disciplines. Policy-makers, practitioners, and academics continue to wrestle with the complexity of risk, resilience, and sustainability, but because of the necessary transdisciplinary focus, it is difficult to find authoritative content in a single source. Sustainability Science: Managing Risk and Resilience for Sustainable Development, Second Edition, contributes to filling that gap and is completely revised with several new chapters. It asserts that all efforts for the sustainability of humankind are undermined by the four fundamental challenges of complexity, uncertainty, ambiguity, and dynamic change. While there are no silver bullets, this book contends that we need systems approaches, risk approaches, participatory approaches, and resilience approaches to address each of them and endeavours to provide such. With that in mind, this book describes the state of the world (Part I), proposes a way to approach the world (Part II), and suggests how to set out to change the world (Part III).

  • 5.
    Becker, Per
    Avdelningen för Riskhantering och Samhällssäkerhet, Lunds universitet, (SWE).
    Sveriges utsläpp måste minska nu, regeringen: 531 forskare: Annars är sveket monumentalt – ni kan inte säga att ni inte visste2023Inngår i: Aftonbladet DebattArtikkel i tidsskrift (Annet (populærvitenskap, debatt, mm))
  • 6.
    Bengtsson, Ingemar
    Försvarshögskolan.
    Vad innebär införandet av FMN för Försvarsmaktens insatsledningssystem?2016Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Försvarsmakten har angett att senast år 2023 ska Försvarsmaktens insatsledningssystem vara fullt ut FMN kompatibla. Detta arbete ska besvara vad som initialt behöver förändras i Försvarsmaktens insatsledningsstödsystem för att dessa ska uppnå FMN kompatibilitet.

    Nuvarande FMN spiralspecifikation innehåller i princip enbart stöd för de grundläggande människa-till-människa kommunikationstjänsterna. Med hjälp av dessa ska funktions-kedjorna för SA, JISR och MEDEVAC genomföras.

    Försvarsmakten är tydlig med att interoperabilitet är viktigt för att kunna verka med andra, både inom och utanför närområdet. Det framgår dock inte lika tydligt vilka av Försvarsmaktens insatsledningssystem som berörs av FMN.

    Detta arbete har kommit fram till att SWECCIS troligen är det insatsledningsstödsystem som bäst motsvarar vad FMN försöker realisera idag och att SWECCIS i grunden är FMN kompatibel. SWECCIS tillhandahåller dock bara fyra av de sex människa-till-människa kommunikationstjänsterna, och Försvarsmaktens nuvarande lösning för att tillhandahålla ljudbaserad samarbetstjänst är inte FMN kompatibel.

    Framtida FMN spiralspecifikationer kommer att ställa ytterligare krav på Försvarsmaktens insatsledningsstödsystem för att dessa fortsatt ska vara FMN kompatibla.

    Fulltekst (pdf)
    FMN
  • 7.
    Bengtsson, Johnny
    et al.
    Swedish National Forensic Centre, Swedish Police Authority and Department of Electrical Engineering, Linköping University, (SWE).
    Huskaj, Gazmend
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde.
    The Manifestation of Chinese Strategies Into Offensive Cyberspace Operations Targeting Sweden2021Inngår i: Proceedings of the 20th European Conference on Cyber Warfare and Security / [ed] Dr. Thaddeus Eze, Dr. Lee Speakman and Dr. Cyril Onwubiko, Reading, UK, 2021, s. 35-43Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The aim of this article is to present how Chinese strategies are manifested into offensive cyberspace operations targeting Sweden. It is commonly known that People’s Republic of China (PRC, and in this definition the meaning of thegovernment and its military), uses five-year plans (FYP) for social and economic steering strategy of their country. This has been going on since 1953 until today. In 2015, the national strategic plan Made in China 2025 (中国制造2025) was launched by Le Keqiang, the Premier of the State Council of PRC. The main goal with this plan is to strengthen the economic development. In addition, Chinese military strategists noted the importance of information warfare and intelligence during military operations. This article is based on open sources: the official English translated version of the 13th Five-year plan (FYP) and other reporting on cyberspace operations linked to the PRC. A number of cases are presented to highlight the link between the PRC FYP and their targets. Next, the current situation in Sweden is presented and how the country is targeted by PRC-linked activities, both in and through cyberspace, but also military infiltration on academia. The results show that Sweden has been, and is continuously the target of offensive cyberspace operations. In parallel, the country is also the target of military infiltration on the academia, and direct investment strategies such as Huawei attempting to compete for the 5G frequency actions arranged by the Swedish Post and Telecom Authority. In conclusion, Sweden will continue to experience cyberespionage from PRC on all levels and on all domains; science, technology, IP and privacy information theft. Previously unveiled cyberspace operations cases in this article have proven to be a convenient strategy for the PRC to reduce its research and development gap in several ways; innovatively, financially and to shortening the time-to-market (TTM).

  • 8.
    Bergman, David
    Försvarshögskolan, Institutionen för ledarskap och ledning, Avdelningen för ledarskap och ledning i Stockholm.
    Mjölken spillde ut sig: artificiell intelligens, etik och autonoma vapensystem2023Inngår i: Drönare/UAS: Teknik och förmågor / [ed] Stig Rydell; Mats Olofsson, Stockholm: Kungl Krigsvetenskapsakademien , 2023, s. 61-74Kapittel i bok, del av antologi (Annet vitenskapelig)
  • 9.
    Boschetti, Nicolò
    et al.
    (USA).
    Gordon, Nathaniel
    (USA).
    Sigholm, Johan
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Falco, Gregory
    (USA).
    Commercial Space Risk Framework Assessing the Satellite Ground Station Security Landscape for NATO in the Arctic and High North2022Inngår i: 40th IEEE Military Communications Conference, Rockville, MD, USA, November 28 - December 2, 2022., IEEE , 2022, s. 679-686Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Satellite ground stations in the Arctic and High North are of strategic importance to NATO, given their ability to collect intelligence from space assets in polar Earth orbit. Commercial space infrastructure such as ground systems are increasingly dual-use, employed for both civilian and defense purposes. Their dual-use could cause them to become military targets. As such, commercial operators must strategically consider ground station placement to optimize for utility, while accounting for their security risk. This research presents a frame-work to assess the commercial satellite ground station security landscape by outlining security and performance tradeoffs given geographic location, including proximity to potential adversaries, and designates eight separate risk regions. Particularly, Sweden's and Finland's space infrastructure is of focus given their recent application to join NATO in the wake of Russian aggression. The paper concludes that, to secure ground stations and the assets and services that they enable, a comprehensive risk evaluation including positioning of ground stations is critical.

  • 10.
    Boschetti, Nicolò
    et al.
    Johns Hopkins University, (USA)..
    Sigholm, Johan
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Wallén, Mattias
    Swedish Space Corporation, (SWE)..
    Falco, Gregory
    Johns Hopkins University, (USA)..
    A Hybrid Space Architecture for Robust and Resilient Satellite Services2023Inngår i: 2023 IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT), Institute of Electrical and Electronics Engineers (IEEE) , 2023, s. 114-122Konferansepaper (Fagfellevurdert)
    Abstract [en]

    A 'hybrid space architecture' has been proposed to facilitate robust and resilient satellite data downlink, integration and analysis; however, the technical details for what may comprise a hybrid space architecture are severely lacking. Thus far, 'hybrid' principally entails the diversity of commercial providers. While diverse suppliers can contribute to hybrid space architectures, we argue that robustness and resilience will only be achieved through heterogeneous network and asset architectures. A connected satellite services ecosystem composed of the union of different networks with different characteristics would limit single points of failure, thereby generating high levels of redundancy, resilience and scalability. This research outlines parameters of a hybrid space architecture, documents satellite service reference architectures and provides a comparative analysis of the features for each architecture. Further, through a case study of existing satellite service providers, we propose how a hybrid space architecture could be piloted in Northern Europe and the High North.

  • 11.
    Boschetti, Nicolò
    et al.
    Johns Hopkins University (USA).
    Smethurst, Chelsea
    Microsoft (USA).
    Epiphaniou, Gregory
    University of Warwick (GBR).
    Maple, Carsten
    University of Warwick (GBR).
    Sigholm, Johan
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Falco, Gregory
    Johns Hopkins University (USA).
    Ground Station as a Service Reference Architectures and Cyber Security Attack Tree Analysis2023Inngår i: 2023 IEEE Aerospace Conference, Institute of Electrical and Electronics Engineers (IEEE), 2023Konferansepaper (Fagfellevurdert)
    Abstract [en]

    As the Ground Station as a Service (GSaaS) paradigm transforms space infrastructure operations, new attack surface emerges for malicious actors. While the space community generally refers to GSaaS as a singular model, there are several flavors of these systems. After a description of the general GSaaS network's basic structure, this paper presents an analysis of four reference architectures of GSaaS. On the basis of this systems engineering analysis, a cybersecurity analysis of the critical nodes will be carried out through the attack tree method. Later the cybersecurity implication both of technical and strategic characteristic of GSaaS networks will be discussed and put in relation with the current state of space cyberwarfare landscape.

  • 12.
    Bundschuh, Jochen
    et al.
    Univ Southern Queensland, Deputy Vice Chancellors Off Res & Innovat, West St, Toowoomba, Qld 4350, Australia.;Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia.;Univ Southern Queensland, Fac Hlth Engn & Sci, West St, Toowoomba, Qld 4350, Australia.;KTH Royal Inst Technol, Dept Sustainable Dev Environm Sci & Engn, KFH Internat Groundwater Arsen Res Grp, Teknikringen 76, SE-10044 Stockholm, Sweden..
    Maity, Jyoti Prakash
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia.;Natl Chung Cheng Univ, Dept Earth & Environm Sci, 168 Univ Rd, Min Hsiung 62102, Chiayi County, Taiwan..
    Mushtaq, Shahbaz
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia..
    Vithanage, Meththika
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia.;Natl Inst Fundamental Studies, Chem & Environm Syst Modeling Res Grp, Kandy 20000, Sri Lanka..
    Seneweera, Saman
    Univ Southern Queensland, Ctr Crop Hlth, West St, Toowoomba, Qld 4350, Australia..
    Schneider, Jerusa
    Univ Estadual Campinas, Sch Civil Engn Architecture & Urban Design, Sanitat & Environm Dept, BR-11308388 Campinas, SP, Brazil..
    Bhattacharya, Prosun
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia.;KTH Royal Inst Technol, Dept Sustainable Dev Environm Sci & Engn, KFH Internat Groundwater Arsen Res Grp, Teknikringen 76, SE-10044 Stockholm, Sweden..
    Khan, Nasreen Islam
    Australian Natl Univ, Coll Med Biol & Environm, Canberra, ACT 0200, Australia.;Int Rice Res Inst, GIS Social Sci Div, Los Banos 4031, Laguna, Philippines..
    Hamawand, Ihsan
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia..
    Guilherme, Luiz R. G.
    Fed Univ Lavras UFLA, Dept Soil Sci, Campus Univ,Caixa Postal 3037, BR-37200000 Lavras, MG, Brazil..
    Reardon-Smith, Kathryn
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia..
    Parvez, Faruque
    Columbia Univ, Sch Publ Hlth, Dept Environm Hlth Sci Mailman, 722 West 168th St, New York, NY 10032 USA..
    Morales-Simfors, Nury
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Ghaze, Sara
    Univ Southern Queensland, Fac Hlth Engn & Sci, West St, Toowoomba, Qld 4350, Australia..
    Pudmenzky, Christa
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia..
    Kouadio, Louis
    Univ Southern Queensland, Int Ctr Appl Climate Sci, West St, Toowoomba, Qld 4350, Australia..
    Chen, Chien-Yen
    Natl Chung Cheng Univ, Dept Earth & Environm Sci, 168 Univ Rd, Min Hsiung 62102, Chiayi County, Taiwan..
    Medical geology in the framework of the sustainable development goals2017Inngår i: Science of the Total Environment, ISSN 0048-9697, E-ISSN 1879-1026, Vol. 581, s. 87-104Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Exposure to geogenic contaminants (GCs) such as metal(loid)s, radioactive metals and isotopes as well as transuraniums occurring naturally in geogenic sources (rocks, minerals) can negatively impact on environmental and human health. The GCs are released into the environment by natural biogeochemical processes within the near-surface environments and/or by anthropogenic activities such as mining and hydrocarbon exploitation as well as exploitation of geothermal resources. They can contaminate soil, water, air and biota and subsequently enter the food chain with often serious health impacts which are mostly underestimated and poorly recognized. Global population explosion and economic growth and the associated increase in demand for water, energy, food, and mineral resources result in accelerated release of GCs globally. The emerging science of "medical geology" assesses the complex relationships between geo-environmental factors and their impacts on humans and environments and is related to the majority of the 17 Sustainable Development Goals in the 2030 Agenda of the United Nations for Sustainable Development. In this paper, we identify multiple lines of evidence for the role of GCs in the incidence of diseases with as yet unknown etiology (causation). Integrated medical geology promises a more holistic understanding of the occurrence, mobility, bioavailability, bio-accessibility, exposure and transfer mechanisms of GCs to the food-chain and humans, and the related ecotoxicological impacts and health effects. Scientific evidence based on this approach will support adaptive solutions for prevention, preparedness and response regarding human and environmental health impacts originating from exposure to GCs.

  • 13.
    Chaudhary, Waquar Ul Hassan
    et al.
    Tema, Linköpings universitet.
    Sivertun, Åke
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA).
    Object-based analysis of Multispectral RS Data and GIS for Detection of Climate Change Impact on the Karakoram Range Northern Pakistan2014Inngår i: Proceedings of the 7th International Congress on Environmental Modelling and Software, June 15-19, San Diego, California, USA / [ed] Ames, D.P., Quinn, N.W.T., Rizzoli, A.E., Manno, Switzerland: International Environmental Modelling and Software Society , 2014, Vol. 4, s. 2036-2043Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Changing climate have a great impact on northern area of Pakistan’s environment and is more prone to environmental changes impacts than rest of the country due to its high elevation. However, the results of melting glaciers effect not only the local environment but also the whole country with frequent and heavy floods. Although recent technological development provided solutions of many problems to mankind, the pace of development in the field of environmental preservation technologies are much slower than needed.

    Remote sensing (RS) from Satellites and Airplanes used in Geographical Information Systems (GIS) are technologies that can aid in understanding the ongoing environmental processes as it enable us to obtain information about vast area and help researchers to observe, understand, forecast and suggest response to changes that occur.

    It can be natural disasters or man-made disasters and human induced factors. Still analysis accuracy issues are there which plays a vital role for the formulation of any strategy. To achieve better results, object based analysis methods have been tested in here. Various algorithms are developed by the analysts to calculate the magnitude of land cover changes but must be evaluated for each environment that is under observation as for example mountainous areas. Here we have tried object-based methods in comparison with pixel based. Landslides, soil moisture, soil permeability, snow cover and vegetation cover that change during certain period of time can, with those methods, be effectively monitored. The findings were in short;

    1) Object based analysis shows better accuracy ratio as compared to the pixel based analysis.

    2) Slow but gradual depletion of snow/ice cover was confirmed in the study area of Karakoram region, Northern Pakistan.

    3) Snow and ice melting catalyses the floods, mudslides, landslides and lake outburst episodes in the area during last two decades could be clearly observed in the analysed images and survey data.

    4) Massive landslide/mudslide phenomena was observed in the study area in 2010 and 2012 in Landsat imagery. The artificial lake on the River Hunza was clearly observable in TM and ETM 2010, 2011 and 2012 imagery.

    5) Bare soil area increased due to glacial retreat therefore gradual increase in the vegetation can be observed from the year 1992 to 2011.

  • 14.
    Christensson, S. Anders
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Ledningsvetenskapliga avdelningen (LVA).
    Representations for military decision making2015Inngår i: 2015 Third World Conference on Complex Systems (WCCS) / [ed] Mohamed Essaaidi, Mohamed Nemiche, Maroccan, 2015, s. 52-52Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Present--‐day warfare often involves planning and execution of operations in complex environments. In order to support military decision making in such environments I argue that the military situation must be represented by six categories of representations. In current practice only two categories are employed. The six categories should be linked to representations of the operational plan and the planning process. By combining the different categories of representations, military decision makers will gain a better understanding of operational areas that hold complex system behaviour.

  • 15.
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT). University of Skövde, Skövde, Sweden.
    Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment2021Inngår i: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2021, nr 3, s. 36-53Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    The SoDark cipher is used to protect transmitted frames in the second and third generation automatic link establishment (ALE) standards for high frequency (HF) radios. The cipher is primarily meant to prevent unauthorized linking and attacks on the availability of HF radio networks. This paper represents the first known security analysis of the cipher used by the second generation ALE protocol—the de facto world standard—and presents a related-tweak attack on the full eight round version of the algorithm. Under certain conditions, collisions of intermediate states several rounds into the cipher can be detected from the ciphertext with high probability. This enables testing against the intermediate states using only parts of the key. The best attack is a chosen-ciphertext attack which can recover the secret key in about an hour with 100% probability, using 29 chosen ciphertexts.

  • 16.
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT). University of Skövde, SWE.
    sboxgates: A program for finding low gate count implementations of S-boxes2021Inngår i: Journal of Open Source Software, E-ISSN 2475-9066, Vol. 6, nr 62, s. 1-3, artikkel-id 2946Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    S-boxes are often the only nonlinear components in modern block ciphers. They are commonly selected to comply with very specific criteria in order to make a cipher secure against, for example, linear and differential attacks. An M x N S-box can be thought of as a lookup table that relates an M-bit input value to an N-bit output value, or as a set of N boolean functions of M variables (Schneier, 1996).

    Although cipher specifications generally describe S-boxes using their lookup tables, they can also be described as boolean functions or logic gate circuits. sboxgates, which is presented here, finds equivalent logic gate circuits for S-boxes, given their lookup table specification. Generated circuits are output in a human-readable XML format. The software can convert the output files into C or CUDA (a parallel computing platform for Nvidia GPUs) source code. The generated circuits can also be converted to the DOT graph description language for visualization with Graphviz (Ellson et al., 2002).

  • 17.
    Dansarie, Marcus
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review2024Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 12, s. 91101-91126Artikkel, forskningsoversikt (Fagfellevurdert)
    Abstract [en]

    For applications where general-purpose communication systems, such as mobile telephony, do not satisfy user requirements, special-purpose digital wireless communication standards have been developed. Since these systems often support critical infrastructures, security issues can have far-reaching consequences. To study the extent of research on security issues in specialized communication standards, a systematic literature review was performed, using snowballing to maximize coverage. The found publications cover security issues in radio communication systems for three major areas: civil transportation, public safety and security, and telephony and satellite communication systems. The main results from the included publications are summarized. This is followed by an analysis that presents five common themes among the security issues: lack of encryption, lack of authentication, broken encryption, protocol vulnerabilities, and implementation vulnerabilities. Research tools and methods used across the different technology fields are systematized, showing that software-defined radio and open-source software appear to be enablers of research on the communication standards covered by the review. The systematization also reveals that the application of research methods to different standards is spotty. Finally, numerous open research directions are pointed out, including the need for more holistic research that goes beyond just finding technical flaws in single standards.

  • 18.
    Dansarie, Marcus
    et al.
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem. University of Skövde, (SWE).
    Derbez, Patrick
    Univ Rennes, Centre National de la Recherche Scientifique (CNRS), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), (FRA).
    Leander, Gregor
    Ruhr University Bochum, (DEU).
    Stennes, Lukas
    Ruhr University Bochum, (DEU).
    Breaking HALFLOOP-242022Inngår i: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2022, nr 3, s. 217-238Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications. We present the first public cryptanalysis of HALFLOOP-24 and show that HALFLOOP-24, despite its key size of 128 bits, is far from providing 128 bit security. More precisely, we give attacks for ciphertext-only, known-plaintext, chosen-plaintext and chosen-ciphertext scenarios. In terms of their complexities, most of them can be considered practical. However, in the real world, the amount of available data is too low for our attacks to work. Our strongest attack, a boomerang key-recovery, finds the first round key with less than 210 encryption and decryption queries. In conclusion, we strongly advise against using HALFLOOP-24.

    Fulltekst (pdf)
    fulltext
  • 19.
    Dougherty, Mark S.
    et al.
    Dalarna University, (SWE).
    Hemgren Dougherty, Sofi
    Dalarna University, (SWE).
    Westin, Jerker
    Dalarna University, (SWE).
    The April Fool Turing Test2006Inngår i: tripleC: Communication, Capitalism & Critique, E-ISSN 1726-670X, Vol. 4, nr 2, s. 147-166Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This paper explores certain issues concerning the Turing test; non-termination, asymmetry and the need for a control experiment. A standard diagonalisation argument to show the non-computability of AI is extended to yields a socalled “April fool Turing test”, which bears some relationship to Wizard of Oz experiments and involves placing several experimental participants in a symmetrical paradox – the “April Fool Turing Test”. The fundamental question which is asked is whether escaping from this paradox is a sign of intelligence. An important ethical consideration with such an experiment is that in order to place humans in such a paradox it is necessary to fool them. Results from an actual April Fool Turing Test experiment are reported. It is concluded that the results clearly illustrate some of the difficulties and paradoxes which surround the classical Turing Test.

  • 20.
    Dulanya, Zuze
    et al.
    Geography and Earth Science Department, Malawi.
    Morales-Simfors, Nury
    Linköping University, Department of Computer and Information Science.
    Sivertun, Åke
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA).
    Comparative study of the silica and cation geothermometry of the Malawi hot springs: Potential alternative energy source2010Inngår i: Journal of African Earth Sciences, ISSN 0899-5362, Vol. 57, nr 4, s. 321-327Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Malawi is one of the poorest countries in the world and one of the most densely populated in south-eastern Africa. Its major power source is hydro-electricity. During the past few years, the power generation capacity has been reduced, which has impacted negatively on the socio-economic development of the country. The country holds an enormous potential to generate geothermal energy due to the country’s position within the Great African Rift valley. This could contribute to economic growth, poverty reduction and technological development in Malawi. The paper presents findings of research on comparisons between silica (quartz and chalcedony) and cation geothermometers (Na–K, Na–K–Ca and K–Mg) of hot springs in the Malawi Rift, in order to deduce the temperature at depth of selected hot springs. The saturation indices of most springs have a bearing on the geology of the areas where these hot springs are found. The Na–K geothermometers are, in general, higher than the Na–K–Ca geothermometer and the K–Mg geothermometer shows temperatures that are too low to be considered. The difference in the results between the different geothermometers may indicate shallow conditions of mixing with groundwater. Results also indicate that some hot springs have sufficient heat-generating capabilities and warrant further exploration work to assess their suitability for energy generation.

  • 21.
    Eklund, Jonas
    et al.
    Försvarsmakten.
    Sivertun, Åke
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA).
    Lärobok i Militärteknik, vol. 6: Inverkan av geografi, klimat och väder2013 (oppl. 1)Bok (Annet vitenskapelig)
    Fulltekst (pdf)
    larobok_i_militarteknik_vol6
    Download (jpg)
    presentationsbild
  • 22.
    Foyer, Pernilla
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA). Linköpings universitet, Institutionen för fysik, kemi och biologi.
    Early Experience, Maternal Care and Behavioural Test Design: Effects on the Temperament of Military Working Dogs2015Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Domestication has resulted in animals with broad variations between as well as within breeds, which allows for the selection and breeding of animals for preferred traits. This selection has affected both the genotypes and phenotypes of animals. In dogs, it has allowed for breeding for different purposes, such as companionship or the performance of specific tasks, e.g., herding, hunting, searching and protecting. Each of these types of working dogs has specific traits that are, in part, controlled by genes; however, genes are not solely responsible for the variations in the traits of an individual. The environment also plays a role, which has been studied in rodents and primates in recent decades. For instance, it has been shown that the amount of maternal care that a rat receives as a pup affects its temperament later in life; the more maternal care, i.e., licking, grooming and arched-back nursing (LG-ABN), that a rat receives, the more stress resistant, less reactive and more explorative it will be as an adult. However, the question is whether this is also true for dogs, and the investigation of how temperament in dogs is affected by environmental factors early in life is the main objective of this thesis. Three of the studies presented in this thesis focused on investigating the general parameters, particularly maternal care, that influences offspring behaviour to contribute to the understanding of temperament development in military working dogs. One of these studies concentrated on the environmental factors that influence dogs early in life, and the results indicated that some factors, such as parity, litter size and birth season, affect temperament later in life. Another study investigated how females take care of their young, and the results demonstrated that females consistently vary in their maternal style during the first three weeks postpartum and that this variation affects the temperament of the offspring. The third study focused on factors in the home environment, and the results showed that dogs approved through the evaluative temperament test were significantly associated with being hyperactive or restless and having difficulty settling down in the home environment. However, those dogs were also left home alone for more hours in a day than non-approved dogs. To be able to operate functionally, a military working dog needs to possess certain traits, or a certain temperament, and a vital characteristic is the way it responds to and copes with stress. This was investigated during an evaluative temperament test used to select dogs suitable for further training. Surprisingly, the results showed that the dogs approved for further training had significantly higher levels of salivary cortisol both before and after the test compared with the non-approved dogs. These findings may be of profound importance for understanding individual variations in behaviour and improving breeding schemes for working dogs.

    Fulltekst (pdf)
    FULLTEXT01
  • 23.
    Foyer, Pernilla
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA). Linköping University.
    Bjallerhag, Nathalie
    IFM Biology, AVIAN Behaviour Genomics and Physiology group, Linköping University, Sweden.
    Wilsson, Erik
    Dog Instruction Centre, Swedish Armed Forces, Sweden.
    Jensen, Per
    IFM Biology, AVIAN Behaviour Genomics and Physiology group, Linköping University, Sweden.
    Behaviour and experiences of dogs during the first year of life predict the outcome in a later temperament test2014Inngår i: Applied Animal Behaviour Science, ISSN 0168-1591, E-ISSN 1872-9045, Vol. 155, s. 93-100Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Early life experiences are known to shape the behavioural development of animals, and therefore events occurring during preadolescence and adolescence may have long-term effects. In dogs, this period of time may be important for later behaviour and thereby also the suitability of dogs for different working tasks. We used the breeding practice for Swedish military working dogs to investigate this possibility. German Shepherds were bred at a central facility and then kept in host families for about a year, before participating in a standardised test determining their temperament, behaviour, and suitability for further training. We surveyed the link between the behaviour of 71 prospective military working dogs in their home situations during the first year of life as assessed by an amended C-BARQ survey, and their performance in a temperament test (T-test) applied at about 17 months of age. Dogs which scored high for C-BARQ category "Trainability" showed a significantly higher success rate in the T-test (P < 0.001), while dogs that scored high for "Stranger-directed fear", "Non-social fear" and "Dog-directed fear" showed a significantly lower success rate (all P < 0.05). Also dogs with higher C-BARQ scores on "Hyperactivity/restlessness, difficulties in settling down" (P=0.028), and "Chasing/following shadows or light spots" (P=0.035) were more successful, as were dogs left longer times at home (2.97 +/- 0.32 vs. 2.04 +/- 0.33 h/day; P=0.050). Index value, describing the expected success rate in the T-test, was negatively correlated with "Non-social fear" (r = -0.35) and "Stranger directed fear" (r = -0.35). The combined effect of the significant C-BARQ categories explained 29.5% of the variance in the later T-test results (P=0.006). The results indicate that the experiences and behaviour of the dogs during their first year of life is crucial in determining their later behaviour and temperament, something that could potentially be used to improve selection procedures for working dogs. Furthermore, an unsuspected result was that success in the T-test was correlated with behaviours usually associated with problem behaviour, which calls for a deeper analysis of the selection criteria used for working dogs. (C) 2014 Elsevier B.V. All rights reserved.

  • 24.
    Foyer, Pernilla
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA). Linköpings universitet, Biologi.
    Svedberg, Anna-Maria
    Linköpings universitet, Biologi.
    Nilsson, Emma
    Linköpings universitet, Biologi.
    Wilsson, Erik
    Swedish Armed Forces Dog Training Unit, Märsta, Sweden.
    Olsen Faresjö, Åshild
    Linköpings universitet, Avdelningen för samhällsmedicin.
    Jensen, Per
    Linköpings universitet, Biologi.
    Behavior and cortisol responses of dogs evaluated in a standardized temperament test for military working dogs2016Inngår i: Journal of Veterinary Behavior: Clinical Applications and Research, ISSN 1558-7878, E-ISSN 1878-7517, Vol. 11, s. 7-12Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Military and police working dogs are often exposed to stressful or threatening events, and an improper response, e.g., fear, may implicate both reduced working efficiency and welfare. Therefore, identifying individuals that display a favorable response to potentially threatening situations is of great interest. In the present study, we investigated behavior responses of 85 prospective military working dogs in 4 subtests in a standardized temperament test used to select working dogs for the Swedish Armed Forces. Our goal was to evaluate behavioral responses in specific subtests and cortisol responses of candidate dogs. After dogs were rated as approved or nonapproved based on the test leader’s assessment of the full test result, we independently analyzed video recordings of 4 subtests. In addition, for 37 dogs, we analyzed pretest and posttest salivary cortisol levels. Dogs which were approved by the test leader for further training scored higher in the video recordings on emotionality and, in particular, fear-related behavior during a subset of the test and had higher levels of cortisol both before and after the test, than nonapproved dogs. Although this may actually reflect the desired traits, it could also indicate a bias in the selection procedure, which may pose limitations on the attempts to recruit the most suitable working dogs.

  • 25.
    Foyer, Pernilla
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA). Linköpings universitet, Biologi.
    Wilsson, Erik
    Swedish Armed Forces Dog Instruction Centre, Märsta, Sweden.
    Jensen, Per
    Linköpings universitet, Biologi.
    Levels of maternal care in dogs affect adult off spring temperament2016Inngår i: Scientific Reports, E-ISSN 2045-2322, Vol. 6, artikkel-id 19253Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Dog puppies are born in a state of large neural immaturity; therefore, the nervous system is sensitive to environmental influences early in life. In primates and rodents, early experiences, such as maternal care, have been shown to have profound and lasting effects on the later behaviour and physiology of offspring. We hypothesised that this would also be the case for dogs with important implications for the breeding of working dogs. In the present study, variation in the mother-offspring interactions of German Shepherd dogs within the Swedish breeding program for military working dogs was studied by video recording 22 mothers with their litters during the first three weeks postpartum. The aim was to classify mothers with respect to their level of maternal care and to investigate the effect of this care on pup behaviour in a standardised temperament test carried out at approximately 18 months of age. The results show that females differed consistently in their level of maternal care, which significantly affected the adult behaviour of the offspring, mainly with respect to behaviours classified as Physical and Social Engagement, as well as Aggression. Taking maternal quality into account in breeding programs may therefore improve the process of selecting working dogs.

    Fulltekst (pdf)
    fulltext
  • 26.
    Frank, Anders
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Ledningsvetenskapliga avdelningen (LVA), Sektionen för krigsspel. KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Gamer mode: Identifying and managing unwanted behaviour in military educational wargaming2014Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    Games are rule-governed systems at the same time as they are fiction, simulating or representing a real or an abstract world. This defining characteristic may create for different forms of tensions, that is, at different times players may focus on the rules, the fiction or on both during game play. In military education with games, this poses a problem when the learner becomes too focused on the rules, trying to win at any price rather than taking the representation and what it implies in terms of permissible behaviour seriously. In here we attempt to understand how participants in a wargaming situation act out this tension by studying the interaction between the player and the game in military tactical training.

    The results first of all confirm that there is a tension – there are occasions where players are mainly concerned with winning the wargame, disregarding what the theme is meant to represent. I propose the term gamer mode to refer to this player orientation: players in gamer mode have an extreme rule-focused interaction, meaning they behave rationally with respect to game rules but irrationally with respect to the portrayed real-life situation they are training for. Gamer mode can probably occur for many reasons. This thesis documents two contributing factors. The first concerns whenever the game does not match players’ expectation on mimicking warfare. In these situations players may find that the game breaks the fragile contract of upholding an accurate representation of warfare. The other factor that may lead to gamer mode are game design features such as explicit reward structures or victory conditions.

    To remedy the situation, the instructor can, in real-time, actively support players’ orientation towards the game and explain in-game events, keeping them on track. When gamer mode occur I argue that the conditions for learning are compromised as the gaming activity becomes its own learning subject, blurring and overshadowing the learning objective. Although the results suggest that gamer mode is mainly detrimental to learning I conclude that gamer mode is a natural way students will approach games and as such, needs to be dealt with by the instructor.

  • 27.
    Frank, Anders
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Ledningsvetenskapliga avdelningen (LVA).
    Gaming the Game: A Study of the Gamer Mode in Educational Wargaming2012Inngår i: Simulation & Gaming, ISSN 1046-8781, Vol. 43, s. 118-132Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    A risk associated with the use of games in training and education is that players "game the game," instead of focusing on their learning goals. The term gamer mode is proposed to describe this attitude. A player with a gamer-mode attitude strives to achieve goals that are optimal for winning the game, but suboptimal with respect to educational objectives. In this study of cadets playing an educational wargame to learn ground warfare tactics, the author examined occurrences of gamer mode. The results show that gamer mode on and off emerged in all analyzed sessions. Cadets understanding of the wargame was different from what the instructors expected. This study discusses why it is important to avoid situations where the gamer mode emerges and also speculates on the sources that generate this attitude-the game itself, the educational setting, and the participants' previous experiences.

  • 28.
    Frank, Anders
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Ledningsvetenskapliga avdelningen (LVA), Sektionen för krigsspel. Försvarshögskolan. KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    The Instructor Role during Educational Wargaming2014Inngår i: THE SHIFT FROM TEACHING TO LEARNING: Individual, Collective and Organizational Learning through Gaming / [ed] Willy C. Kriz, Bielefeld: W. Bertelsmann Verlag , 2014, s. 66-79Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The instructor has a vital role in leading the debriefing discussion in game-based learning. The role during the gaming part is however not as clear. Some results suggest that the instructor should take an active and authoritative role, but results provide few clues on how to apply this to military wargaming. Wargaming is a two-sided game activity where both sides are assumed to learn from their play experience. Wargaming against a live opponent can however produce unwanted effects. One such effect is ‘gamer mode’ that is a result of an exaggerated willingness to win, which can be observed when the players, for instance, exploit the game rules in unrealistic manner. This paper investigates the main responsibilities or duties of the instructor to prevent gamer mode to occur and instead support the desired player-orientation toward the game. By reasoning on the main characteristic features of wargaming, to play the game and to learn from the experience, I conclude that the main duties of the instructor are to frame the game activity and to steer the learning process. This supports earlier results that the instructor should take an active part in the gaming process, yet needs to have the skills, knowledge, and authority to intervene in students’ game play. The findings are illustrated with excerpts from videotaped wargaming sessions at the Swedish National Defence College.

  • 29.
    Franke, Ulrik
    et al.
    Swedish Defence Research Agency (FOI); Swedish Institute of Computer Science (SICS).
    Cohen, Mika
    Swedish Defence Research Agency (FOI).
    Sigholm, Johan
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    What can we learn from enterprise architecture models?: An experiment comparing models and documents for capability development2018Inngår i: Software and Systems Modeling, ISSN 1619-1366, E-ISSN 1619-1374, Vol. 17, nr 2, s. 695-711Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Enterprise architecture (EA) has been established as a discipline to cope with the complex interactions of business operations and technology. Models, i.e., formal descriptions in terms of diagrams and views, are at the heart of the approach. Though it is widely thought that such architecture models can contribute to improved understanding and decision making, this proposition has not rigorously been tested. This article describes an experiment conducted with a real EA model and corresponding real traditional documents, investigating whether the model or the documents lead to better and faster understanding. Understanding is interesting to study, as it is a prerequisite to other EA uses. The subjects (N = 98) were officer cadets, and the experiment was carried out using a comprehensive description of military Close Air Support capability either (1) in the form of a MODAF model or (2) in the form of traditional documents. Based on the results, the model seems to lead to better, though not faster, understanding.

  • 30.
    Gradh, Anders
    Försvarshögskolan.
    En stabs nätverkstrafik: En analys av användningen av datornätverkskapacitet i en operativ stab under övningen VIKING 112015Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    FM köpte satellitkapacitet för närmare 20 miljoner kronor under 2014 för utbildning, övning och internationella operationer. Enligt HKV räcker dock inte upphandlad kapacitet för att täcka behoven ute hos förbanden.

    Syftet med denna studie är att ta reda på mer hur kapacitetsanvändningen ser ut vid en operativ stab utifrån deras arbete och därigenom se om det finns någon militär nytta att vinna kopplad till kapacitetsanvändning.

    Utgångspunkten för arbetet är insamlad information om datornätverkstrafiken i de olika nätverken. Detta kvantitativa data jämförs med stabens arbete utifrån kvantitativ och kvalitativ data i krigsdagbok, styrdokument och deltagande studie.

    Studien visar på att kapacitetsanvändningen ej är relaterad till stabens arbete utan snarare är kopplad till när personal är på plats och personalens internetanvändning. Studien pekar på att det kan finnas en potential att få mer militär nytta, dock måste mekanismer för prioritering i nätverket införas och vidare studier avseende trafiken genomföras.

    Fulltekst (pdf)
    fulltext
    Download (pdf)
    bilaga
  • 31.
    Halldin, Sven
    et al.
    Uppsala Univ, Dept Earth Sci, SE-75263 Uppsala, Sweden.
    Bynander, Fredrik
    Försvarshögskolan, Institutionen för säkerhet, strategi och ledarskap (ISSL), CRISMART (Nationellt Centrum för Krishanteringsstudier).
    van Groningen, Ernst
    Uppsala Univ, ISP, SE-75121 Uppsala, Sweden.
    Preface: Natural disaster science: a Nordic approach to integrated research on disaster risk2015Inngår i: Geografiska Annaler. Series A, Physical Geography, ISSN 0435-3676, E-ISSN 1468-0459, Vol. 97, nr 1, s. 1-7Artikkel i tidsskrift (Annet vitenskapelig)
  • 32. Hedén, Hugo
    Systems methodology for Analysis of Airborne Electronic Warfare Systems2021Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    This report is one of the first to examine how system methodology can be applied as a tool to facilitate a holistic view of fighter aircraft survivability. This is done through the application of a modified version of multi-agent influence diagrams (MAIDs), as an analytical tool of two generic one-on-one scenarios based on Robert E. Balls The Fundamentals of Aircraft Combat Survivability, Analysis and Design. The concept of survivability has been limited to susceptibility because this is where ECM, ECCM and ESM operate.

    The result: three influence diagrams for each scenario and a generic MAID developed for the first scenario. These should not be seen as an exact technical description of the interaction between threats and countermeasures, but as a pilot application of system methodology within the study area. Furthermore, the user validation indicates that the diagrams can convey the complexity of the interactions between threats and countermeasures through a graphical presentation. The diagrams led to a deeper discussion about which influences are important for survival.

    The conclusion is that MAID and systems methodology can serve as a tool to describe and help communicate the complex relationships between elements and influences that affect the aircraft's survivability between different actors, provided they are modelled correctly.

    Fulltekst (pdf)
    2FS003_Heden_22.04.13.pdf
  • 33.
    Huskaj, Gazmend
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde, Sweden.
    The Current State of Research in Offensive Cyberspace Operations2019Inngår i: Proceedings of the 18th European Conference on Cyber Warfare and Security, Academic Conferences and Publishing International Limited, 2019, s. 660-667Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Cyber-attacks have increased since the 1988-Morris worm and can target any connected device from any place in the world. In 2010, Stuxnet received a lot of attention as the first cyber-weapon. Its targets were the Iranian nuclear enrichment centrifuges. Nation states are developing cyberspace capabilities to conduct offensive cyberspace operations. Academic researchers have been calling for a more transparent discussion on offensive capabilities and have pointed out the positive impact researchers had during the development of nuclear capabilities. Shrouded in secrecy, the development of offensive capabilities used for operations makes it difficult to conduct research. Therefore, one way to mitigate this is to conduct a systematic review of the current state of research in offensive cyberspace operations. The systematic review method makes it possible to establish certain inclusion and exclusion criteria and systematically go through academic articles to identify the contents, thoughts and research focus of academic researchers. Six scientific databases were queried and 87 articles were read and clustered. The first insight is that, based on the results of the queried databases, research about offensive cyberspace operations is limited. The resulting clusters are a general cluster about cyberspace operations, followed by research in policy, decision-making, governance, capabilities, levels, models, training, deterrence and international affairs. These are then further grouped into: a) general cyberspace operations; b) deterrence; c) international affairs; d) modelling, simulation and training. The article concludes that research into offensive cyberspace operations is maturing as more information is becoming public. Secondly, current research lists some good basic ideas regarding effects which can be achieved through offensive cyberspace operations, how they should be conducted, and related tools, techniques and procedures. However, discrepancies in research efforts exist, with the majority of research coming primarily from the western world. In addition, secrecy and the resulting limited access to information, coupled with research being either too technically focused or too qualitatively focused, show that there still remains room for research in this field. Finally, some directions for future research are examined.

    Fulltekst (pdf)
    The Current State of Research in Offensive Cyberspace Operations
  • 34.
    Huskaj, Gazmend
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde, Sweden.
    What is a Substantial Contribution to a Research Project in Offensive Cyberspace Operations that Merits Co-Authorship?2022Inngår i: Proceedings of the 17th International Conference on Cyber Warfare and Security: State University of New York at Albany Albany, New York, USA 17-18 March 2022 / [ed] Dean Robert P. Griffin, Dr. Unal Tatar and Dr. Benjamin Yankson, Reading, UK: ACI Academic Conferences International, 2022, s. 385-394Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article reviews the question what is a substantial contribution to a research project in offensive cyberspace operations that merits co-authorship? Frustrations and conflicts may develop during research projects when researchers with different backgrounds, cultures, research fields and expertise decide to conduct research and produce and publish those results. The focus of this paper is a research project in cyberspace operations while taking into account the power-dynamics inherent in the academic system and how these can affect the co-authorship of research products. First, the purpose with doing research is presented. Next, three models of the research process are reviewed, describing their differences and similarities. Then, linguistic analysis is applied on a set of terms in guidelines for co-authorship described in some different universities in Sweden. The results present a model for a research project in offensive cyberspace operations and based on the output of the linguistic analysis, the model is used to quantify and describe what a substantial contribution is in three scenarios that merits co-authorship. 

  • 35.
    Huskaj, Gazmend
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde, Sweden.
    Iftimie, Ion A.
    Eisenhower Defence Fellow, NATO Defense College, Rome, Italy (ITA); European Union Research Center, George Washington School of Business, Washington D.C., (USA); Central European University, Vienna, Austria (AUT).
    Toward an Ambidextrous Framework for Offensive Cyberspace Operations: a Theory, Policy and Practice Perspective2020Inngår i: Proceedings of the 15th International Conference on Cyber Warfare and Security / [ed] Payne, Brian K.; Wu, Hongyi, Reading, UK: Academic Conferences and Publishing International Limited, 2020, s. 243-253Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article addresses the rise in state-sponsored cyber attacks over the past three decades and proposes a new ambidextrous framework for offensive cyberspace operations. Since 1982, nation states have embarked in a fierce race to develop both clandestine and covert offensive cyber capabilities. Their intended targets range from foreign militaries and terrorist organizations to civilian populations and the critical infrastructures that they rely upon. Advancements in cyber security have, however, contributed to the discovery and attribution of offensive cyber operations, such as state-sponsored ransomware attacks, where state-built cyber capabilities have been used to attack governments, industries, academia and citizens of adversary nations. The financial and psychological costs of these ransomware attacks are today a threat to any state’s national security. This article draws from academic research, the cyber military doctrines of four countries—a total of eight models from the Netherlands, Sweden, the U.S., and the U.K.—and the authors’ operational experience to propose a new ambidextrous framework for offensive cyberspace operations. This ambidextrous framework for offensive cyberspace operations and the associated Cyberspace Operations Canvas are needed today in order to increase the resilience of national critical infrastructures against attacks from state-developed tools. We use the WannaCry-case to illustrate how the implementation of the ambidextrous framework for offensive cyberspace operations would result in increased awareness and understanding of the prospective cyber threats, their intended target(s), the likelihood of cascading effects and the options available by nation states to minimize them.

    Fulltekst (pdf)
    Toward an Ambidextrous Framework for Offensive Cyberspace Operations - A Theory Policy and Practice Perspective
  • 36.
    Huskaj, Gazmend
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). University of Skövde, (SWE).
    Iftimie, Ion A.
    NATO Defense College, (ITA); European Union Research Center, George Washington School of Business, (USA).
    Wilson, Richard L.
    Towson University, (USA); Hoffberger Center for Professional Ethics, University of Baltimore, (USA).
    Designing attack infrastructure for offensive cyberspace operations2020Inngår i: Proceedings of the 19th European Conference on Cyber Warfare and Security: A Virtual Conference hosted by University of Chester UK / [ed] Thaddeus Eze, Lee Speakman, Cyril Onwubiko, Reading, UK: Academic Conferences and Publishing International Limited, 2020, s. 473-482Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article addresses the question ‘what considerations should be taken by cyber commands when designing attack infrastructure for offensive operations?’. Nation-states are investing in equipping units tasked to conduct offensive cyberspace operations. Generating ‘deny, degrade, disrupt, destroy or deceive’ effects on adversary targets requires to move from own (‘green’), through neutral (‘grey’), to adversary (‘red’) cyberspace. The movement is supported by attack infrastructure for offensive cyberspace operations. In this paper, we review the professional and scientific literature identifying the requirements for designing an attack infrastructure. Next, we develop and define the concepts for attack infrastructure. Finally, we explain and describe the considerations for designing attack infrastructure. The research question is answered by proposing a framework for designing attack infrastructure. This framework is vital for military and civilian commands designing attack infrastructure for offensive cyberspace operations. 

    Fulltekst (pdf)
    Designing attack infrastructure for offensive cyberspace operations
  • 37.
    Huskaj, Gazmend
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde, Sweden.
    Moradian, Esmiralda
    Department of Computer and Systems Sciences, Stockholm University, Sweden.
    Cyber Deterrence: An Illustration of Implementation2018Inngår i: 13th International Conference on Cyber Warfare and Security (ICCWS 2018) / [ed] John S. Hurley & Jim Q. Chen, Sonning: Academic Conferences and Publishing International Limited, 2018, s. 304-311Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Cyber deterrence is a strategy to deter attackers from conducting cyber-attacks in the first place. However, several issues exist when implementing cyber deterrence, which are identified in this paper. The findings show (1) non-existence of the deterrence strategy  (2) no doctrine or decision competence to retaliate to an adversary, (3) the armed forces have no authority to retaliate when Swedish sovereignty in Cyberspace is threatened, (4) no norms or regulations exist concerning retaliation, (5) no clear governance on using offensive cyber capabilities, and finally, (6) no credibility in its cyber deterrence posture regarding how much Sweden is willing to sacrifice to protect its electoral system, which is a Swedish national interest. Therefore, this research investigates how cyber deterrence can practically be implemented in Swedish cyber security policy. So far, researchers generally focused on the human aspect of cyber deterrence. By using the case study research strategy and utilizing the Swedish electoral system as a case, this paper examines possibilities to merge the human dimensions of cyber security with the technological dimensions. Data collection is performed through documents studies and semi-structured interviews with experts in the area to identify cyber deterrence components. Further, a mathematical approach is discussed in the paper to express the relationship between an adversary and a deterrent depicting each of the actor’s risk calculus. A result of the research work performed in this paper, the deterrence components for Swedish cyber deterrence are proposed and risk calculus is performed. Moreover, measures to increase Swedish cyber deterrence posture are proposed the practical implementation of cyber deterrence in Swedish cyber security policy in order to deter attacks on the Swedish electoral system is demonstrated.

    Fulltekst (pdf)
    Cyber Deterrence - An Illustration of Implementation
  • 38.
    Huskaj, Gazmend
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde, Skövde, Sweden.
    Wilson, R L
    Department of Philosophy and Computer and Information Sciences Towson University, Towson, Maryland, (USA), and Hoffberger Center for Professional Ethics, University of Baltimore, Baltimore, Maryland, (USA).
    Offensive Cyberspace Operations and Zero-days: Anticipatory Ethics and Policy Implications for Vulnerability Disclosure2021Inngår i: Journal of Information Warfare, ISSN 1445-3312, Vol. 20, nr 1, s. 96-109Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This article addresses the question under which circumstances zero-day vulnerabilities should be disclosed or used for offensive cyberspace operations. Vulnerabilities exist in hardware and software and can be seen as a consequence of programming errors or design flaws. The most highly sought are so-called zero-day-vulnerabilities. These vulnerabilities exist but are unknown and, when exploited, enable one way of entry into a system that is otherwise not thought possible. Therefore, from an anticipatory ethics perspective, it is important to understand in what cases zero-days should be disclosed or not.

  • 39.
    Huskaj, Gazmend
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde, Skövde, Sweden.
    Wilson, Richard L.
    Towson University (USA), Hoffberger Center for Professional Ethics, University of Baltimore (USA).
    An Anticipatory Ethical Analysis of Offensive Cyberspace Operations2020Inngår i: 15th International Conference on Cyber Warfare and Security / [ed] Payne, Brian K.; Wu, Hongyi, Reading, UK: Academic Conferences and Publishing International Limited, 2020, s. 512-520Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article presents the ethical issues using offensive cyberspace operations. Previously enshrouded in secrecy, and now becoming the new norm, countries are using them to achieve their strategic interests. Russia has conducted offensive operations targeting Estonia, Georgia and the Ukraine; Hamas was targeting Israeli targets; and Iran has been targeting U.S. targets. The response has varied; Estonia and Georgia struggled with the attacks and were unable to respond while Ukraine tried to respond but it was inefficient. Israel’s response on Hamas offensive operations was an air strike on a building with Hamas Cyber-operatives. Iran shot down a U.S. Drone over the Strait of Hormuz, and the U.S. initially intended to respond with kinetic capabilities in the form of missile strikes. However, in the last minute, the U.S. chose to respond with offensive cyberspace operations targeting the Iranian missile systems. This last-minute change of response choosing between kinetic or cyber capabilities shows a need to further investigate how offensive cyberspace operations can be used against which targets from an ethical perspective. This article applies anticipatory ethical analysis on U.S. offensive operations in the “Global Hawk”-case when Iran shot down a U.S. drone over the Strait of Hormuz. Anticipatory ethical analysis looks at emerging technologies and their potential consequences. Offensive cyberspace operations present a range of possibilities, which include lowering the risk of harm to cyber operatives’ lives belonging to the responding nation. However, a response can also be kinetic. Therefore, the analysis of the “Global Hawk”-case is compared with the Israeli-air strike of the building of Hamas Cyber-operatives. The authors argue that applying anticipatory ethical analysis on offensive operations and kinetic operations assist decision makers in choosing response actions to re-establish deterrence.

    Fulltekst (pdf)
    An Anticipatory Ethical Analysis of Offensive Cyberspace Operations
  • 40.
    Huskaj, Gazmend
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). School of Informatics, University of Skövde, Skövde, Sweden.
    Wilson, Richard L.
    Towson University, USA), Hoffberger Center for Professional Ethics, University of Baltimore (USA).
    Anticipatory Ethics for Vulnerability Disclosure2020Inngår i: Proceedings of the 15th International Conference on Cyber Warfare and Security / [ed] Payne, Brian K.; Wu, Hongyi, Reading, UK: Academic Conferences and Publishing International Limited, 2020, s. 254-261Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article presents the ethical dilemma related to under what circumstances vulnerabilities should be disclosed. Vulnerabilities exist in hardware and software, and can be as a consequence of programming errors or design flaws. Threat actors can exploit these vulnerabilities to gain otherwise unintended access to information systems, resources and/or stored information. In other words, they can be used to impact the confidentiality, integrity and availability of information in information systems. As a result, various types of vulnerabilities are highly sought after since they enable this type of access. The most highly sought are so-called “zero-day”-vulnerabilities. These are vulnerabilities that exist but are unknown, and when exploited, enable one way of entry into a system that is not thought possible. This is also why zero-day vulnerabilities are very popular among criminal organizations, states and state-sponsored advanced persistent threats. The other side of the coin is when a state identifies a zero-day, and ends up in the ethical dilemma of whether to release the news and inform the vendor to patch it, i.e. close the vulnerability, or to use it for offensive or intelligence purposes. This article employs these distinctions to apply anticipatory ethics in the Stuxnet-case. Stuxnet was a computer software that was allegedly developed by the U.S. together with Israel to disrupt Iran’s development of uranium for their nuclear program. More exactly, it was developed to disable the uranium centrifuges used to enrich uranium. To achieve this, Stuxnet exploited four zero-day vulnerabilities and, according to some experts, managed to delay Iran’s nuclear program by one to two-years, forcing them to the negotiation table. Using vulnerabilities like zero-days presents opportunities but also risks. The results of the application of anticipatory ethics to the Stuxnet case are then compared with the “Osirak”-case and the “al-Kibar”-case. Osirak was the nuclear reactor in Iraq and was bombed in 1981; al-Kibar was the nuclear reactor being built up in Syria, also bombed in 2007.

    Fulltekst (pdf)
    Anticipatory Ethics for Vulnerability Disclosure
  • 41.
    Huss, Anders
    Försvarshögskolan.
    Kvantifiering av risk inom Försvarsmaktens gemensamma riskhanteringsmodell: En analys av risknivåns kvantitativa egenskaper2013Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Studien analyserar de kvantitativa inslagen i Försvarsmaktens gemensamma riskhanteringsmodell. Syftet är att beskriva risknivån, som är det kvantitativa resultatet av riskanalysen inom modellen, och dess egenskaper. I arbetet presenteras grundläggande kvantitativa metoder och dess roll inom riskanalys. En förståelse för dessa kan vara viktig vid kommunikation mellan beslutande chef och analytiker men också viktig för en förståelse av centrala begrepp inom riskanalys såsom risk, sannolikhet och konsekvens.

    Risknivåns egenskaper undersöks utifrån en rad fiktiva scenarion. Metoden för fastställande av risknivån, enlig Försvarsmaktens gemensamma riskhanteringsmodell, appliceras parallellt med kvantitativ analys (matematisk bearbetning och representation av sannolikheter) på dessa scenarier. Utfallet jämförs och diskuteras.

    Den allmänna slutsatsen är att risknivåns egenskaper är svårdefinierade i kvantitativa termer samt att den konkreta innebörden av en viss risknivå kan variera mycket från fall till fall. Detta ställer krav på en god förståelse för den bakomliggande process som resulterar i risknivån så att denna inte misstolkas.

  • 42.
    Iftimie, Ion A.
    et al.
    NATO Defense College, Rome, (ITA) / European Union Research Center, George Washington School of Business, Washington, D.C., (USA) / Central European University, Vienna, (AUT).
    Huskaj, Gazmend
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Strengthening the cybersecurity of smart grids: The role of artificial intelligence in resiliency of substation intelligent electronic devices2020Inngår i: Proceedings of the 19th European Conference on Cyber Warfare and Security: a virtual conference hosted by University of Chester UK 25-26 June 202 / [ed] Thaddeus Eze, Lee Speakman, Cyril Onwubiko, Reading: Academic Conferences and Publishing International Limited, 2020, s. 143-150Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The Executive Order 13800—Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure—issued by the President of the United States, calls for an evaluation of the “readiness and gaps in the United States’ ability to manage and mitigate consequences of a cyber incident against the electricity subsector.” In May of 2018, the Office of Management and Budget finished evaluating the 96 risk assessments conducted by various agencies and published Federal Cybersecurity Risk Determination Report and Action Plan (Risk Report). While the report embraced a broad defending forward strategy, it made no reference to smart grids or their vulnerable intelligent substations and did not address how federal agencies plan to respond to emerging threats to these systems. While the paper does not discuss how to attack the smart grids in the cyber domain, the contribution to the academic debate lies in validating some of the vulnerabilities of the grid’s substations in order for government, private industry, academia, and civil society to better collaborate in disrupting or halting malicious cyber activities before they disrupt the power supply of the United States and its Transatlantic allies. We also discuss how Artificial Intelligence and related techniques can mitigate security risks to cyber-physical systems. Until this technology becomes available, however, standardization of cyber security efforts must be enforced through regulatory means, such as the enforcement of security-by-design Intelligent Electronic Devices and protocols for the smart grid. 

  • 43.
    Jiang, Zhihan
    et al.
    IoT Lab, Department of Electrical and Electronic Engineering, Faculty of Engineering, The University of Hong Kong, Hong Kong, (CHN).
    van Zoest, Vera
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Deng, Weipeng
    IoT Lab, Department of Electrical and Electronic Engineering, Faculty of Engineering, The University of Hong Kong, Hong Kong, (CHN).
    Ngai, Edith. C. H.
    IoT Lab, Department of Electrical and Electronic Engineering, Faculty of Engineering, The University of Hong Kong, Hong Kong, (CHN).
    Liu, Jiangchuan
    Department of Computing, Simon Fraser University, Burnaby, Canada, (CAN).
    Leveraging Machine Learning for Disease Diagnoses based on Wearable Devices: A Survey2023Inngår i: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 10, nr 24, s. 21959-21981Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Many countries around the world are facing a shortage of healthcare resources, especially during the post-epidemic era, leading to a dramatic increase in the need for self-detection and self-management of diseases. The popularity of smart wearable devices, such as smartwatches, and the development of machine learning bring new opportunities for the early detection and management of various prevalent diseases, such as cardiovascular diseases, Parkinson’s disease, and diabetes. In this survey, we comprehensively review the articles related to specific diseases or health issues based on small wearable devices and machine learning. More specifically, we first present an overview of the articles selected and classify them according to their targeted diseases. Then, we summarize their objectives, wearable device and sensor data, machine learning techniques, and wearing locations. Based on the literature review, we discuss the challenges and propose future directions from the perspectives of privacy concerns, security concerns, transmission latency and reliability, energy consumption, multi-modality, multi-sensor, multi-devices, evaluation metrics, explainability, generalization and personalization, social influence, and human factors, aiming to inspire researchers in this field.

  • 44. Johannesson, Paul
    et al.
    Vretblad, Bengt
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA).
    Byggformler och tabeller2011 (oppl. 11)Bok (Annet (populærvitenskap, debatt, mm))
  • 45.
    Johansson, Linda
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Taktikavdelningen (TA), Marinsektionen (Marin).
    Hopp eller hot: om artificiell intelligens2021Inngår i: Känsliga frågor, nödvändiga samtal: att lära om och av kontroverser / [ed] Karin K. Flensner, Göran Larsson, Roger Säljö, Lund: Studentlitteratur AB, 2021, 1, s. 145-160Kapittel i bok, del av antologi (Annet vitenskapelig)
  • 46.
    Kantola, Harry
    Försvarshögskolan.
    Datanätverksattacker, trend eller nödvändighet?2011Independent thesis Advanced level (degree of Master (One Year)), 10 poäng / 15 hpOppgave
    Abstract [sv]

    I dagens samhälle används information till att sköta dagliga ärenden. Både militära och civila är beroende av cybervärlden i freds- och kristid. För att kunna skydda sina system måste man förstå hur de kan angripas.

    Syftet med forskningen är att finna ambitionsnivåer och metoder inom datanätverksattack-verksamheten (CNA-verksamhet) som försvarsmakten kan vidmakthålla i stater med högtek-nologisk utveckling men med låga försvarsresurser. Vilken teknologisk datanäverkattack-förmåga rekommenderas en sådan stats försvarsmakt på fem till tio års tidsperspektiv samt med vilka sätt kan man uppnå verkan?

    I arbetet används kvalitativ dataanalys. Med axial kodning, enligt Strauss "Grounded Theo-ry", kategoriseras de olika komponenterna som CNA-förmågorna består av. Dessa kategorier analyseras sedan med hjälp av Rasmussens riskteori i ett informationsteknologiskt system.

    I studien framgår det att en högteknologisk småstat bör sträva efter spetskompetens i de för-mågor som bidrar till att man kan testa och försvara sina egna kritiska och sårbara system. En sådan kompetens är förmågan att utföra datanätverksexploatering (CNE-verksamhet). Om en försvarsmakt som har förmåga till att genomföra avancerad CNE-verksamhet, så kan den genomföra behövlig CNA-verksamhet. För en stat med begränsade försvarsresurser kräver genomförandet av CNA-verksamhet dock strategiskt samarbete med olika civila partner. Av dessa är universitet och teknologiskt avancerade företag/industrier de främsta partnerna.

    Resultatet visar dessutom att den informationstekniska kunskapen är av tillräcklig nivå, men att det behövs förbättringar inom det informationspsykologiska området. Ambitionsnivån be-höver inte överstiga förmågan att genomföra CNE-verksamhet.

    Även om CNE-verksamheten är teknologiskt betonad, så åstadkoms den informationspsyko-logiska effekten med att koordinera CNA-verksamheten inom informationsoperationer. I framtiden är det troligare att uppnå en högre effekt på en motståndare via en informations-psykologisk inriktning.

    Organisatoriskt är det kostnadseffektivare att skapa "eldledningsförmåga inom CNA" än se-parata enheter som man inkorporerar i den normala organisationsstrukturen. Storleken på en CNA-enhet kan hållas låg med hjälp av strategiska partner.

    Som biprodukt framgår det att det behövs ytterligare forskning i uppdelandet ansvaret i at-tack-, exploaterings-, underrättelseinhämtnings- och försvarsförmåga (CNA/CNE/CNI/CND-verksamheten).

  • 47.
    Kävrestad, Joakim
    et al.
    School of Informatics, University of Skövde, (SWE).
    Huskaj, Gazmend
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS). University of Skövde, Sweden.
    How the Civilian Sector in Sweden Perceive Threats From Offensive Cyberspace Operations2021Inngår i: 20th European Conference on Cyber Warfare and Security / [ed] Dr. Thaddeus Eze, Dr. Lee Speakman and Dr. Cyril Onwubiko, Chester: Academic Conferences and Publishing International Limited, 2021, s. 499-506Konferansepaper (Fagfellevurdert)
    Abstract [en]

    The presence of state-sponsored actors executing offensive cyberspace operations (OCO) has been made evident in recent years. The term offensive cyberspace operations encompass a range of different actions, including cyberespionage, disinformation campaigns, spread of malware and more. Based on an analysis of past events, it is evident that state- sponsored actors are causing harm to the civilian sector using OCO. However, the degree to which civilian organizations understand the threat from state-sponsored actors is currently unknown. This research seeks to provide new a better understanding of OCO and their impact on civilian organizations. To highlight this domain, the case of the threat actor Advanced Persistent Threat 1 (APT1) is presented, and its impact on three civilian organizations discussed. Semi-structured interviews were used to research how the threats from OCO and state-sponsored actors are perceived by civilian organizations. First, a computational literature review was used to get an overview of related work and establish question themes. Next, the question themes were used to develop questions for the interview guide, followed by separate interviews with five security professionals working in civilian organizations. The interviews were analysed using thematic coding and the identified themes summarized as the result of this research. The results show that all respondents are aware of the threat from OCO, but they perceive it in different ways. While all respondents acknowledge state-sponsored actors at a threat agentexecuting OCO, some respondent’s argue that state-sponsored actors are actively seeking footholds in systems for future use while others state that the main goal of state-sponsored actors is to steal information. This suggests that the understanding of the threat imposed by OCO is limited, or at least inconsistent, among civilian security experts. As an interview study, the generalisability of this research is limited. However, it does demonstrate that the civilian society does not share a common view of the threat from state-sponsored actors and OCO. As such, it demonstrates a need for future research in this domain and can serve as a starting point for such projects.

  • 48.
    Landerstedt, Andreas
    Försvarshögskolan.
    Utbildning i subarktiskt klimat: vilken betydelse har vinterförmågan för att kunna lösa uppgifter i andra extrema miljöer?2009Independent thesis Basic level (professional degree), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Jag har i detta arbete ställt mig frågan Vilka kunskaper/färdigheter behöver en soldat utbildad i subarktiskt klimat kompletteras med innan insats i tropiskt klimat? vilken jag valt att svara på genom två delproblem:

    -          Vilka krav på individens färdigheter ställer det tropiska klimatet?

    -          Vilka färdigheter utvecklar soldaten vid utbildning i subarktiskt klimat?

     Jag har sedan använt svenska vinterreglementen för att ta reda på vilka kunskaper och färdigheter som en soldat utbildad i subarktiskt klimat införskaffar sig under sin grundutbildning. Därefter har jag fördjupat mig i den amerikanska djungelmanualen för att skapa mig en bild av vilka krav det tropiska klimatet ställer på individens färdigheter.

    Under studierna av de olika reglementena urskiljde jag då ett antal påverkansfaktorer vilka jag valde att använda som analysverktyg för att kunna göra en komparation mellan de olika klimatens krav på individen. Dessa olika påverkansfaktorer är Acklimatisering, Vätska/mat, Fysisk status, Klädsel, Hygien, Psykisk status och Sjukdomar/skador. Jag har sedan utifrån varje analysverktyg jämfört vad respektive miljös litteratur säger om individen kopplat till just den påverkansfaktorn och sedan diskuterat respektive påverkansfaktor var för sig. Jag har då kommit fram till både likheter och skillnader i uppträdandet mellan respektive klimat. Detta har då resulterat i vilka färdigheter som en soldat utbildad i subarktiskt klimat saknar för att kunna göra en insats i tropiskt klimat och behöver kompletteras med.

    Fulltekst (pdf)
    FULLTEXT01
  • 49.
    Larsson, Emil
    et al.
    Schibsted Media Group.
    Sigholm, Johan
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Militärtekniska avdelningen (MTA).
    Papering Over the Cracks: The Effects of Introducing Best Practices on the Web Security Ecosystem2016Inngår i: The 30th International Conference on Information Networking: ICOIN 2016, IEEE, 2016, s. 1-6, artikkel-id 15837791Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Hypertext Transfer Protocol Secure (HTTPS) is the de facto standard for secure end-to-end web communication. However, numerous flaws discovered during recent years, such as Apple’s “goto fail” bug, and cryptographic weaknesses as illustrated by the Poodlebleed vulnerability, have brought the efficiency of the mostly self-regulated web security market into question. In this cross-disciplinary paper, the authors survey some 160.000 HTTPS-enabled servers among popular web sites over a time period of three years. The research question is what effect the introduction of best practices and vulnerability publication have on web server security in the form of protocol support. Main findings include that (i) insecure configurations, although well known, can remain widespread for over a decade, (ii) the introduction of best practices affect the decline of insecure configurations only moderately, whereas highly publicized security flaws have a significant impact, and (iii) economic incentives for website owners to provide secure services are weak, motivating such other levers of influence as legislation or blocking of noncompliant sites.

  • 50.
    Larsson, Emil
    et al.
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem. Department of Computer Science, Karlstad University, Karlstad, Sweden .
    Sigholm, Johan
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Towards econometric estimation of the cost of cyber conflict2024Inngår i: Procedia Computer Science, E-ISSN 1877-0509, Vol. 246, s. 2635-2644Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In the modern era, understanding the costs and implications of conflict extends beyond traditional kinetic boundaries into the cyber realm. While economic analysis has historically been concerned primarily with the state’s ability to sustain and engage in physical warfare, recent research has begun to quantify the additional societal and collateral costs. To shed light on the total costs of the use of cyber weapons and capabilities, we argue that a comprehensive analysis must be done using econometric tools. This paper describes two important tools in this toolkit, counterfactual analysis and bottom-up accounting, in the context of cyber conflict. It discusses how significant collateral costs manifest in the inadvertent aftermath of vulnerability stockpiling for use in cyber weapons, coupled with the losses and thefts of these resources. Such incidents represent not only a direct financial burden but also erode the trust and goodwill of nations who do not disclose the discovered vulnerabilities. Finally, multiple data sources and bottom-up accounting techniques are used to conduct a case study estimating the aggregate societal cost of cyber conflict in the Ukrainian war between late 2013 and 2020. The aggregate cost of the 76 recorded cyberattacks is estimated to be approximately $160M. Finally, counterfactual analysis is concluded to face significant data availability challenges preventing high quality synthesis of the two methods described.

12 1 - 50 of 94
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf