{"id":"https://openalex.org/W2493533912","doi":"https://doi.org/10.1109/cycon.2016.7529435","title":"Weapons systems and cyber security - a challenging union","display_name":"Weapons systems and cyber security - a challenging union","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2493533912","doi":"https://doi.org/10.1109/cycon.2016.7529435","mag":"2493533912"},"language":"en","primary_location":{"id":"doi:10.1109/cycon.2016.7529435","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111886592","display_name":"Robert Koch","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Robert Koch","raw_affiliation_strings":["Faculty of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054818424","display_name":"Mario Golling","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mario Golling","raw_affiliation_strings":["Faculty of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Universit\u00e4t der Bundeswehr M\u00fcnchen, Neubiberg, Germany","institution_ids":["https://openalex.org/I40527276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5111886592"],"corresponding_institution_ids":["https://openalex.org/I40527276"],"apc_list":null,"apc_paid":null,"fwci":0.6905,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79655025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":null,"first_page":"191","last_page":"203"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9667999744415283,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7321608066558838},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.6663350462913513},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4616279900074005},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4425993263721466},{"id":"https://openalex.org/keywords/system-of-systems","display_name":"System of systems","score":0.42556560039520264},{"id":"https://openalex.org/keywords/procurement","display_name":"Procurement","score":0.4226731061935425},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3415338397026062},{"id":"https://openalex.org/keywords/systems-design","display_name":"Systems design","score":0.2895519733428955},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.21012073755264282},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20299071073532104}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7321608066558838},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6663350462913513},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4616279900074005},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4425993263721466},{"id":"https://openalex.org/C87912763","wikidata":"https://www.wikidata.org/wiki/Q7663737","display_name":"System of systems","level":3,"score":0.42556560039520264},{"id":"https://openalex.org/C201650216","wikidata":"https://www.wikidata.org/wiki/Q829492","display_name":"Procurement","level":2,"score":0.4226731061935425},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3415338397026062},{"id":"https://openalex.org/C31352089","wikidata":"https://www.wikidata.org/wiki/Q3750474","display_name":"Systems design","level":2,"score":0.2895519733428955},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.21012073755264282},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20299071073532104},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cycon.2016.7529435","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W41457756","https://openalex.org/W76123274","https://openalex.org/W1541663547","https://openalex.org/W1618732829","https://openalex.org/W1994870682","https://openalex.org/W2138941896","https://openalex.org/W2899605804","https://openalex.org/W6601668137","https://openalex.org/W6632480037","https://openalex.org/W6636386003","https://openalex.org/W6756181817"],"related_works":["https://openalex.org/W2093262417","https://openalex.org/W4312626803","https://openalex.org/W2123131699","https://openalex.org/W650116260","https://openalex.org/W2378329187","https://openalex.org/W4390790060","https://openalex.org/W2134191509","https://openalex.org/W3209454962","https://openalex.org/W2953027239","https://openalex.org/W2559156350"],"abstract_inverted_index":{"A":[0],"broad":[1],"range":[2,140],"of":[3,46,48,51,56,62,114,124,141,147,175],"weapons":[4,17,41,69,146,160,177],"systems":[5,18,24,42,95,111,126,161],"are":[6,19,73,195,202],"in":[7,9,87,169],"service":[8,71],"forces":[10],"all":[11,123],"over":[12],"the":[13,166,173,176,185],"world.":[14],"Nowadays,":[15],"state-of-the-art":[16],"deployed":[20],"beside":[21],"legacy":[22],"high-value":[23],"that":[25],"have":[26,96],"been":[27],"used":[28,36],"for":[29,37,188],"decades,":[30],"and":[31,92,130,145,155,183,197,200],"will":[32],"continue":[33],"to":[34,81,97,133,159],"be":[35,55,131],"some":[38],"time.":[39],"Modern":[40,116],"can":[43,54],"contain":[44],"hundreds":[45],"thousands":[47],"chips;":[49],"each":[50],"these":[52,125],"chips":[53],"a":[57,103,109],"sophisticated":[58],"design,":[59],"containing":[60],"billions":[61],"transistors,":[63],"making":[64],"highly":[65,192],"complex":[66,139],"systems-of-systems.":[67],"Elderly":[68],"systems'":[70,178],"lives":[72],"often":[74],"extended":[75],"or":[76,85],"their":[77],"performance":[78],"enhanced":[79],"due":[80],"reduced":[82],"budget":[83],"funds":[84],"delays":[86],"new":[88],"procurement.":[89],"Therefore,":[90],"aged":[91],"state-of-the":[93],"art":[94],"function":[98],"together,":[99],"not":[100],"only":[101],"from":[102,108],"communications":[104,143],"prospective,":[105],"but":[106],"also":[107],"complete":[110],"integration":[112],"point":[113],"view.":[115],"Network":[117],"Centric":[118],"Warfare":[119],"scenarios":[120],"rely":[121],"upon":[122],"being":[127],"well":[128],"integrated":[129],"able":[132],"interoperate.":[134],"This":[135],"spans":[136],"an":[137],"incredibly":[138],"sensors,":[142],"systems,":[144],"various":[148],"ages,":[149],"opening":[150],"up":[151],"countless":[152],"attack":[153],"vectors":[154],"presenting":[156],"severe":[157],"challenges":[158],"security.":[162,190],"The":[163],"paper":[164],"analyses":[165],"parties":[167],"involved":[168],"today's":[170],"battlespace,":[171],"examines":[172],"impact":[174],"ages":[179],"on":[180],"IT":[181],"security,":[182],"surveys":[184],"critical":[186],"factors":[187,194],"cyber":[189],"Numerous":[191],"dangerous":[193],"identified":[196],"essential":[198],"necessities":[199],"countermeasures":[201],"recommended.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
