{"id":"https://openalex.org/W2907409151","doi":"https://doi.org/10.1109/milcom.2018.8599844","title":"Functional Analysis of Cyberspace Operations","display_name":"Functional Analysis of Cyberspace Operations","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2907409151","doi":"https://doi.org/10.1109/milcom.2018.8599844","mag":"2907409151"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2018.8599844","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2018.8599844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053892150","display_name":"Alberto Domingo","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Alberto Domingo","raw_affiliation_strings":["NATO Allied Command Transformation (ACT), North Atlantic Treaty Organization (NATO), Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"NATO Allied Command Transformation (ACT), North Atlantic Treaty Organization (NATO), Norfolk, VA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077957045","display_name":"Manisha Parmar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Manisha Parmar","raw_affiliation_strings":["NATO CIS Agency (NCI Agency), North Atlantic Treaty Organization (NATO), The Hague, Netherlands"],"affiliations":[{"raw_affiliation_string":"NATO CIS Agency (NCI Agency), North Atlantic Treaty Organization (NATO), The Hague, Netherlands","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053892150"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.0189,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.91637886,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"673","last_page":"678"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9830178022384644},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6128933429718018},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5840369462966919},{"id":"https://openalex.org/keywords/doctrine","display_name":"Doctrine","score":0.5720390677452087},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5595772862434387},{"id":"https://openalex.org/keywords/military-doctrine","display_name":"Military doctrine","score":0.5124772191047668},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5077820420265198},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45004427433013916},{"id":"https://openalex.org/keywords/information-operations","display_name":"Information Operations","score":0.4357139468193054},{"id":"https://openalex.org/keywords/decomposition","display_name":"Decomposition","score":0.4262329638004303},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3316008448600769},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.16744521260261536},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.16266858577728271},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13899117708206177},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.10524922609329224},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09351462125778198}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9830178022384644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6128933429718018},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5840369462966919},{"id":"https://openalex.org/C2776211767","wikidata":"https://www.wikidata.org/wiki/Q117850","display_name":"Doctrine","level":2,"score":0.5720390677452087},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5595772862434387},{"id":"https://openalex.org/C2778007780","wikidata":"https://www.wikidata.org/wiki/Q1140224","display_name":"Military doctrine","level":3,"score":0.5124772191047668},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5077820420265198},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45004427433013916},{"id":"https://openalex.org/C121858775","wikidata":"https://www.wikidata.org/wiki/Q18600568","display_name":"Information Operations","level":2,"score":0.4357139468193054},{"id":"https://openalex.org/C124681953","wikidata":"https://www.wikidata.org/wiki/Q339062","display_name":"Decomposition","level":2,"score":0.4262329638004303},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3316008448600769},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.16744521260261536},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16266858577728271},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13899117708206177},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.10524922609329224},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09351462125778198},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2018.8599844","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2018.8599844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2229351090","https://openalex.org/W2602382391","https://openalex.org/W2613472239","https://openalex.org/W4230663482"],"related_works":["https://openalex.org/W2000193281","https://openalex.org/W345997710","https://openalex.org/W79790480","https://openalex.org/W305974819","https://openalex.org/W2497014628","https://openalex.org/W306044456","https://openalex.org/W1489816452","https://openalex.org/W413330808","https://openalex.org/W253523067","https://openalex.org/W256433535"],"abstract_inverted_index":{"Cyberspace":[0],"is":[1,92,109,128,280],"a":[2,49,123,134,142,176,189,220,298],"relatively":[3],"new":[4],"domain":[5,51],"of":[6,46,57,83,98,144,162,168,175,204,262,273,297,310],"operations":[7,25],"for":[8,12,64,75,210,224],"NATO,":[9],"but":[10,117],"also":[11,187],"many":[13,41],"nations.":[14],"Operations":[15],"in":[16,26,40,48,101,112,154],"cyberspace":[17,225],"lack":[18],"the":[19,27,36,54,61,84,88,96,113,147,158,163,166,172,195,205,208,230,271,295,307],"doctrinal":[20],"corpus":[21],"and":[22,77,102,132,160,171,207,238,242,247,258,270,282,306],"experience":[23],"that":[24,52,87,146],"other":[28],"domains":[29],"(land,":[30],"air,":[31],"sea)":[32],"have":[33],"accumulated":[34],"over":[35],"years":[37],"(or":[38],"centuries,":[39],"cases).":[42],"The":[43,183,227,276],"legal":[44],"aspects":[45],"operating":[47],"geographical":[50],"exceeds":[53],"Commander's":[55],"area":[56],"responsibility":[58],"further":[59],"exacerbate":[60],"problem,":[62],"calling":[63],"careful":[65],"consideration":[66],"when":[67,73,78],"defending":[68,234],"one's":[69,235],"own":[70,236],"cyber":[71,80,127,164,196,248,254,263,268,274,301],"assets,":[72],"planning":[74],"missions":[76,255],"delivering":[79],"effects.":[81,275],"One":[82],"main":[85],"questions":[86],"Commander":[89],"must":[90],"consider":[91],"how":[93],"to":[94,129,151,179,194,215,233,253,294],"decompose":[95],"problem":[97],"achieving":[99],"objectives":[100],"through,":[103],"potentially":[104],"contested,":[105],"cyberspace.":[106],"This":[107,217],"question":[108],"not":[110],"addressed":[111],"latest":[114],"military":[115],"doctrine,":[116],"can":[118,156,186],"be":[119,130],"answered":[120],"by":[121],"decomposing":[122],"generic":[124],"mission":[125,184],"where":[126],"employed":[131],"deriving":[133],"suitable":[135],"functional":[136,222,278],"analysis.":[137],"Such":[138],"decomposition":[139,185],"would":[140],"provide":[141,188],"\u201ccatalogue\u201d":[143],"functions":[145,231],"commander":[148],"might":[149],"need":[150],"execute,":[152],"which":[153],"itself":[155],"inform":[157],"structure":[159],"manning":[161],"organization,":[165],"development":[167,174,199],"operational":[169],"requirements":[170],"subsequent":[173],"capability":[177,197,211],"breakdown":[178],"satisfy":[180],"those":[181,251,313],"requirements.":[182],"very":[190],"useful":[191],"starting":[192],"point":[193],"engineering":[198],"process,":[200],"thus":[201],"removing":[202],"most":[203],"subjectivity":[206],"likelihood":[209],"gaps":[212],"and/or":[213],"overlaps":[214],"occur.":[216],"paper":[218],"presents":[219],"novel":[221],"analysis":[223,228,279],"operations.":[226],"separates":[229],"associated":[232],"networks":[237],"systems":[239],"(traditional":[240],"Communication":[241],"Information":[243],"Systems":[244],"[CIS]":[245],"security":[246],"defense)":[249],"from":[250],"related":[252],"planning,":[256],"Command":[257],"Control":[259],"(C2),":[260],"generation":[261],"Situational":[264],"Awareness":[265],"(SA)":[266],"(including":[267],"INTEL)":[269],"delivery":[272],"proposed":[277],"organization/mission/capability":[281],"intent":[283],"agnostic,":[284],"as":[285,287],"well":[286],"technology/solution":[288],"independent.":[289],"It":[290],"is,":[291],"therefore,":[292],"applicable":[293],"activities":[296],"large":[299],"scale":[300],"command,":[302],"an":[303],"individual":[304],"hacker,":[305],"full":[308],"spectrum":[309],"actors":[311],"between":[312],"two.":[314]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
