{"id":"https://openalex.org/W3183878443","doi":"https://doi.org/10.23919/cycon51939.2021.9468303","title":"Adversary Targeting of Civilian Telecommunications Infrastructure","display_name":"Adversary Targeting of Civilian Telecommunications Infrastructure","publication_year":2021,"publication_date":"2021-05-25","ids":{"openalex":"https://openalex.org/W3183878443","doi":"https://doi.org/10.23919/cycon51939.2021.9468303","mag":"3183878443"},"language":"en","primary_location":{"id":"doi:10.23919/cycon51939.2021.9468303","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9468303","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068667600","display_name":"Keir Giles","orcid":"https://orcid.org/0000-0001-7260-8646"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Keir Giles","raw_affiliation_strings":["Conflict Studies Research Centre,Northamptonshire,United Kingdom","Conflict Studies Research Centre, Northamptonshire, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Conflict Studies Research Centre,Northamptonshire,United Kingdom","institution_ids":[]},{"raw_affiliation_string":"Conflict Studies Research Centre, Northamptonshire, United Kingdom","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102899951","display_name":"Kim Hartmann","orcid":"https://orcid.org/0000-0003-0761-3873"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kim Hartmann","raw_affiliation_strings":["Conflict Studies Research Centre,Northamptonshire,United Kingdom","Conflict Studies Research Centre, Northamptonshire, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Conflict Studies Research Centre,Northamptonshire,United Kingdom","institution_ids":[]},{"raw_affiliation_string":"Conflict Studies Research Centre, Northamptonshire, United Kingdom","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068667600"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8032,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80114192,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"133","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9571999907493591,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9571999907493591,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6888203620910645},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5915532112121582},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5780974626541138},{"id":"https://openalex.org/keywords/dominance","display_name":"Dominance (genetics)","score":0.5490449666976929},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.45867663621902466},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.45772063732147217},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44075697660446167},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4339360296726227},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.4176281690597534},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32364434003829956},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.30379557609558105}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6888203620910645},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5915532112121582},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5780974626541138},{"id":"https://openalex.org/C151913843","wikidata":"https://www.wikidata.org/wiki/Q3454555","display_name":"Dominance (genetics)","level":3,"score":0.5490449666976929},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.45867663621902466},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.45772063732147217},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44075697660446167},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4339360296726227},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.4176281690597534},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32364434003829956},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.30379557609558105},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon51939.2021.9468303","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9468303","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W2900584019","https://openalex.org/W2912641888","https://openalex.org/W2460691332","https://openalex.org/W2943610928","https://openalex.org/W3119634295","https://openalex.org/W2767924451","https://openalex.org/W4366290225","https://openalex.org/W3191735619"],"abstract_inverted_index":{"The":[0,202,273],"response":[1],"to":[2,41,49,80,114,160,210,219,231,236,251,264,275],"the":[3,23,120,127,217,252,260,271,296],"pandemic":[4],"by":[5,19,267],"states,":[6],"organisations,":[7],"and":[8,52,71,104,107,142,194,234,241,246,287,290,298,305],"individuals":[9],"in":[10,82,93,98,124,181,206,208,226,259],"2020":[11],"highlighted":[12],"critical":[13,136,161,250],"dependency":[14],"on":[15],"communications":[16,163],"systems":[17,277],"underpinned":[18],"cyber":[20],"infrastructure.":[21],"Without":[22],"benefits":[24],"of":[25,84,101,117,122,129,145,223,254,262,302],"connectivity,":[26],"governments":[27],"would":[28,35,46,55,155],"have":[29,36,47,56,178],"faced":[30],"greater":[31],"challenges":[32],"governing,":[33],"societies":[34],"found":[37],"it":[38,65],"even":[39,172],"harder":[40],"maintain":[42],"cohesion,":[43],"more":[44,60,257],"companies":[45],"ceased":[48],"operate":[50],"altogether,":[51],"personal":[53],"isolation":[54],"been":[57,179],"a":[58,143,157,281,300],"vastly":[59],"difficult":[61],"experience.":[62],"And":[63],"yet,":[64],"is":[66,249],"precisely":[67],"this":[68,108,237],"connectivity":[69],"within":[70],"between":[72],"NATO":[73,227,255],"states":[74,147],"that":[75,154],"some":[76],"adversaries":[77],"are":[78,148],"preparing":[79],"attack":[81],"time":[83],"conflict,":[85],"including":[86],"through":[87,134],"physical":[88],"or":[89,213],"kinetic":[90],"means.":[91],"Russia":[92],"particular":[94],"has":[95,166],"long":[96],"invested":[97],"probing":[99],"vulnerabilities":[100],"civilian":[102,162],"internet":[103],"telecommunications":[105],"infrastructure,":[106],"programme":[109],"was":[110],"urgently":[111],"ramped":[112],"up":[113],"unprecedented":[115],"levels":[116],"intensity":[118],"after":[119],"seizure":[121],"Crimea":[123],"2014":[125],"demonstrated":[126,216],"power":[128],"total":[130],"information":[131,137],"dominance":[132],"achieved":[133],"targeting":[135],"assets.":[138],"Besides":[139],"Russia,":[140],"China":[141],"number":[144],"other":[146],"also":[149],"rapidly":[150],"developing":[151],"counter-space":[152],"capabilities":[153],"pose":[156],"direct":[158],"threat":[159,240,274,297],"services.":[164],"This":[165,293],"obvious":[167],"implications":[168],"for":[169,200],"crisis":[170],"management":[171],"before":[173],"overt":[174],"state-on-state":[175],"conflict.":[176],"Vulnerabilities":[177],"sought":[180],"all":[182],"domains:":[183],"maritime":[184],"(subsea":[185],"cables),":[186],"space":[187],"(communications":[188],"satellites),":[189],"land":[190],"(fibre":[191],"optic":[192],"nodes),":[193],"online":[195],"(targeting":[196],"specific":[197],"media":[198],"sources":[199],"neutralisation).":[201],"VPNFilter":[203],"malware":[204],"exposed":[205],"mid-2018,":[207],"addition":[209],"its":[211,242],"cybercrime":[212],"cyber-espionage":[214],"capabilities,":[215],"ambition":[218],"render":[220],"large":[221],"numbers":[222],"ordinary":[224],"users":[225],"countries":[228],"simply":[229],"unable":[230],"communicate.":[232],"Recognising":[233],"responding":[235],"emerging":[238],"disruptive":[239],"potential":[243],"human,":[244],"societal,":[245],"state":[247],"impact":[248],"defence":[253,289],"states-still":[256],"so":[258],"case":[261],"disruption":[263],"normal":[265],"life":[266],"events":[268],"such":[269],"as":[270],"pandemic.":[272],"cyber-physical":[276],"not":[278],"ordinarily":[279],"considered":[280],"military":[282],"target":[283],"must":[284],"be":[285],"recognised,":[286],"their":[288],"security":[291],"prioritised.":[292],"paper":[294],"outlines":[295],"recommends":[299],"range":[301],"mitigation":[303],"strategies":[304],"measures.":[306]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
