{"id":"https://openalex.org/W2025259756","doi":"https://doi.org/10.4018/ijcwt.2012010102","title":"A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict","display_name":"A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W2025259756","doi":"https://doi.org/10.4018/ijcwt.2012010102","mag":"2025259756"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2012010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2012010102","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053452722","display_name":"Christian Czosseck","orcid":null},"institutions":[{"id":"https://openalex.org/I153821248","display_name":"Estonian Business School","ror":"https://ror.org/04e67ap71","country_code":"EE","type":"education","lineage":["https://openalex.org/I153821248"]}],"countries":["EE"],"is_corresponding":true,"raw_author_name":"Christian Czosseck","raw_affiliation_strings":["Estonian Business School, Tallinn, Estonia","Estonian Business School , Tallinn , Estonia"],"affiliations":[{"raw_affiliation_string":"Estonian Business School, Tallinn, Estonia","institution_ids":["https://openalex.org/I153821248"]},{"raw_affiliation_string":"Estonian Business School , Tallinn , Estonia","institution_ids":["https://openalex.org/I153821248"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036243803","display_name":"Karlis Podins","orcid":null},"institutions":[{"id":"https://openalex.org/I111112146","display_name":"Tallinn University of Technology","ror":"https://ror.org/0443cwa12","country_code":"EE","type":"education","lineage":["https://openalex.org/I111112146"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"Karlis Podins","raw_affiliation_strings":["Tallinn University of Technology, Tallinn, Estonia","Tallinn University of Technology, Tallinn , Estonia"],"affiliations":[{"raw_affiliation_string":"Tallinn University of Technology, Tallinn, Estonia","institution_ids":["https://openalex.org/I111112146"]},{"raw_affiliation_string":"Tallinn University of Technology, Tallinn , Estonia","institution_ids":["https://openalex.org/I111112146"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053452722"],"corresponding_institution_ids":["https://openalex.org/I153821248"],"apc_list":null,"apc_paid":null,"fwci":2.9359,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.92258952,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2","issue":"1","first_page":"14","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8357927799224854},{"id":"https://openalex.org/keywords/disarmament","display_name":"Disarmament","score":0.7785103917121887},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.7427793741226196},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7393268942832947},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.6833885312080383},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6226948499679565},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5715956687927246},{"id":"https://openalex.org/keywords/information-operations","display_name":"Information Operations","score":0.5477211475372314},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5323871374130249},{"id":"https://openalex.org/keywords/arms-control","display_name":"Arms control","score":0.5294322967529297},{"id":"https://openalex.org/keywords/nuclear-weapon","display_name":"Nuclear weapon","score":0.45177406072616577},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4460059404373169},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.4277323782444},{"id":"https://openalex.org/keywords/information-warfare","display_name":"Information warfare","score":0.4264361262321472},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.30819594860076904},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3066176772117615},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.24339261651039124},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.23985949158668518},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17076823115348816}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8357927799224854},{"id":"https://openalex.org/C2780105426","wikidata":"https://www.wikidata.org/wiki/Q331662","display_name":"Disarmament","level":2,"score":0.7785103917121887},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.7427793741226196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7393268942832947},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.6833885312080383},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6226948499679565},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5715956687927246},{"id":"https://openalex.org/C121858775","wikidata":"https://www.wikidata.org/wiki/Q18600568","display_name":"Information Operations","level":2,"score":0.5477211475372314},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5323871374130249},{"id":"https://openalex.org/C538168058","wikidata":"https://www.wikidata.org/wiki/Q364056","display_name":"Arms control","level":2,"score":0.5294322967529297},{"id":"https://openalex.org/C194110935","wikidata":"https://www.wikidata.org/wiki/Q12802","display_name":"Nuclear weapon","level":2,"score":0.45177406072616577},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4460059404373169},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.4277323782444},{"id":"https://openalex.org/C2781349506","wikidata":"https://www.wikidata.org/wiki/Q911036","display_name":"Information warfare","level":2,"score":0.4264361262321472},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.30819594860076904},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3066176772117615},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.24339261651039124},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.23985949158668518},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17076823115348816},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2012010102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2012010102","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:2:y:2012:i:1:p:14-26","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2012010102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W254673244","https://openalex.org/W1585719064","https://openalex.org/W1595043702","https://openalex.org/W2024292849","https://openalex.org/W2025259756","https://openalex.org/W2042320372","https://openalex.org/W2078719577","https://openalex.org/W2099600649","https://openalex.org/W2160648147","https://openalex.org/W2187367342","https://openalex.org/W2187566693","https://openalex.org/W2243430762","https://openalex.org/W2256947274","https://openalex.org/W2562436035","https://openalex.org/W2620244897","https://openalex.org/W3099005193","https://openalex.org/W3136494017","https://openalex.org/W3206776590","https://openalex.org/W4285719527","https://openalex.org/W4318326533","https://openalex.org/W4407791810"],"related_works":["https://openalex.org/W94346691","https://openalex.org/W350155893","https://openalex.org/W238759319","https://openalex.org/W2759942926","https://openalex.org/W4285256911","https://openalex.org/W316278467","https://openalex.org/W3015806214","https://openalex.org/W4248694632","https://openalex.org/W2025259756","https://openalex.org/W4239245461"],"abstract_inverted_index":{"Throughout":[0],"history,":[1],"mankind":[2],"has":[3,41],"developed":[4],"and":[5,9,13,27,59,78,91,97,115,124,148,175],"employed":[6],"novel":[7],"weapons":[8,107,147],"countermeasures.":[10],"Both":[11],"offensive":[12],"defensive":[14],"weapon":[15,77,80],"systems":[16],"are":[17,93],"limited":[18],"by":[19,31],"the":[20,54,71,75,120,159,184,187,194],"laws":[21],"of":[22,46,57,105,113,122,132,186,189,196],"nature.":[23],"Consequently,":[24],"military":[25],"concepts":[26,90],"doctrines":[28,92],"were":[29],"designed":[30],"implicitly":[32],"taking":[33],"into":[34],"account":[35],"those":[36],"limitations.":[37],"The":[38,100,139,166],"digital":[39],"age":[40],"introduced":[42],"a":[43,83,103,130,136,142,180],"new":[44],"class":[45],"weaponry":[47],"that":[48],"poses":[49],"an":[50,109],"initial":[51],"challenge":[52],"to":[53,62,86,95,157],"common":[55],"understanding":[56],"conflict":[58],"warfare":[60],"due":[61],"their":[63],"different":[64],"characteristics:":[65],"cyber":[66,79,98,106,146,150,173,190,197],"weapons.":[67],"This":[68,152],"article":[69],"explores":[70],"crucial":[72],"differences":[73],"between":[74,161],"conventional":[76],"domains,":[81],"starting":[82],"debate":[84],"as":[85],"what":[87],"extent":[88],"classical":[89],"applicable":[94],"cyberspace":[96],"conflict.":[99],"authors":[101,140],"propose":[102],"definition":[104],"being":[108],"instrument":[110],"consisting":[111],"primarily":[112],"data":[114],"knowledge,":[116],"presenting":[117],"them":[118],"in":[119,193],"form":[121],"prepared":[123],"executed":[125],"computer":[126],"codes":[127],"on":[128],"or":[129],"sequence":[131],"user":[133],"interactions":[134],"with":[135],"vulnerable":[137],"system.":[138],"describe":[141,158],"vulnerability-based":[143],"model":[144,153,168],"for":[145,149,172,183],"defence.":[151],"is":[154],"then":[155],"applied":[156],"relationship":[160],"cyber-capable":[162],"actors":[163],"(e.g.":[164],"States).":[165],"proposed":[167],"clarifies":[169],"important":[170],"implications":[171],"coalition-building":[174],"disarmament.":[176],"Furthermore,":[177],"it":[178],"presents":[179],"general":[181],"solution":[182],"problem":[185],"destruction":[188],"weapons,":[191],"i.e.,":[192],"context":[195],"arms":[198],"control.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
