Archive for the ‘Security’ Category

Bridging the Gaps

April 6, 2012 Leave a comment

Great progress is being made on our EPSRC inter-disciplinary seed-funding research project, Bridging the Gaps, which aims to strengthen the many connections between Informatics and other disciplines at King’s College London. More information here.  Please contact us if you want to be involved.

Jaw, jaw about cyber weapons

April 5, 2012 Leave a comment

Some discussion here on the Security Affairs blog of our recent paper on Cyber Weapons.

Categories: Security

Cyber weapons

March 5, 2012 Leave a comment

The Journal of the Royal United Services Institute (RUSI) has just published our paper on cyber-weapons, where we seek to classify the various types of cyber attack software according to the degree of intelligence and autonomy they exhibit.   The paper is available here, and is already the most highly downloaded paper on the publisher’s web-site for the journal, here.

T. Rid and P. McBurney [2012]: Cyber weapons. Journal of the Royal United Services Institute (RUSI), 157 (1), February 2012.



Categories: AI, Security

Cyber war: myth or reality?

October 17, 2011 1 comment

A great advantage of having many faculties on one campus is that you can get to interact with people with quite different perspectives who are interested in similar real-world issues. Today I spent a refreshing hour in the company of Thomas Rid, one of several War Studies colleagues who, like a few of us Informaticians, wants to understand whether cyber war is just another kind of warfare in a new domain (after land, sea, air and space), or whether it falls outside Clausewitz’s three characteristics of warfare (violent, instrumental and political). Thomas has already blogged about his article on Kings of War: and I wanted to probe and test his contentions with possible cyber counter-examples for each of the three characteristics.  Since our offices are just the length of a corridor apart it’s easy to have these impromptu get-togethers over a freshly brewed coffee (thanks, Thomas!). And it appears that there may be rather more to this issue than initially meets the eye – watch this space for developments as they happen!

Categories: Security
%d bloggers like this: