{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:27:03Z","timestamp":1722943623367},"reference-count":23,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2017]]},"DOI":"10.12720\/jcm.12.6.364-370","type":"journal-article","created":{"date-parts":[[2018,9,14]],"date-time":"2018-09-14T09:50:26Z","timestamp":1536918626000},"page":"364-370","source":"Crossref","is-referenced-by-count":1,"title":["Refined Concepts of Massive and Flexible Cyber Attacks with Information Warfare Strategies"],"prefix":"10.12720","author":[{"name":"National Agency for Fiscal Administration, Bra\u015fov, Romania","sequence":"first","affiliation":[]},{"given":"Horatiu","family":"Moga","sequence":"first","affiliation":[]},{"given":"Mircea","family":"Boscoianu","sequence":"additional","affiliation":[]},{"given":"Delia A.","family":"Ungureanu","sequence":"additional","affiliation":[]},{"given":"Florin D.","family":"Sandu","sequence":"additional","affiliation":[]},{"given":"Razvan","family":"Boboc","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2017]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","first-page":"383","DOI":"10.4028\/www.scientific.net\/amm.811.383","article-title":"Massive cyber-attacks patterns implemented with BDI agents","volume-title":"Proc 6th International Conference on Aerospace Robotics Manufacturing Systems Mechanical Systems Mechanical Engineering Biomechatronics and Neurorehabilitation","volume":"811","author":"Moga","year":"2015","unstructured":"[1] H. Moga, M. Boscoianu, D. Ungureanu, R. Lile, and N. Erginoz, \"Massive cyber-attacks patterns implemented with BDI agents,\" in Proc. 6th International Conference on Aerospace, Robotics, Manufacturing Systems, Mechanical Systems, Mechanical Engineering, Biomechatronics and Neurorehabilitation, vol. 811, October 2015, pp. 383-389."},{"key":"ref1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.4028\/www.scientific.net\/AMM.841.97","article-title":"Using BDI agents in flexible patterns for cyber-attacks over electrical power infrastructures","volume":"841","author":"Moga","year":"2016","unstructured":"[2] H. Moga, M. Boscoianu, D. Ungureanu, F. Sandu, and R. Lile, \"Using BDI agents in flexible patterns for cyber-attacks over electrical power infrastructures,\" Applied Mechanics and Materials, vol. 841, pp. 97-104, June 2016.","journal-title":"Applied Mechanics and Materials"},{"key":"ref2","first-page":"159","volume-title":"War and Change in World Politics","author":"Gilpin","year":"1983","unstructured":"[3] R. Gilpin, War and Change in World Politics, USA: Cambridge University Press, 1983, ch.\u200b4, pp. 159-168."},{"key":"ref3","first-page":"107","volume-title":"Artech House Electronic Warfare Library","author":"Poisel","year":"2013","unstructured":"[4] R. A. Poisel, Information Warfare and Electronic Warfare Systems (Artech House Electronic Warfare Library), Artech House Publishers, 2013, ch.\u200b4, pp. 107-139."},{"key":"ref4","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.marpolbul.2016.02.072","article-title":"Unmanned vehicles for maritime spill response case study Exercise Cathach","volume":"110","author":"Dooly","year":"2016","unstructured":"[5] G. Dooly and E. Omerdic, \"Unmanned vehicles for maritime spill response case study Exercise Cathach,\" Marine Pollution Bulletin, 110, pp. 528\u2013538, 2016.","journal-title":"Mar Pollut Bull","ISSN":"http:\/\/id.crossref.org\/issn\/0025-326X","issn-type":"print"},{"key":"ref5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.arcontrol.2016.04.018","article-title":"Unmanned surface vehicles: An overview of developments and challenges","volume":"41","author":"Liu","year":"2016","unstructured":"[6] Z. Liu and Y. Zhang, \"Unmanned surface vehicles: An overview of developments and challenges,\" Annual Reviews in Control, vol. 41, pp.71\u201393, 2016.","journal-title":"Annu Rev Contr","ISSN":"http:\/\/id.crossref.org\/issn\/1367-5788","issn-type":"print"},{"key":"ref6","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.ijdrr.2015.07.009","article-title":"Use of unmanned vehicles in search and rescue operations in forest fires: Advantages and limitations observed in a field trial","volume":"13","author":"Karma","year":"2015","unstructured":"[7] S. Karma and E. Zorba, \"Use of unmanned vehicles in search and rescue operations in forest fires: Advantages and limitations observed in a field trial,\" International Journal of Disaster Risk Reduction, vol. 13, pp. 307\u2013312, 2015.","journal-title":"Int J Disaster Risk Reduct","ISSN":"http:\/\/id.crossref.org\/issn\/2212-4209","issn-type":"print"},{"key":"ref7","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.atmosres.2016.03.005","article-title":"Modern and prospective technologies for weather modification activities: A look at integrating unmanned aircraft systems","volume":"178\u2013179","author":"Axisa","year":"2016","unstructured":"[8] D. Axisa, T. P. DeFelice, \"Modern and prospective technologies for weather modification activities: A look at integrating unmanned aircraft systems,\" Atmospheric Research, vol. 178\u2013179, pp. 114\u2013124, 2016.","journal-title":"Atmos Res","ISSN":"http:\/\/id.crossref.org\/issn\/0169-8095","issn-type":"print"},{"key":"ref8","doi-asserted-by":"publisher","first-page":"4182","DOI":"10.1016\/j.egypro.2013.06.320","article-title":"Monitoring of CCS areas using micro unmanned aerial vehicles (MUAVs)","volume":"37","author":"Neumann","year":"2013","unstructured":"[9] P. P. Neumann and S. Asadi, \"Monitoring of CCS areas using micro unmanned aerial vehicles (MUAVs),\" Energy Procedia, vol. 37, pp. 4182\u20134190, 2013.","journal-title":"Energy Procedia","ISSN":"http:\/\/id.crossref.org\/issn\/1876-6102","issn-type":"print"},{"key":"ref9","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.techfore.2016.01.025","article-title":"Quantifying technology\u2013industry spillover effects based on patent citation network analysis of unmanned aerial vehicle (UAV)","volume":"105","author":"Kim","year":"2016","unstructured":"[10] H. Kim, B. Kyeong Lee, and S. Y. Sohn, \"Quantifying technology\u2013industry spillover effects based on patent citation network analysis of unmanned aerial vehicle (UAV),\" Technological Forecasting & Social Change, vol. 105, pp. 140\u2013157, 2016.","journal-title":"Technol Forecast Soc Change","ISSN":"http:\/\/id.crossref.org\/issn\/0040-1625","issn-type":"print"},{"key":"ref10","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1016\/j.engappai.2013.01.006","article-title":"Terrain traversability analysis methods for unmanned ground vehicles: A survey","volume":"26","author":"Papadakis","year":"2013","unstructured":"[11] P. Papadakis, \"Terrain traversability analysis methods for unmanned ground vehicles: A survey,\" Engineering Applications of Artificial Intelligence, vol. 26, pp. 1373\u20131385, 2013.","journal-title":"Eng Appl Artif Intell","ISSN":"http:\/\/id.crossref.org\/issn\/0952-1976","issn-type":"print"},{"key":"ref11","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.isprsjprs.2014.02.013","article-title":"Unmanned aerial systems for photogrammetry and remote sensing: A review","volume":"92","author":"Colomina","year":"2014","unstructured":"[12] I. Colomina and P. Molina, \"Unmanned aerial systems for photogrammetry and remote sensing: A review,\" Journal of Photogrammetry and Remote Sensing, vol. 92, pp. 79\u201397, 2014.","journal-title":"ISPRS J Photogramm Remote Sens","ISSN":"http:\/\/id.crossref.org\/issn\/0924-2716","issn-type":"print"},{"key":"ref12","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.1016\/j.apm.2014.12.010","article-title":"Unmanned Aerial Vehicle hub-location and routing for monitoring geographic borders","volume":"39","author":"Sar\u0131cicek","year":"2015","unstructured":"[13] I. Sar\u0131cicek and Y. Akkus, \"Unmanned Aerial Vehicle hub-location and routing for monitoring geographic borders,\" Applied Mathematical Modelling, vol. 39, pp. 3939\u20133953, 2015.","journal-title":"Appl Math Model","ISSN":"http:\/\/id.crossref.org\/issn\/0307-904X","issn-type":"print"},{"key":"ref13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.jas.2016.08.002","article-title":"Imaging and photogrammetry models of Olduvai gorge (Tanzania) by unmanned aerial vehicles: A high-resolution digital database for research and conservation of early Stone age sites","volume":"75","year":"2016","unstructured":"[14] Jorayev and K. Wehr, \"Imaging and photogrammetry models of Olduvai gorge (Tanzania) by unmanned aerial vehicles: A high-resolution digital database for research and conservation of early Stone age sites,\" Journal of Archaeological Science, vol. 75, pp. 40-56, 2016","journal-title":"J Archaeol Sci","ISSN":"http:\/\/id.crossref.org\/issn\/0305-4403","issn-type":"print"},{"key":"ref14","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.sysarc.2014.01.004","article-title":"The use of unmanned aerial vehicles and wireless sensor networks for spraying pesticides","volume":"60","author":"Fai\u00e7al","year":"2014","unstructured":"[15] B. S. Fai\u00e7al, F. G. Costa, et al., \"The use of unmanned aerial vehicles and wireless sensor networks for spraying pesticides,\" Journal of Systems Architecture, vol. 60, pp. 393\u2013404, 2014.","journal-title":"J Systems Archit","ISSN":"http:\/\/id.crossref.org\/issn\/1383-7621","issn-type":"print"},{"key":"ref15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2014.12.002","article-title":"Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges","volume":"50","author":"Saleem","year":"2015","unstructured":"[16] Y. Saleem, M. H. Rehmani, and S. Zeadally, \"Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges,\" Journal of Network and Computer Applications, vol. 50, pp. 15\u201331, 2015.","journal-title":"J Netw Comput Appl","ISSN":"http:\/\/id.crossref.org\/issn\/1084-8045","issn-type":"print"},{"key":"ref16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.engappai.2014.04.003","article-title":"Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution","volume":"33","author":"Tijani","year":"2014","unstructured":"[17] I. B.Tijani, R. Akmeliawati, et al., \"Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution,\" Engineering Applications of Artificial Intelligence, vol. 33, pp. 99\u2013115, 2014.","journal-title":"Eng Appl Artif Intell","ISSN":"http:\/\/id.crossref.org\/issn\/0952-1976","issn-type":"print"},{"key":"ref17","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.automatica.2011.07.006","article-title":"Optimal hybrid fault recovery in a team of unmanned aerial vehicles","volume":"48","author":"Tousi","year":"2012","unstructured":"[18] M. M. Tousi and K. Khorasani, \"Optimal hybrid fault recovery in a team of unmanned aerial vehicles,\" Automatica, vol. 48, pp. 410\u2013418, 2012.","journal-title":"Automatica","ISSN":"http:\/\/id.crossref.org\/issn\/0005-1098","issn-type":"print"},{"key":"ref18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.paerosci.2011.12.001","article-title":"On parallel hybrid-electric propulsion system for unmanned aerial vehicles","volume":"51","author":"Hung","year":"2012","unstructured":"[19] J. Y. Hung and L. F. Gonzalez, \"On parallel hybrid-electric propulsion system for unmanned aerial vehicles,\" Progress in Aerospace Sciences, vol. 51, pp. 1\u201317, 2012.","journal-title":"Prog Aerosp Sci","ISSN":"http:\/\/id.crossref.org\/issn\/0376-0421","issn-type":"print"},{"key":"ref19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.proeng.2011.11.2613","article-title":"A general test platform for cyber-physical systems: Unmanned vehicle with wireless sensor network navigation","volume":"24","author":"Wan","year":"2011","unstructured":"[20] J. Wan, H. Suo, H Yan, and J. Liu, \"A general test platform for cyber-physical systems: Unmanned vehicle with wireless sensor network navigation,\" Procedia Engineering, vol. 24, pp. 123\u2013127, 2011.","journal-title":"Procedia Eng","ISSN":"http:\/\/id.crossref.org\/issn\/1877-7058","issn-type":"print"},{"key":"ref20","volume-title":"Kali Linux Cookbook","author":"Pritchett","year":"2013","unstructured":"[21] W. L. Pritchett and D. D. Smet, Kali Linux Cookbook, Birmingham: Packt Publishing, 2013."},{"key":"ref21","volume-title":"Kali Linux","author":"Heriyanto","year":"2014","unstructured":"[22] T. Heriyanto, L. Allen, and S. Ali, Kali Linux: Assuring Security by Penetration Testing, Birmingham: Packt Publishing, 2014."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1002\/9781118547168.ch3","volume-title":"Game Theory An Introduction","author":"Barron","year":"2013","unstructured":"[23] E. N. Barron, Game Theory, An Introduction, Second Edition, John Wiley & Sons, Inc., 2013, ch. 3, pp. 115-1731."}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2017\/0623\/20170623034553472.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T03:44:49Z","timestamp":1693885489000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=178&id=1120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":23,"URL":"https:\/\/doi.org\/10.12720\/jcm.12.6.364-370","relation":{},"ISSN":["1796-2021"],"issn-type":[{"type":"print","value":"1796-2021"}],"subject":[],"published":{"date-parts":[[2017]]}}}