{"id":"https://openalex.org/W4399836777","doi":"https://doi.org/10.48550/arxiv.2406.12041","title":"Outer Space Cyberattacks: Generating Novel Scenarios to Avoid Surprise","display_name":"Outer Space Cyberattacks: Generating Novel Scenarios to Avoid Surprise","publication_year":2024,"publication_date":"2024-06-17","ids":{"openalex":"https://openalex.org/W4399836777","doi":"https://doi.org/10.48550/arxiv.2406.12041"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2406.12041","pdf_url":"https://arxiv.org/pdf/2406.12041","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2406.12041","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068311451","display_name":"Patrick Lin","orcid":"https://orcid.org/0000-0002-7231-0134"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lin, Patrick","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054945656","display_name":"Keith Abney","orcid":"https://orcid.org/0000-0002-5798-4130"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abney, Keith","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076027789","display_name":"Bruce DeBruhl","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"DeBruhl, Bruce","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025119088","display_name":"Kira J. Abercromby","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abercromby, Kira","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5099282316","display_name":"Henry Danielson","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Danielson, Henry","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5076101217","display_name":"Ryan Jenkins","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jenkins, Ryan","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":84},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9897,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9897,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.9313,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13120","display_name":"Nuclear Issues and Defense","score":0.9236,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/surprise","display_name":"Surprise","score":0.88910407}],"concepts":[{"id":"https://openalex.org/C2780343955","wikidata":"https://www.wikidata.org/wiki/Q333173","display_name":"Surprise","level":2,"score":0.88910407},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.5945749},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5707197},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46429002},{"id":"https://openalex.org/C74248516","wikidata":"https://www.wikidata.org/wiki/Q4169","display_name":"Outer space","level":3,"score":0.43216988},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.076746315},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2406.12041","pdf_url":"https://arxiv.org/pdf/2406.12041","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2406.12041","pdf_url":"https://arxiv.org/pdf/2406.12041","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4389018328","https://openalex.org/W4230480620","https://openalex.org/W3209634551","https://openalex.org/W3004742573","https://openalex.org/W2800245737","https://openalex.org/W2626622440","https://openalex.org/W2490218419","https://openalex.org/W2388883181","https://openalex.org/W2379002197","https://openalex.org/W1976122667"],"abstract_inverted_index":{"Though":[0],"general":[1],"awareness":[2],"around":[3,35],"it":[4,32],"may":[5],"be":[6,164],"low,":[7],"space":[8,20,192,210,237,240,250],"cyberattacks":[9],"are":[10,51,138],"an":[11],"increasingly":[12],"urgent":[13],"problem":[14],"given":[15],"the":[16,24,68,97,114,149,188,191,206,233,242,263],"vital":[17],"role":[18],"that":[19,72,100,152],"systems":[21,151],"play":[22],"in":[23,126,169,177,224,228],"modern":[25],"world.":[26,156],"Open-source":[27],"or":[28,47],"public":[29],"discussions":[30],"about":[31],"typically":[33],"revolve":[34],"only":[36],"a":[37,59,63,84,123],"couple":[38],"generic":[39],"scenarios,":[40,89,183],"namely":[41],"satellite":[42],"hacking":[43],"and":[44,109,131,144,175,218,256,259,269],"signals":[45],"jamming":[46],"spoofing.":[48],"But":[49],"there":[50],"so":[52,99],"many":[53,101],"more":[54,75,102],"possibilities.":[55],"The":[56],"report":[57],"offers":[58],"scenario-prompt":[60],"generator":[61],"--":[62,71],"taxonomy":[64],"of":[65,87,190,209,230,236,266],"sorts,":[66],"called":[67],"ICARUS":[69],"matrix":[70],"can":[73,104],"create":[74],"than":[76,180],"4":[77],"million":[78],"unique":[79],"scenario-prompts.":[80],"We":[81],"will":[82,185],"offer":[83],"starting":[85],"set":[86],"42":[88],"briefly":[90],"describing":[91],"each":[92],"one,":[93],"to":[94,111,118,147,163,166,214,220,254],"begin":[95],"priming":[96],"imagination-pump":[98],"researchers":[103],"bring":[105],"their":[106],"diverse":[107],"expertise":[108],"perspectives":[110],"bear":[112],"on":[113],"problem.":[115],"A":[116],"failure":[117],"imagine":[119],"novel":[120,182],"scenarios":[121],"is":[122,241,261],"major":[124],"risk":[125],"being":[127],"taken":[128],"by":[129,134],"surprise":[130],"severely":[132],"harmed":[133],"threat":[135,208],"actors":[136,219],"who":[137],"constantly":[139],"devising":[140],"new":[141],"ways,":[142,146],"inventive":[143],"resourceful":[145],"breach":[148],"digital":[150],"control":[153],"our":[154],"wired":[155],"To":[157,247],"stay":[158],"vigilant,":[159],"defenders":[160],"likewise":[161],"need":[162,253],"imaginative":[165],"keep":[167],"up":[168],"this":[170],"adversarial":[171],"dance":[172],"between":[173],"hunter":[174],"prey":[176],"cybersecurity.":[178,246],"More":[179],"offering":[181],"we":[184,201,252],"also":[186],"explore":[187],"drivers":[189],"cybersecurity":[193,268],"problem,":[194],"which":[195,226],"include":[196],"at":[197,262],"least":[198],"seven":[199],"factors":[200],"have":[202],"identified.":[203],"For":[204],"instance,":[205],"shared":[207],"debris":[211],"would":[212],"seem":[213],"push":[215],"rational":[216],"states":[217],"avoid":[221],"kinetic":[222],"conflicts":[223],"orbit,":[225],"weighs":[227],"favor":[229],"cyberoperations":[231],"as":[232],"dominant":[234],"form":[235],"conflicts.":[238],"Outer":[239],"next":[243],"frontier":[244],"for":[245],"guard":[248],"against":[249],"cyberattacks,":[251],"understand":[255],"anticipate":[257],"them,":[258],"imagination":[260],"very":[264],"heart":[265],"both":[267],"frontiers.":[270]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4399836777","counts_by_year":[],"updated_date":"2024-12-10T13:54:29.333089","created_date":"2024-06-20"}