Cookies on this website

We use cookies to ensure that we give you the best experience on our website. If you click 'Accept all cookies' we'll assume that you are happy to receive all cookies and you won't see this message again. If you click 'Reject all non-essential cookies' only necessary cookies providing core functionality such as security, network management, and accessibility will be enabled. Click 'Find out more' for information on how to change your cookie settings.

The problem of designing cyber-security systems and policies that adapt as quickly as their attackers do is becoming increasingly important as the world becomes more network-centric and dependent on technology. This paper proposes a new approach to this problem. Namely, it argues that there exists a significant conceptual overlap between theories of military command and control and those of information security. Specifically, the latter lends itself to the study of intentions as the basis for a proactive analytical approach that will provide a more intuitive interface between automated activity and human oversight as well as superior predictive analysis. © 2012 IEEE.

Original publication




Conference paper

Publication Date



6 - 11