---
_id: '58472'
abstract:
- lang: eng
  text: The “kill chain”—involving the analysis of data by human users of military
    technologies, the understanding of that data, and human decisions—has fast been
    replaced by the “kill cloud” that necessitates, allows, and exacerbates increased
    thirst for domination, violence against distant populations, and a culture of
    experimentation with human lives. This commentary reports an interdisciplinary
    discussion organised by the Disruption Network Lab that brought together whistleblowers,
    artists, and experts investigating the impact of artificial intelligence and other
    emerging technologies on networked warfare. Exposing the problematics of networked
    warfare and the kill cloud, their colonial overtones, effects on human subjects
    in real life, erroneous scientific rationalities, and the (business) practices
    and logics that enable this algorithmic machinery of violence. The conference
    took place from the 29th of November to the 1st of December 2024 at the Kunstquartier
    Bethanien in Berlin, Germany.
article_type: review
author:
- first_name: Ishmael
  full_name: Bhila, Ishmael
  id: '105772'
  last_name: Bhila
citation:
  ama: 'Bhila I. Investigating the kill cloud: information warfare, autonomous weapons
    &#38; AI. <i>Digital War</i>. 2025;6(4). doi:<a href="https://doi.org/10.1057/s42984-025-00101-x">10.1057/s42984-025-00101-x</a>'
  apa: 'Bhila, I. (2025). Investigating the kill cloud: information warfare, autonomous
    weapons &#38; AI. <i>Digital War</i>, <i>6</i>(4). <a href="https://doi.org/10.1057/s42984-025-00101-x">https://doi.org/10.1057/s42984-025-00101-x</a>'
  bibtex: '@article{Bhila_2025, title={Investigating the kill cloud: information warfare,
    autonomous weapons &#38; AI}, volume={6}, DOI={<a href="https://doi.org/10.1057/s42984-025-00101-x">10.1057/s42984-025-00101-x</a>},
    number={4}, journal={Digital War}, publisher={Springer Science and Business Media
    LLC}, author={Bhila, Ishmael}, year={2025} }'
  chicago: 'Bhila, Ishmael. “Investigating the Kill Cloud: Information Warfare, Autonomous
    Weapons &#38; AI.” <i>Digital War</i> 6, no. 4 (2025). <a href="https://doi.org/10.1057/s42984-025-00101-x">https://doi.org/10.1057/s42984-025-00101-x</a>.'
  ieee: 'I. Bhila, “Investigating the kill cloud: information warfare, autonomous
    weapons &#38; AI,” <i>Digital War</i>, vol. 6, no. 4, 2025, doi: <a href="https://doi.org/10.1057/s42984-025-00101-x">10.1057/s42984-025-00101-x</a>.'
  mla: 'Bhila, Ishmael. “Investigating the Kill Cloud: Information Warfare, Autonomous
    Weapons &#38; AI.” <i>Digital War</i>, vol. 6, no. 4, Springer Science and Business
    Media LLC, 2025, doi:<a href="https://doi.org/10.1057/s42984-025-00101-x">10.1057/s42984-025-00101-x</a>.'
  short: I. Bhila, Digital War 6 (2025).
date_created: 2025-01-31T13:40:36Z
date_updated: 2025-01-31T13:43:54Z
doi: 10.1057/s42984-025-00101-x
intvolume: '         6'
issue: '4'
keyword:
- autonomous weapons systems
- algorithmic warfare
- cloud computing
- war on terror
language:
- iso: eng
main_file_link:
- open_access: '1'
  url: https://link.springer.com/article/10.1057/s42984-025-00101-x#article-info
oa: '1'
publication: Digital War
publication_identifier:
  issn:
  - 2662-1975
  - 2662-1983
publication_status: published
publisher: Springer Science and Business Media LLC
status: public
title: 'Investigating the kill cloud: information warfare, autonomous weapons & AI'
type: journal_article
user_id: '105772'
volume: 6
year: '2025'
...
---
_id: '17667'
abstract:
- lang: eng
  text: 'Resolving distributed attacks benefits from collaboration between networks.
    We present three approaches for the same multi-domain defensive action that can
    be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures,
    and 3) Minimize Propagation. First, we provide a formula to compute efficiency
    of a defense; then we use this formula to compute the efficiency of the approaches
    under various circumstances. Finally, we discuss how task execution order and
    timing influence defense efficiency. Our results show that the Minimize Propagation
    approach is the most efficient method when defending against the chosen attack.'
author:
- first_name: Ralph
  full_name: Koning, Ralph
  last_name: Koning
- first_name: Gleb
  full_name: Polevoy, Gleb
  id: '83983'
  last_name: Polevoy
- first_name: Lydia
  full_name: Meijer, Lydia
  last_name: Meijer
- first_name: Cees
  full_name: de Laat, Cees
  last_name: de Laat
- first_name: Paola
  full_name: Grosso, Paola
  last_name: Grosso
citation:
  ama: 'Koning R, Polevoy G, Meijer L, de Laat C, Grosso P. Approaches for Collaborative
    Security Defences in Multi Network Environments. In: <i>2019 6th IEEE International
    Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International
    Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>. 2019 6th IEEE International
    Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International
    Conference on Edge Computing and Scalable Cloud (EdgeCom). ; 2019:113-123. doi:<a
    href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>'
  apa: Koning, R., Polevoy, G., Meijer, L., de Laat, C., &#38; Grosso, P. (2019).
    Approaches for Collaborative Security Defences in Multi Network Environments.
    In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)</i> (pp. 113–123). <a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>
  bibtex: '@inproceedings{Koning_Polevoy_Meijer_de Laat_Grosso_2019, series={2019
    6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)},
    title={Approaches for Collaborative Security Defences in Multi Network Environments},
    DOI={<a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>},
    booktitle={2019 6th IEEE International Conference on Cyber Security and Cloud
    Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing
    and Scalable Cloud (EdgeCom)}, author={Koning, Ralph and Polevoy, Gleb and Meijer,
    Lydia and de Laat, Cees and Grosso, Paola}, year={2019}, pages={113–123}, collection={2019
    6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}
    }'
  chicago: Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso.
    “Approaches for Collaborative Security Defences in Multi Network Environments.”
    In <i>2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)</i>, 113–23. 2019 6th IEEE International Conference on Cyber Security
    and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge
    Computing and Scalable Cloud (EdgeCom), 2019. <a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9</a>.
  ieee: R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for
    Collaborative Security Defences in Multi Network Environments,” in <i>2019 6th
    IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/
    2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</i>,
    2019, pp. 113–123.
  mla: Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi
    Network Environments.” <i>2019 6th IEEE International Conference on Cyber Security
    and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge
    Computing and Scalable Cloud (EdgeCom)</i>, 2019, pp. 113–23, doi:<a href="https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9">10.1109/CSCloud/EdgeCom.2019.000-9</a>.
  short: 'R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE
    International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019
    5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom),
    2019, pp. 113–123.'
conference:
  name: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
    (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
    Cloud (EdgeCom)
date_created: 2020-08-06T15:23:23Z
date_updated: 2022-01-06T06:53:16Z
department:
- _id: '63'
- _id: '541'
doi: 10.1109/CSCloud/EdgeCom.2019.000-9
extern: '1'
keyword:
- computer network security
- multinetwork environments
- multidomain defensive action
- task execution order
- timing influence defense efficiency
- distributed attacks
- collaborative security defence approach
- minimize propagation approach
- minimize countermeasure approach
- counteract everywhere approach
- Conferences
- Cloud computing
- Computer crime
- Edge computing
- Security
- Defense Approaches
- Multi-Domain Defense
- Collaborative Defense
- Defense Algorithms
- Computer Networks
language:
- iso: eng
main_file_link:
- url: https://ieeexplore.ieee.org/abstract/document/8854057/authors#authors
page: 113-123
publication: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
  (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
  Cloud (EdgeCom)
publication_identifier:
  issn:
  - 'null'
quality_controlled: '1'
series_title: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing
  (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable
  Cloud (EdgeCom)
status: public
title: Approaches for Collaborative Security Defences in Multi Network Environments
type: conference
user_id: '83983'
year: '2019'
...
---
_id: '9809'
abstract:
- lang: eng
  text: Remarkable advantages of Containers (CNs) over Virtual Machines (VMs) such
    as lower overhead and faster startup has gained the attention of Communication
    Service Providers (CSPs) as using CNs for providing Virtual Network Functions
    (VNFs) can save costs while increasing the service agility. However, as it is
    not feasible to realise all types of VNFs in CNs, the coexistence of VMs and CNs
    is proposed. To put VMs and CNs together, an orchestration framework that can
    chain services across distributed and heterogeneous domains is required. To this
    end, we implemented a framework by extending and consolidating state-of-the-art
    tools and technologies originated from Network Function Virtualization (NFV),
    Software-defined Networking (SDN) and cloud computing environments. This framework
    chains services provisioned across Kubernetes and OpenStack domains. During the
    demo, we deploy a service consist of CN- and VM-based VNFs to demonstrate different
    features provided by our framework.
author:
- first_name: Hadi
  full_name: Razzaghi Kouchaksaraei, Hadi
  id: '60845'
  last_name: Razzaghi Kouchaksaraei
- first_name: Holger
  full_name: Karl, Holger
  id: '126'
  last_name: Karl
citation:
  ama: 'Razzaghi Kouchaksaraei H, Karl H. Service Function Chaining Across OpenStack
    and Kubernetes Domains. In: <i>13th ACM International Conference on Distributed
    and Event-Based Systems</i>. Darmstadt; 2019. doi:<a href="https://doi.org/10.1145/3328905.3332505">10.1145/3328905.3332505</a>'
  apa: Razzaghi Kouchaksaraei, H., &#38; Karl, H. (2019). Service Function Chaining
    Across OpenStack and Kubernetes Domains. In <i>13th ACM International Conference
    on Distributed and Event-based Systems</i>. Darmstadt. <a href="https://doi.org/10.1145/3328905.3332505">https://doi.org/10.1145/3328905.3332505</a>
  bibtex: '@inproceedings{Razzaghi Kouchaksaraei_Karl_2019, place={Darmstadt}, title={Service
    Function Chaining Across OpenStack and Kubernetes Domains}, DOI={<a href="https://doi.org/10.1145/3328905.3332505">10.1145/3328905.3332505</a>},
    booktitle={13th ACM International Conference on Distributed and Event-based Systems},
    author={Razzaghi Kouchaksaraei, Hadi and Karl, Holger}, year={2019} }'
  chicago: Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining
    Across OpenStack and Kubernetes Domains.” In <i>13th ACM International Conference
    on Distributed and Event-Based Systems</i>. Darmstadt, 2019. <a href="https://doi.org/10.1145/3328905.3332505">https://doi.org/10.1145/3328905.3332505</a>.
  ieee: H. Razzaghi Kouchaksaraei and H. Karl, “Service Function Chaining Across OpenStack
    and Kubernetes Domains,” in <i>13th ACM International Conference on Distributed
    and Event-based Systems</i>, Darmstadt, 2019.
  mla: Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining Across
    OpenStack and Kubernetes Domains.” <i>13th ACM International Conference on Distributed
    and Event-Based Systems</i>, 2019, doi:<a href="https://doi.org/10.1145/3328905.3332505">10.1145/3328905.3332505</a>.
  short: 'H. Razzaghi Kouchaksaraei, H. Karl, in: 13th ACM International Conference
    on Distributed and Event-Based Systems, Darmstadt, 2019.'
conference:
  end_date: 2019-06-28
  location: Darmstadt
  name: 13th ACM International Conference on Distributed and Event-based Systems
  start_date: 2019-06-24
date_created: 2019-05-14T05:43:57Z
date_updated: 2022-01-06T07:04:21Z
ddc:
- '004'
department:
- _id: '34'
doi: 10.1145/3328905.3332505
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2019-08-26T09:09:50Z
  date_updated: 2019-08-26T09:09:50Z
  file_id: '12953'
  file_name: p240-Kouchaksaraei.pdf
  file_size: 1206037
  relation: main_file
file_date_updated: 2019-08-26T09:09:50Z
has_accepted_license: '1'
keyword:
- Network Function Virtualization
- Software-defined Networking
- Cloud Computing
- service orchestration
- OpenStack
- Kubernetes
language:
- iso: eng
place: Darmstadt
project:
- _id: '23'
  grant_number: '762057'
  name: 5G Programmable Infrastructure Converging disaggregated neTwork and compUte
    Resources
- _id: '1'
  name: SFB 901
- _id: '4'
  name: SFB 901 - Project Area C
- _id: '16'
  name: SFB 901 - Subproject C4
publication: 13th ACM International Conference on Distributed and Event-based Systems
publication_status: published
status: public
title: Service Function Chaining Across OpenStack and Kubernetes Domains
type: conference
user_id: '477'
year: '2019'
...
---
_id: '17657'
abstract:
- lang: eng
  text: Inter-datacenter transfers of non-interactive but timely large flows over
    a private (managed) network is an important problem faced by many cloud service
    providers. The considered flows are non-interactive because they do not explicitly
    target the end users. However, most of them must be performed on a timely basis
    and are associated with a deadline. We propose to schedule these flows by a centralized
    controller, which determines when to transmit each flow and which path to use.
    Two scheduling models are presented in this paper. In the first, the controller
    also determines the rate of each flow, while in the second bandwidth is assigned
    by the network according to the TCP rules. We develop scheduling algorithms for
    both models and compare their complexity and performance.
author:
- first_name: R.
  full_name: Cohen, R.
  last_name: Cohen
- first_name: Gleb
  full_name: Polevoy, Gleb
  id: '83983'
  last_name: Polevoy
citation:
  ama: Cohen R, Polevoy G. Inter-Datacenter Scheduling of Large Data Flows. <i>Cloud
    Computing, IEEE Transactions on</i>. 2015;PP(99):1-1. doi:<a href="https://doi.org/10.1109/TCC.2015.2487964">10.1109/TCC.2015.2487964</a>
  apa: Cohen, R., &#38; Polevoy, G. (2015). Inter-Datacenter Scheduling of Large Data
    Flows. <i>Cloud Computing, IEEE Transactions On</i>, <i>PP</i>(99), 1–1. <a href="https://doi.org/10.1109/TCC.2015.2487964">https://doi.org/10.1109/TCC.2015.2487964</a>
  bibtex: '@article{Cohen_Polevoy_2015, title={Inter-Datacenter Scheduling of Large
    Data Flows}, volume={PP}, DOI={<a href="https://doi.org/10.1109/TCC.2015.2487964">10.1109/TCC.2015.2487964</a>},
    number={99}, journal={Cloud Computing, IEEE Transactions on}, author={Cohen, R.
    and Polevoy, Gleb}, year={2015}, pages={1–1} }'
  chicago: 'Cohen, R., and Gleb Polevoy. “Inter-Datacenter Scheduling of Large Data
    Flows.” <i>Cloud Computing, IEEE Transactions On</i> PP, no. 99 (2015): 1–1. <a
    href="https://doi.org/10.1109/TCC.2015.2487964">https://doi.org/10.1109/TCC.2015.2487964</a>.'
  ieee: R. Cohen and G. Polevoy, “Inter-Datacenter Scheduling of Large Data Flows,”
    <i>Cloud Computing, IEEE Transactions on</i>, vol. PP, no. 99, pp. 1–1, 2015.
  mla: Cohen, R., and Gleb Polevoy. “Inter-Datacenter Scheduling of Large Data Flows.”
    <i>Cloud Computing, IEEE Transactions On</i>, vol. PP, no. 99, 2015, pp. 1–1,
    doi:<a href="https://doi.org/10.1109/TCC.2015.2487964">10.1109/TCC.2015.2487964</a>.
  short: R. Cohen, G. Polevoy, Cloud Computing, IEEE Transactions On PP (2015) 1–1.
date_created: 2020-08-06T15:20:58Z
date_updated: 2022-01-06T06:53:16Z
department:
- _id: '63'
- _id: '541'
doi: 10.1109/TCC.2015.2487964
extern: '1'
issue: '99'
keyword:
- Approximation algorithms
- Approximation methods
- Bandwidth
- Cloud computing
- Routing
- Schedules
- Scheduling
language:
- iso: eng
page: 1-1
publication: Cloud Computing, IEEE Transactions on
publication_identifier:
  issn:
  - 2168-7161
status: public
title: Inter-Datacenter Scheduling of Large Data Flows
type: journal_article
user_id: '83983'
volume: PP
year: '2015'
...
---
_id: '5679'
abstract:
- lang: eng
  text: Cloud computing promises the flexible delivery of computing services in a
    pay-as-you-go manner. It allows customers to easily scale their infrastructure
    and save on the overall cost of operation. However Cloud service offerings can
    only thrive if customers are satisfied with service performance. Allow-ing instantaneous
    access and flexible scaling while maintaining the service levels and offering
    competitive prices poses a significant challenge to Cloud Computing providers.
    Furthermore services will remain available in the long run only if this business
    generates a stable revenue stream. To address these challenges we introduce novel
    policy-based service admission control mod-els that aim at maximizing the revenue
    of Cloud providers while taking in-formational uncertainty regarding resource
    requirements into account. Our evaluation shows that policy-based approaches statistically
    significantly out-perform first come first serve approaches, which are still state
    of the art. Furthermore the results give insights in how and to what extent uncertainty
    has a negative impact on revenue.
author:
- first_name: Tim
  full_name: Püschel, Tim
  last_name: Püschel
- first_name: Guido
  full_name: Schryen, Guido
  id: '72850'
  last_name: Schryen
- first_name: Diana
  full_name: Hristova, Diana
  last_name: Hristova
- first_name: Dirk
  full_name: Neumann, Dirk
  last_name: Neumann
citation:
  ama: 'Püschel T, Schryen G, Hristova D, Neumann D. Revenue Management for Cloud
    Computing Providers: Decision Models for Service Admission Control under Non-probabilistic
    Uncertainty. <i>European Journal of Operational Research</i>. 2015;244(2):637-647.'
  apa: 'Püschel, T., Schryen, G., Hristova, D., &#38; Neumann, D. (2015). Revenue
    Management for Cloud Computing Providers: Decision Models for Service Admission
    Control under Non-probabilistic Uncertainty. <i>European Journal of Operational
    Research</i>, <i>244</i>(2), 637–647.'
  bibtex: '@article{Püschel_Schryen_Hristova_Neumann_2015, title={Revenue Management
    for Cloud Computing Providers: Decision Models for Service Admission Control under
    Non-probabilistic Uncertainty}, volume={244}, number={2}, journal={European Journal
    of Operational Research}, publisher={Elsevier}, author={Püschel, Tim and Schryen,
    Guido and Hristova, Diana and Neumann, Dirk}, year={2015}, pages={637–647} }'
  chicago: 'Püschel, Tim, Guido Schryen, Diana Hristova, and Dirk Neumann. “Revenue
    Management for Cloud Computing Providers: Decision Models for Service Admission
    Control under Non-Probabilistic Uncertainty.” <i>European Journal of Operational
    Research</i> 244, no. 2 (2015): 637–47.'
  ieee: 'T. Püschel, G. Schryen, D. Hristova, and D. Neumann, “Revenue Management
    for Cloud Computing Providers: Decision Models for Service Admission Control under
    Non-probabilistic Uncertainty,” <i>European Journal of Operational Research</i>,
    vol. 244, no. 2, pp. 637–647, 2015.'
  mla: 'Püschel, Tim, et al. “Revenue Management for Cloud Computing Providers: Decision
    Models for Service Admission Control under Non-Probabilistic Uncertainty.” <i>European
    Journal of Operational Research</i>, vol. 244, no. 2, Elsevier, 2015, pp. 637–47.'
  short: T. Püschel, G. Schryen, D. Hristova, D. Neumann, European Journal of Operational
    Research 244 (2015) 637–647.
date_created: 2018-11-14T15:40:13Z
date_updated: 2022-01-06T07:02:30Z
ddc:
- '000'
department:
- _id: '277'
extern: '1'
file:
- access_level: open_access
  content_type: application/pdf
  creator: hsiemes
  date_created: 2018-12-07T11:44:10Z
  date_updated: 2018-12-13T15:09:12Z
  file_id: '6036'
  file_name: ELSEVIER_JOURNAL_VERSION.pdf
  file_size: 1270024
  relation: main_file
file_date_updated: 2018-12-13T15:09:12Z
has_accepted_license: '1'
intvolume: '       244'
issue: '2'
keyword:
- admission control
- informational uncertainty
- revenue management
- cloud computing
language:
- iso: eng
oa: '1'
page: 637-647
publication: European Journal of Operational Research
publisher: Elsevier
status: public
title: 'Revenue Management for Cloud Computing Providers: Decision Models for Service
  Admission Control under Non-probabilistic Uncertainty'
type: journal_article
user_id: '61579'
volume: 244
year: '2015'
...
