Manipulate attacks, as distinct from capture and disrupt attacks, are intended to
influence opponents’ decision cycles [10]. Using Boyd’s OODA loop construct as a
reference for general decision cycles, we can determine several different forms of
manipulate attack within the context of the Internet of Things [12].