Filters








76,447 Hits in 14.3 sec

Exploring value-of-information-based approaches to support effective communications in tactical networks

Niranjan Suri, Giacomo Benincasa, Rita Lenzi, Mauro Tortonesi, Cesare Stefanelli, Laurel Sadler
2015 IEEE Communications Magazine  
This paper explores the notion of determining the value of information in order to prioritize and filter information that is disseminated over these tactical networks, focusing on the dissemination of  ...  This is a promising approach to mitigate the constraints of tactical networks and to reduce information overload on soldiers.  ...  Conclusions Value of Information-based approaches to information management and dissemination are a particularly promising direction for tactical network communications.  ... 
doi:10.1109/mcom.2015.7295461 fatcat:5lnfm2kr2ff6bigc4q2br5ijny

Managing Vulnerabilities of Tactical Wireless RF Network Systems: A Case Study

Philip Chan, David Nowicki, Hong Man, Mo Mansouri
2011 International Journal of Engineering Business Management  
We propose a methodology based on the systematic resolution of complex issues to manage the vulnerabilities of tactical wireless RF systems.  ...  While these countermeasures will not prevent all penetrations and adverse events, they can be effective in reducing many of the common risks associated with wireless RF networks.  ...  It is most effective in treating the complex phenomena present in tactical wireless RF communication networks.  ... 
doi:10.5772/10692 fatcat:vffffckqbzfaphkqvgky2f5cie

System Engineering Approach in Tactical Wireless RF Network Analysis [chapter]

Philip Chan, Hong Man, David Nowicki, Mo Mansouri
2012 Systems Engineering - Practice and Theory  
Tactical RF wireless models were tested on a small example JCSS [12] network. Simulated test results demonstrate the effectiveness of approach.  ...  Threat assessment or injecting threats is one of the major factors of evaluating a situation for its suitability to support decision-making and the indication of the security of a given tactical RF communication  ...  Ramirez-Marquez of the Department of Systems Engineering, Stevens Institute of Technology for many fruitful www.intechopen.com System Engineering Approach in Tactical Wireless RF Network Analysis  ... 
doi:10.5772/34230 fatcat:w6jmrdywwferbizeleeyqq7kry

DisService: Network state monitoring and prediction for opportunistic information dissemination in tactical networks

A. Mazzini, C. Stefanelli, M. Tortonesi, G. Benincasa, N. Suri
2010 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE  
Information dissemination is extremely difficult in tactical edge networks, which provide one of the most challenging environments for communication.  ...  The algorithms are tested in a NS3 simulated environment and the results demonstrate the effectiveness of the DisService approach. Tactical edge networks; information dissemination, machine learning.  ...  INFORMATION DISSEMINATION IN TACTICAL EDGE NETWORKS Reliable and timely information dissemination is essential in tactical edge networks.  ... 
doi:10.1109/milcom.2010.5680429 fatcat:ukrdrqfrynf7jl7ucm5wdsjtdi

UMIS: A Service for User Model Interoperability

Federica Cena, Roberto Furnari
2012 Advances in Internet of Things  
The goal is to support the process of interoperability in three ways: providing an efficient centralized discovery service; offering a service for simple interaction for the exchange of UM value in a p2p  ...  According to our test results, our approach improves the communication with respect to standard solutions for interoperability regarding the quality of exchange, with a negligible impact on the communication  ...  We use the dialogue model also to derive the value in the answers using related concepts (in Explorative Game). With respect to more complex forms of value propagation (e.g.  ... 
doi:10.4236/ait.2012.24012 fatcat:3irtdotl6zfdzjhspkopndifv4

Evaluating the Observability of Network Security Monitoring Strategies with TOMATO

James Halvorsen, Jesse Waite, Adam Hahn
2019 IEEE Access  
This manuscript introduces TOMATO (Threat Observability & Monitoring Assessment Tool), which is a platform to evaluate the effectiveness of a security monitoring strategy by exploring both the number of  ...  However, there's currently a lack of metrics and methodologies to compute the observability and efficiency of a security monitoring strategy.  ...  Work in [10] explored the use of Bayesian networks to identify sensor placement in a network, while in [11] the authors propose feature selection techniques necessary for IDS [12] .  ... 
doi:10.1109/access.2019.2933415 fatcat:rb7ykqhmrjheziq3vxemxrrydq

Expert Mining for Evaluating Risk Indicators Scenarios

Oscar Franco-Bedoya, Dolors Costal, Soraya Hidalgo, Ron Ben-Jacob
2014 2014 IEEE 38th International Computer Software and Applications Conference Workshops  
The approach taken here is to ask domain experts to evaluate specific scenarios of OSS community data (or risk drivers) in terms of values of risk indicators.  ...  Bayesian networks allow the integration of open source community data and expert judgement in order to determine the value of risk indicators.  ...  The contribution of domain experts to the workshops is also acknowledged.  ... 
doi:10.1109/compsacw.2014.38 dblp:conf/compsac/Franco-BedoyaCHB14 fatcat:xckzgrf63bdv7iqpcdx7f5qln4

Software Architecture-Based Adaptation for Pervasive Systems [chapter]

Shang-Wen Cheng, David Garlan, Bradley Schmerl, João Pedro Sousa, Bridget Spitznagel, Peter Steenkiste, Ningning Hu
2002 Lecture Notes in Computer Science  
In this paper we describe an approach in which dynamic adaptation is supported by the use of software architectural models to monitor an application and guide dynamic changes to it.  ...  the effectiveness of repair through continuous system monitoring.  ...  This shows that the choice of tactics based on an analytical model will have the desired effect in the implementation.  ... 
doi:10.1007/3-540-45997-9_7 fatcat:bgibmxzs7jetrcvi2alkre6f3m

Trends in Existing and Emerging Cyber Threat Intelligence Platforms

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Further, open source community for cyber threat sharing is efficient if it allows everyone to share their threat information, create groups for specialized interests and keep logs of every subscriber.  ...  It is observed that ontology based data sensor mechanisms are more efficient as compared to taxonomy models. It helps in identifying various cyber threats in stipulated time period.  ...  ACKNOWLEDGEMENT This research is funded through University of Petroleum and Energy Study's SEED funding for "Developing Cybersecurity Threat Sharing Platform" project.  ... 
doi:10.35940/ijitee.l3188.1081219 fatcat:bhufz3w2wjcgvdj6c7j6bznjha

ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge

Samuel Wood, James Mathewson, Joshua Joy, Mark-Oliver Stehr, Minyoung Kim, Ashish Gehani, Mario Gerla, Hamid Sadjadpour, J.J. Garcia-Luna-Aceves
2013 MILCOM 2013 - 2013 IEEE Military Communications Conference  
ICEMAN is implemented based on the Haggle architecture running in the Android operating system, and supports distributed situational-awareness applications operating in networks subject to severe disruption  ...  Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure.  ...  These three approaches are interrelated; however, we believe that a declarative attribute-based approach offers more flexibility and can enable more efficient information dissemination in tactical networks  ... 
doi:10.1109/milcom.2013.255 dblp:conf/milcom/WoodMJSKGGSG13 fatcat:ni7yonuy65ax3hbkps2hgonuyi

SocialTrust++: Building community-based trust in Social Information Systems

James Caverlee, Zhiyuan Cheng, Brian Eoff, Chiao-Fang Hsu, Krishna Kamath, Said Kashoob, Jeremy Kelley, Elham Khabiri, Kyumin Lee
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
Concretely, we are developing a trustworthy community-based information platform so that each user in a Social Information System can have transparent access to the community's trust perspective to enable  ...  more effective and efficient social information access.  ...  These trust groups can serve as the basis for community trust building and guide the development of more effective community-based information exploration in social systems.  ... 
doi:10.4108/icst.collaboratecom.2010.40 dblp:conf/colcom/CaverleeCEHKKKKL10 fatcat:t6dytjhuljb65gf43s2dtralze

Page 1253 of Psychological Abstracts Vol. 90, Issue 4 [page]

2003 Psychological Abstracts  
The cost information had no significant effect on the values assigned to the services, but a large effect on the preferred spending allocation.  ...  —The subject of this article is a novel new approach to organizing called the network multilogue.  ... 

Virtual Micro-Politics: Informal Tactics of Influence and Power in Inter-Organizational Networks

Monique Janneck, Henning Staar
2010 2010 43rd Hawaii International Conference on System Sciences  
Based on our results, we discuss possible implications for the structure and governance of virtual networks as well as the design of the technology that is used to support virtual cooperation.  ...  Furthermore, we identified additional micro-political tactics specific to virtual networks. The latter are especially related to the use of ICT.  ...  Potential for Innovation in a Modern Working Environment" under grant no. 01FM07047.  ... 
doi:10.1109/hicss.2010.436 dblp:conf/hicss/JanneckS10 fatcat:khffqxhw7vcftegtvussjyq3si

Knowledge-Guided Agent-Tactic-Aware Learning for StarCraft Micromanagement

Yue Hu, Juntao Li, Xi Li, Gang Pan, Mingliang Xu
2018 Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence  
Experimental results demonstrate the effectiveness of the proposed scheme against the state-of-the-art approaches in several benchmark combat scenarios.  ...  exploration process in a tactic-interpretable fashion.  ...  Acknowledgments This work was supported in part by the National Natural Science Foundation of China under Grants (U1509206, 61472353, and 61751209), in part by the National Basic Research Program of China  ... 
doi:10.24963/ijcai.2018/204 dblp:conf/ijcai/HuLLPX18 fatcat:22oya62asraltevovmems5kn4e

Hyperion Next-Generation Battlespace Information Services

R. Ghanea-Hercock, E. Gelenbe, N. R. Jennings, O. Smith, D. N. Allsopp, A. Healing, H. Duman, S. Sparks, N. C. Karunatillake, P. Vytelingum
2007 Computer journal  
Hyperion is a cluster of research projects designed to provide an automated and adaptive information management capability embedded in defence networks.  ...  The challenges are most acute in the tactical and operational domains where bandwidth is severely limited, security of information is paramount, the network is under physical and cyber attack and administrative  ...  Vignette 3 addresses the agile provision of support from a UAV across the tactical communications network.  ... 
doi:10.1093/comjnl/bxm063 fatcat:wvzufkp5effcdfevw4vst7nk2q
« Previous Showing results 1 — 15 out of 76,447 results