Filters








110,456 Hits in 3.9 sec

Network design and defence

Marcin Dziubiński, Sanjeev Goyal
2013 Games and Economic Behavior  
Our main finding is that if defence is affordable and reliable, then the network is sparse and heterogeneous, and either centrally or fully protected.  ...  How should networks be defended and designed to ensure connectivity? We develop a strategic model to study this question. There are two 'players', a designer and an adversary.  ...  The Designer could either use defence and connect the network minimally, or construct a network with no defence and larger number of links, which guarantee sufficient redundancy in the number of paths  ... 
doi:10.1016/j.geb.2012.12.007 fatcat:pbhnb3c46bfmhc6bjywfupa5oi

Network Design and Defence

Marcin Dziubiński, Sanjeev Goyal
2012 Social Science Research Network  
In the connectivity game, this trade-off between linking and protection finds a sharp resolution: in equilibrium the designer chooses either an empty network with no defence, a (k + 1)-connected network  ...  How should networks be defended and designed to ensure the best functionality? We develop a model to study this question. There are two players, the Designer and the Adversary.  ...  By contrast, our focus is on defence and design of a network facing an intelligent adversary.  ... 
doi:10.2139/ssrn.2102777 fatcat:hydpisydsva4xdr6opp6exa7dy

Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations

Jose-Luis Roca-Gonzalez
2015 Discrete and Continuous Dynamical Systems. Series S  
The main purpose of this paper is to show and highlight through an example, the relevance of designing a properly strategic communication model (SCM) in order to improve organizations efficiency standards  ...  The case of study takes advantage of some lesson from Network Centric Warfare (NCW) and the Network Enable Capability (NEC) systems to developed a Strategic Communication Model that looks for increasing  ...  passed away and left a deep mark on all his workmates who still taking notice of his example to reach the excellence in our knowledge field.  ... 
doi:10.3934/dcdss.2015.8.1311 fatcat:unfzqtx5o5bvvaggojbzlhda5e

The Ellipse and the Oval in the Design of Spanish Military Defence in the Eighteenth Century

Josep Lluis i Ginovart, Josep M. Toldrà Domingo, Gerard Fortuny Anguera, Agustí Costa Jover, Pau de Sola-Morales Serra
2014 Nexus Network journal  
Curved shapes are very rarely used in military treatises, and limited to small defences.  ...  In Barozzi's introduction (pp. 10-31), he discusses the usefulness of the design of conics for Mechanics and Architecture, using the perfect compass.  ... 
doi:10.1007/s00004-014-0211-y fatcat:opzip6pwbne4pg6mpv2nzq47ve

Wearable Computing for Defence Automation: Opportunities and Challenges in 5G Network

Pradip Kumar Sharma, Jisun Park, Jong Hyuk Park, Kyungeun Cho
2020 IEEE Access  
We present the taxonomy of wearable computing in defence automation system and explain the relationship of each attribute.  ...  In addition, we identify the raise issues and challenges in communication and cybersecurity when deploying the 5G network in defense automation.  ...  The proposed design also included PUF ID to ensure secure and efficient communication in the 5G network.  ... 
doi:10.1109/access.2020.2985313 fatcat:zfypq5bjxjflzbvoc2inpzw5gq

Design and Deployment of Network Testbed for Web Data Security

Shishir Kumar Shandilya
2021 Journal of Cyber Security and Mobility  
The proposed network testbed is designed to incorporate the methods and procedures of Nature-inspired Cyber Security to accommodate the adaptive responses against the sophisticated and ever-advancing cyber  ...  This paper focuses on the existing network testbeds for an effective analysis and monitoring while proposing a new network testbed for examining new security concepts like cyber immunity.  ...  Therefore, a cohesive, highly customizable and feature rich testbed is required to design such defence system based on various network conditions like sudden decline in throughput, status misinformation  ... 
doi:10.13052/jcsm2245-1439.1121 fatcat:uf7tsml2ird4zchgdn4svekiey

Missions and Actions Specific to Cyberspace Operations

Petrișor Pătraşcu
2019 International conference KNOWLEDGE-BASED ORGANIZATION  
Missions and actions specific to cyberspace operations involve special attention from government institutions accredited in the fields of country defence and national security.  ...  Significant contributions to the emergence of this phenomenon consisted of the continued availability of services offered by the global Internet network, the diversity, the number and the usefulness of  ...  In principle, taking into account the components of strategic level of operational design, cyber defence missions and actions are designed to achieve the desired final state.  ... 
doi:10.2478/kbo-2019-0117 fatcat:rq7i5kuvjna7hhy4jgs22zkasa

Defeating Misclassification Attacks Against Transfer Learning [article]

Bang Wu and Shuo Wang and Xingliang Yuan and Cong Wang and Carsten Rudolph and Xiangwen Yang
2022 arXiv   pre-print
We design a distilled differentiator via activation-based network pruning to enervate the attack transferability while retaining accuracy.  ...  Our comparison also demonstrates that our design outperforms prior problematic defences.  ...  ACKNOWLEDGMENT This work was supported in part by a Monash-Data61 collaborative research project under Data61 CRP43, and the  ... 
arXiv:1908.11230v4 fatcat:sfqqxwgp2rhn3cxoi2utgjnatm

CONSIDERATIONS ON THE DESIGN OF THE AIR DEFENCE RESPONSE IN THE CURRENT AIRSPACE

Daniel ROMAN
2022 Bulletin of "Carol I" National Defence University  
art can temporarily compensate for the technological gap between the air threats and the air defence response.  ...  The unprecedented technological development in the field of weapons and ammunition used in the airspace, at low and very low altitudes, is one of the major challenges that the traditional air defence systems  ...  and focused mainly on network integrated collaborative work 2 .  ... 
doi:10.53477/2284-9378-21-42 fatcat:ghwqt7edvbcshghxp4k3lee3kq

Page 1427 of Management & Marketing Abstracts Vol. 31, Issue 9 [page]

2006 Management & Marketing Abstracts  
Strategy design issues assisted by Network Value Analysis (NVA) relate to those roles deriving most benefit from a changed approach, the varied business logics appropriate for different players, and the  ...  Application of the NVA approach to mobile services and content demonstrates the importance of the network concept to mobile network operators. (6 fig, 66 ref) 2810 The impact of bid defences in hostile  ... 

THE COMMON SECURITY AND DEFENCE POLICY OF THE EUROPEAN UNION – IN THE CONTEXT OF 'HYBRID WARFARE', 'NETWORKS', 'SWARMING' AND 'CONSOLIDATED HYBRID DEFENCE'

Benon Szałek, University of Szczecin
2017 Reality of Politics  
The aim of this paper is to present some praxiological remarks on the so-called Common Security and Defence Policy (earlier: The European Security and Defence Policy) of the European Union in the light  ...  of such terms as 'hybrid warfare' , 'networks' , 'swarming' .  ...  DEFENCE POLICY OF THE EUROPEAN UNION First of all, the so-called 'Common Security and Defence Policy' is designed by politicians selected (and not elected) by influential cryptocrats -accordingly to the  ... 
doi:10.15804/rop201708 fatcat:uroyuum6x5ervdjaxhvmks5zbq

Peer-to-Peer Enclaves for Improving Network Defence

David W. Archer, Adam Wick
2013 Technology Innovation Management Review  
If we were sincerely looking for a place of safety, for real security and success, then we would begin to turn to our communities.  ...  to solve these (and other) network defence problems.  ...  Finally, we call on the network-defence research and development community to improve upon and realize this vision in practice.  ... 
doi:10.22215/timreview701 fatcat:6k4ri7p6jnfn7h4dvibu6mlhai

ISRF: interest semantic reasoning based fog firewall for information-centric Internet of Vehicles

Yi Liu, Jun Wu, Jianhua Li, Wu Yang, Hao Chen, Gaolei Li
2019 IET Intelligent Transport Systems  
content and semantic obfuscation, especially at the network edge.  ...  Moreover, interest semantic reasoning with context weight and knowledge graph is proposed to mine implicit relations and illegal knowledge in names and contents.  ...  Acknowledgments This work was supported by the National Natural Science Foundation of China (grant nos. 61431008 and 61571300). References  ... 
doi:10.1049/iet-its.2018.5465 fatcat:lb2io2chc5btzdupfejcf5x3sy

Intellectual Property in collaborative projects: navigating the maze

Puay Tang, Jordi Molas Gallart
2009 International Journal of Technology Management  
Through an in-depth study of IP management practice in collaborative defence projects we identify two contrasting approaches to the implementation of inter-organisational networks for the exchange of technical  ...  This article analyses the use of IT tools in the management of Intellectual Property in collaborative projects involving groups of firms and their customer organisations in the design, development, manufacture  ...  Consequently, defence firms work with a wide variety of network environments and under varying contractual conditions.  ... 
doi:10.1504/ijtm.2009.024435 fatcat:2ei2lii4dbhmtjr6vt3q7jjlou

Deception in Network Defences Using Unpredictability

Jassim Happa, Thomas Bashford-Rogers, Alastair Janse Van Rensburg, Michael Goldsmith, Sadie Creese
2021 Digital Threats: Research and Practice  
We postulate that unpredictability can improve network defences in two key capacities: (1) by re-configuring the network in direct response to detected threats, tailored to the current threat and a security  ...  We demonstrate feasibility with both anomaly- and misuse-based detection alerts, for a historical dataset (playback), and a real-time network simulation where asset-to-mission mappings are known.  ...  ACKNOWLEDGMENT This document is the results of a research project on automated network defences funded by the UK Defence Science and Technology Laboratory (DSTL).  ... 
doi:10.1145/3450973 fatcat:dhgrtsr3fzagtaofeulkimogz4
« Previous Showing results 1 — 15 out of 110,456 results