A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, more effective information operations which makes information availability a key component. Since information operations will only become more important in future network operations, a well-developed attack tool that is able to strike the adversary's information networks is a valuable asset and should not be ignored.doi:10.1109/aina.2006.161 dblp:conf/aina/Defibaugh-ChavezMS06 fatcat:pi4c3h7zybauvbmwwkgvfcyste