Resilient Architectures for Integrated C2 in a Contested Cyber Environment
نویسندگان
چکیده
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Service, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 11-21-2011 2. REPORT TYPE Final Technical Report 3. DATES COVERED (From To) 11-18-2008 to 11-17-2011
منابع مشابه
An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملIntegrated nutrient management using deoiled Jatropha cake for sustained and economic food production
With growing environmental and energy concerns, Jatropha plantations are promoted in degraded/waste lands for the biodiesel production. Nutrient rich nonedible deoiled seed cake, a by-product of Jatropha left out after oil extraction was evaluated at the ICRISAT centre at Patancheru, India as an environment friendly source of nutrients for rainy season maize and soybean followed by postrain...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کامل4 Th Iccrts: C2 and Agility " Mission Assurance in a Distributed Environment " Topic 7: C2 Assessment Tools and Metrics Mission Assurance in a Distributed Environment
The increased use of machine assistance has opened new doors for adversaries to thwart coalition planning processes and systems using the next generation of sophisticated cyber exploits. These new attack vectors, aimed directly at our core mission-essential systems, will not close during normal operations and will require Command and Control (C2) planners to operate in contested environments re...
متن کاملProviding a Mathematical Model for Evaluating Resilient Suppliers and Order Allocation in Automotive Related Industries
Today's supply chains are faced with many challenges and threats such as natural disasters, cyber-attacks, boycotts, disruptions in supply, production and distribution, etc. So selection of resilience supplier can significantly reduce purchasing costs and lead times and increase the business continuity in case of disruptions. The aim of this study is evaluating the suppliers and selecting best ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011