Resilient Architectures for Integrated C2 in a Contested Cyber Environment

نویسندگان

  • Kathleen M. Carley
  • Gabor Karsai
چکیده

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Washington Headquarters Service, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 11-21-2011 2. REPORT TYPE Final Technical Report 3. DATES COVERED (From To) 11-18-2008 to 11-17-2011

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

Integrated nutrient management using deoiled Jatropha cake for sustained and economic food production

With growing environmental and energy concerns, Jatropha plantations are promoted in degraded/waste lands for the biodiesel production. Nutrient rich nonedible deoiled seed cake, a by-product of Jatropha left out after oil extraction was evaluated at the ICRISAT centre at Patancheru, India as an environment friendly source of nutrients for rainy season maize and soybean followed by postrain...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

4 Th Iccrts: C2 and Agility " Mission Assurance in a Distributed Environment " Topic 7: C2 Assessment Tools and Metrics Mission Assurance in a Distributed Environment

The increased use of machine assistance has opened new doors for adversaries to thwart coalition planning processes and systems using the next generation of sophisticated cyber exploits. These new attack vectors, aimed directly at our core mission-essential systems, will not close during normal operations and will require Command and Control (C2) planners to operate in contested environments re...

متن کامل

Providing a Mathematical Model for Evaluating Resilient Suppliers and Order Allocation in Automotive Related Industries

Today's supply chains are faced with many challenges and threats such as natural disasters, cyber-attacks, boycotts, disruptions in supply, production and distribution, etc. So selection of resilience supplier can significantly reduce purchasing costs and lead times and increase the business continuity in case of disruptions. The aim of this study is evaluating the suppliers and selecting best ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011