نتایج جستجو برای: command and control channel
تعداد نتایج: 17039547 فیلتر نتایج به سال:
in this thesis, using concepts of wavelets theory some methods of the solving optimal control problems (ocps). governed by time-delay systems is investigated. this thesis contains two parts. first, the method of obtaining of the ocps in time delay systems by linear legendre multiwavelets is presented. the main advantage of the meth...
Meteorological Command & Control is the software architecture that performs the main control loop of our radar sensor network in southwestern Oklahoma. In this control loop data is ingested from the radars, meteorological features are identified in this data, features are reported to end-users, and each radar's future scan strategy based on detected features and end-user requirements is determi...
One of the leading problems in cyber security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools, sometimes referred to as Advanced Persistent Threats (APTs). These attacks target specific organisations or individuals and aim at establishing a continuous and undetected presence in the targeted infrastructure. The goal of these attacks is often...
As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...
Developers of tomorrow’s Command and Control centers are facing numerous problems related to the vast amount of available information obtained from various sources. On a lower level, huge amounts of uncertain reports from different sensors need to be fused into comprehensible information. On a higher level, representation and management of the aggregated information will be the main task, with ...
A botnet is a group of compromised computers— often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that...
Introduction: Closed-loop power control (CLPC) is a powerful tool to mitigate near-far problems in the reverse link of a CDMA system over fading channels. Thus far in the literature, most of the work addressing CLPC performance has relied on Monte-Carlo simulations because the feedback loop introduces nonlinearity limiting analytical approaches [1]. Although Song et al. present some analytical ...
INTRODUCTION Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication)...
This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation to support the evaluation of the effects of worm-induced packet storms and the experimental design, implementation and results using the OPNET simulation environment.
Real-time tasks for command and control systems are too large or too complex for one processor to handle. Simply adding more CPUs does not result in a linear increase in performance. Current comparative analysis of parallel algorithms does not accurately reflect the increased cost of scheduling when more processors are added. A case is made that associative processors effectively handle real-ti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید