نتایج جستجو برای: command and control channel

تعداد نتایج: 17039547  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

2008
Michael Zink Eric Lyons David Westbrook David L. Pepyne Brenda Philips James F. Kurose V. Chandrasekar

Meteorological Command & Control is the software architecture that performs the main control loop of our radar sensor network in southwestern Oklahoma. In this control loop data is ingested from the radars, meteorological features are identified in this data, features are reported to end-users, and each radar's future scan strategy based on detected features and end-user requirements is determi...

Journal: :CoRR 2014
Joseph Gardiner Marco Cova Shishir Nagaraja

One of the leading problems in cyber security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools, sometimes referred to as Advanced Persistent Threats (APTs). These attacks target specific organisations or individuals and aim at establishing a continuous and undetected presence in the targeted infrastructure. The goal of these attacks is often...

2004
Norman R. Howes

As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...

2004
Joel Brynielsson

Developers of tomorrow’s Command and Control centers are facing numerous problems related to the vast amount of available information obtained from various sources. On a lower level, huge amounts of uncertain reports from different sensors need to be fused into comprehensible information. On a higher level, representation and management of the aggregated information will be the main task, with ...

2013
Ashutosh Singh Annie H. Toderici Kevin Ross

A botnet is a group of compromised computers— often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that...

2009
S. Choe H. M. Kwon M. Uysal

Introduction: Closed-loop power control (CLPC) is a powerful tool to mitigate near-far problems in the reverse link of a CDMA system over fading channels. Thus far in the literature, most of the work addressing CLPC performance has relied on Monte-Carlo simulations because the feedback loop introduces nonlinearity limiting analytical approaches [1]. Although Song et al. present some analytical ...

2007
Neville A. Stanton Chris Baber

INTRODUCTION Since its inception, just after the Second World War, ergonomics research has paid special attention to the issues surrounding human control of systems. Command and Control environments continue to represent a challenging domain for Ergonomics research. We take a broad view of Command and Control research, to include C2 (Command and Control), C3 (Command, Control and Communication)...

2003
John A. Hamilton

This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation to support the evaluation of the effects of worm-induced packet storms and the experimental design, implementation and results using the OPNET simulation environment.

1999
Will. C. Meilander Jerry L. Potter Kathy J. Liszka Johnnie W. Baker

Real-time tasks for command and control systems are too large or too complex for one processor to handle. Simply adding more CPUs does not result in a linear increase in performance. Current comparative analysis of parallel algorithms does not accurately reflect the increased cost of scheduling when more processors are added. A case is made that associative processors effectively handle real-ti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید