Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Trust And Suspicion As A Function Of Cyber Security In Human Machine Team (Hmt) Of Unmanned Systems, Dhaher M. Alshammari Sep 2019

Trust And Suspicion As A Function Of Cyber Security In Human Machine Team (Hmt) Of Unmanned Systems, Dhaher M. Alshammari

Theses and Dissertations

The research focuses on cyber-attacks on cyber-physical systems of the unmanned vehicles that are characteristically used in the military, particularly the Air Force. Unmanned systems are exposed to various risks as the capacity of cyber attackers continue to expand, raising the need for speedy and immediate responses. The advances in military technologies form the basis of the research that explores the challenges faced in the timely detection and response to cyber-attacks. The purpose of the research is to study the connections between operator suspicion and the detection and response to cyber-attacks alongside the identification of theory of suspicion as the …


Operational Decision Making Under Uncertainty: Inferential, Sequential, And Adversarial Approaches, Andrew J. Keith Aug 2019

Operational Decision Making Under Uncertainty: Inferential, Sequential, And Adversarial Approaches, Andrew J. Keith

Theses and Dissertations

Modern security threats are characterized by a stochastic, dynamic, partially observable, and ambiguous operational environment. This dissertation addresses such complex security threats using operations research techniques for decision making under uncertainty in operations planning, analysis, and assessment. First, this research develops a new method for robust queue inference with partially observable, stochastic arrival and departure times, motivated by cybersecurity and terrorism applications. In the dynamic setting, this work develops a new variant of Markov decision processes and an algorithm for robust information collection in dynamic, partially observable and ambiguous environments, with an application to a cybersecurity detection problem. In the …


A Cost-Benefit Analysis Of Pilot Training Next, Talon M. Pope Mar 2019

A Cost-Benefit Analysis Of Pilot Training Next, Talon M. Pope

Theses and Dissertations

The United States Air Force (USAF) is currently facing a 2,400-pilot shortage in an increasingly constrained budgetary environment. Without pilots to engage the enemy, deliver weapons, and provide logistics support for operations, the USAF could lose the ability to fly, fight, and win global engagements and defend the homeland. This study focused on Undergraduate Pilot Training (UPT) as a means of producing the USAF’s pilots to offset the current shortage. Specifically, this study compared UPT to the recently initiated Pilot Training-Next (PTN) program through a cost-benefit analysis. Like any new technology integration, PTN’s virtual reality training will require further study …


Operations Research Methods For Multi-Domain Campaign Phase Planning, John A. Schlicht Mar 2019

Operations Research Methods For Multi-Domain Campaign Phase Planning, John A. Schlicht

Theses and Dissertations

In "Antiaccess Warfare as Strategy," Tangredi posits the question and need to consider multiple domains and governmental and warfighting functions in various phases of campaign execution. Multi-domain integration within and across various phases of the joint campaign presents a host of non-linear factors that are compounded and amplified by uncertainties. Colonel Blotto is a simple game that is suited to compare traditional force-on-force military engagements where mass wins the day, but have had limited application to more complex military planning. This thesis explores the formulation schema, data-driven parameters, methods of calculation, and scenarios applicable to a generalized Colonel Blotto (General …


Commercialization Analysis Of Sbir Funded Technologies, Theodore A. Rask Mar 2019

Commercialization Analysis Of Sbir Funded Technologies, Theodore A. Rask

Theses and Dissertations

The United States Small Business Innovation Research (SBIR) Program invests $2.2 billion annually into domestic innovation stimulation. The Department of Defense (DoD) contributes almost $1 billion of that investment; of which the Air Force accounts for 25%. Commercialization, either the transfer to programs of record or further industrial investment, is the program’s objective. Data from this research indicates that Air Force programs have a 7.6% commercialization rate; representing an opportunity to improve. Leveraging best practices from industry; this research provides a method to align investments with needed capabilities. This method exploits established user need taxonomies, the DoD Joint Capability Area …


Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner Jan 2019

Developmental Test And Requirements Best Practices Of Successful Information Systems Efforts Using Agile Methods, Jeremy D. Kramer, Torrey J. Wagner

Faculty Publications

This article provides insights into the current state of developmental testing (DT) and requirements management in Department of Defense information systems employing Agile development. The authors describe the study methodology and provide an overview of Agile development and testing. Insights are described for requirements, detailed planning, test execution, and reporting. This work articulates best practices related to DT and requirements management strategies for programs employing modernized Software Development Life Cycle practices.