Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Research On Flight Route Planning For Specific Multi-Missions, Lin Zhong, Ming'an Tong, Sheng Li Sep 2023

Research On Flight Route Planning For Specific Multi-Missions, Lin Zhong, Ming'an Tong, Sheng Li

Journal of System Simulation

Abstract: In order to complete specific aviation missions, a flight route planning model for specific multi-missions is presented. The grid method is used to build a battlefield environment model. Accordingto the complex and real battlefield environment and operational requirements, five target route planning models including distance, fuel consumption, mission completion, ground-to-air threat, and air-to-air threat are proposed. On the basis of specific mission demands, several requirements for missions are analyzed, and the index of mission completion is presented. According to the problem's characteristics, the two-stage solution algorithm for route planning is proposed. In the first stage, the multi-mission sequence is …


Critical Information Infrastructure Protection, Vulnerabilities, Threats And Challenges: A Critical Review, Krishna Prakasha Jun 2022

Critical Information Infrastructure Protection, Vulnerabilities, Threats And Challenges: A Critical Review, Krishna Prakasha

Manipal Journal of Science and Technology

Protection of Critical Information Infrastructure is a crucial requirement nowadays and requires immediate attention and a lot of prevention activities to avoid any cyber threat to critical IT services. This article aims to give a basic overview of Critical Information Infrastructure (CII) and Critical Sectors such as the Power and Energy Sector, Banking Financial Service and Insurance (BFSI), Telecommunications, Government Services, the Transport Sector, the Health Sector, etc. The consequences of attacks on these sectors have been examined, including their national and international challenges. This article shall also discuss the vulnerabilities of common CII, security controls, emerging trends, threats, and …


How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw Jan 2013

How Often Is Employee Anger An Insider Risk I? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research introduced two new scales for the identification and measurement of negative sentiment and insider risk in communications in order to examine the unexplored relationship between these two constructs. The inter-rater reliability and criterion validity of the Scale of Negativity in Texts (SNIT) and the Scale of Insider Risk in Digital Communications (SIRDC) were established with a random sample of email from the Enron archive and criterion measures from established insiders, disgruntled employees, suicidal, depressed, angry, anxious, and other sampled groups. In addition, the sensitivity of the scales to changes over time as the risk of digital attack increased …


How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw Jan 2013

How Often Is Employee Anger An Insider Risk Ii? Detecting And Measuring Negative Sentiment Versus Insider Risk In Digital Communications–Comparison Between Human Raters And Psycholinguistic Software, Eric Shaw, Maria Payri, Michael Cohn, Ilene R. Shaw

Journal of Digital Forensics, Security and Law

This research uses two recently introduced observer rating scales, (Shaw et al., 2013) for the identification and measurement of negative sentiment (the Scale for Negativity in Text or SNIT) and insider risk (Scale of Indicators of Risk in Digital Communication or SIRDC) in communications to test the performance of psycholinguistic software designed to detect indicators of these risk factors. The psycholinguistic software program, WarmTouch (WT), previously used for investigations, appeared to be an effective means for locating communications scored High or Medium in negative sentiment by the SNIT or High in insider risk by the SIRDC within a randomly selected …