Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore Jul 2012

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore

Faculty Publications

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data …


Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson Jul 2012

Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson

Faculty Publications

Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event …


Leaving The Lecture Hall: Conducting Hf/E Outside The Classroom, C. B. Fausset, K. R. Bujak, K. A. Kline, Jenay Beer, C.-A. Smarr, A. E. Adams, S. E. Mcbride, J. S. Burnett Jan 2012

Leaving The Lecture Hall: Conducting Hf/E Outside The Classroom, C. B. Fausset, K. R. Bujak, K. A. Kline, Jenay Beer, C.-A. Smarr, A. E. Adams, S. E. Mcbride, J. S. Burnett

Faculty Publications

Georgia Tech HF/E students initiated and managed a multisemester project to experience the nuances of conducting HF/E outside the classroom setting. This article focuses on the lessons learned beyond the classroom: project management, team coordination, communication with non-HF/E team members, application of research methods, and integration of data to prioritize and guide design changes. The goal of this article is to help guide other HF/E students and educators when implementing similar projects by providing the lessons we learned from this experience.