Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Automatic data collection systems (1)
- Computer networks--Security measures (1)
- Computer security (1)
- Internet--Security measures (1)
- Inventory control--Automation (1)
-
- Laser weapons--Cost control (1)
- Lasers--Military applications--Computer simulation (1)
- Loss control (1)
- Radio frequency identification systems (1)
- Radio frequency--Identification--Automation (1)
- Risk assessment (1)
- United States--Foreign relations--Press coverage (1)
- United States--Military policy--Press coverage (1)
- United States. Air Force--Operational readiness (1)
- United States. Dept. of Defense--Computer networks--Security measures (1)
Articles 1 - 5 of 5
Full-Text Articles in Risk Analysis
Categorizing High Energy Laser Effects For The Joint Munitions Effectiveness Manual, James A. Markham
Categorizing High Energy Laser Effects For The Joint Munitions Effectiveness Manual, James A. Markham
Theses and Dissertations
With the high risk and cost in fielding High Energy Laser (HEL) weapon systems, the development process must include computer simulation models of weapon system performance from the engineering level up to predicting the military worth of employing specific systems in a combat scenario. This research effort focuses on defining how to measure lethality for HEL weapons in an Advanced Tactical Laser (ATL) scenario. In order to create an effective measure for direct comparison between the emerging laser weapon system and existing conventionally delivered weapons, lase time in seconds is presented as a measure comparable to rounds required to cause …
An Analysis Of Information Assurance Relating To The Department Of Defense Radio Frequency Identification (Rfid) Passive Network, Robert G. Giovannetti
An Analysis Of Information Assurance Relating To The Department Of Defense Radio Frequency Identification (Rfid) Passive Network, Robert G. Giovannetti
Theses and Dissertations
The mandates for suppliers to commence Radio Frequency Identification tagging set by Wal-Mart and the Department of Defense is changing this long-time rumored technology into reality. Despite the many conveniences to automate and improve asset tracking this technology offers, consumer groups have obstinately opposed this adoption due to the perceived weaknesses in security and privacy of the network. While the heated debate between consumers and retailers continues, little to no research has addressed the implications of security on the Department of Defense Radio Frequency Identification network. This thesis utilized a historical analysis of Radio Frequency Identification literature to determine whether …
An Historical Analysis Of Factors Contributing To The Emergence Of The Intrusion Detection Discipline And Its Role In Information Assurance, James L.M. Hart
An Historical Analysis Of Factors Contributing To The Emergence Of The Intrusion Detection Discipline And Its Role In Information Assurance, James L.M. Hart
Theses and Dissertations
In 2003, Gartner, Inc., predicted the inevitable demise of the intrusion detection (ID) market, a major player in the computer security technology industry. In light of this prediction, IT executives need to know if intrusion detection technologies serve a strategic purpose within the framework of information assurance (IA). This research investigated the historical background and circumstances that led to the birth of the intrusion detection field and explored the evolution of the discipline through current research in order to identify appropriate roles for IDS technology within an information assurance framework. The research identified factors contributing to the birth of ID …
Determining A Relationship Between Foreign News Media Reports Covering U.S. Military Events And Network Incidents Against Dod Networks, Jason D. Jaros
Determining A Relationship Between Foreign News Media Reports Covering U.S. Military Events And Network Incidents Against Dod Networks, Jason D. Jaros
Theses and Dissertations
This thesis explores the nature of the relationship between foreign news media and network incidents against DoD networks. A rank correlation was performed between the number of network incidents against DoD networks and foreign news media reports covering U.S. Military events. Further analysis was conducted to determine the key terms used in the contents of foreign news media reports for the months the reports were significantly correlated with network incidents. Several significant correlations were found between various combinations of regions and categories of network incidents. However, the correlations were only moderate and the key terms only led to a slightly …
Selection And Application Of Distorted Risk Measures, Edwin J. Offutt
Selection And Application Of Distorted Risk Measures, Edwin J. Offutt
Theses and Dissertations
This thesis develops and illustrates a methodology for the selection of probability distributions and distortion functions associated with risk scenarios resulting from military capability shortfalls. Distorted (or transformed) risk measures are analyzed and applied to account for loss scenarios that may occur with low frequency but result in catastrophic outcomes. After reviewing the rudimentary concepts of distortion, four well-known continuous distributions, suitable for modeling risk scenarios, are chosen using defined criteria. Based on subject matter expert inputs, a simple method for assigning exactly one of the four distributions to any risk scenario is proposed. Four parametric distortion functions from the …