Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (52)
- Physics (21)
- Engineering (19)
- Information Security (18)
- Optics (11)
-
- Applied Mathematics (10)
- Artificial Intelligence and Robotics (8)
- Electrical and Computer Engineering (8)
- Plasma and Beam Physics (7)
- Statistics and Probability (7)
- Software Engineering (5)
- Applied Statistics (4)
- Computer Engineering (4)
- Signal Processing (4)
- Atmospheric Sciences (3)
- Business (3)
- Chemistry (3)
- Digital Communications and Networking (3)
- Electrical and Electronics (3)
- Oceanography and Atmospheric Sciences and Meteorology (3)
- Systems Architecture (3)
- Atomic, Molecular and Optical Physics (2)
- Databases and Information Systems (2)
- Environmental Chemistry (2)
- Environmental Sciences (2)
- Management Information Systems (2)
- Materials Science and Engineering (2)
- Numerical Analysis and Scientific Computing (2)
- Operational Research (2)
- Keyword
-
- #antcenter (11)
- Computer security (11)
- Computer networks--Security measures (9)
- Cyberterrorism (5)
- Algorithms (4)
-
- Data protection (4)
- Reverse engineering (4)
- Drone aircraft (3)
- Adaptive optics (2)
- Brillouin scattering (2)
- Classification systems (2)
- Command and control systems (2)
- Computer network protocols (2)
- Diodes (2)
- Drone aircraft--Control systems (2)
- Fiber optics (2)
- Genetic algorithms (2)
- Image processing--Digital techniques (2)
- Information warfare (2)
- Information warfare--United States (2)
- Kalman filtering (2)
- Management information systems (2)
- Mathematical models (2)
- Military education (2)
- Nonlinear optics (2)
- Numerical analysis (2)
- Robots--Control systems (2)
- Scattering (2)
- Semiconductor lasers (2)
- Software engineering (2)
- Publication Type
Articles 91 - 95 of 95
Full-Text Articles in Physical Sciences and Mathematics
An Analysis Of Information Asset Valuation (Iav) Quantification Methodology For Application With Cyber Information Mission Impact Assessment (Cimia), Denzil L. Hellesen
An Analysis Of Information Asset Valuation (Iav) Quantification Methodology For Application With Cyber Information Mission Impact Assessment (Cimia), Denzil L. Hellesen
Theses and Dissertations
The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodology. The IAV methodology proposes that accurate valuation for an Information Asset (InfoA) is the convergence of information tangible, intangible, and flow attributes to form a functional entity that enhances mission capability. The IAV model attempts to quantify an InfoA to a single value through the summation of weighted criteria. Standardizing the InfoA value criteria will enable decision makers to comparatively analyze dissimilar InfoAs across the tactical, operational, and strategic domains. This research develops the IAV methodology through a review of existing military and non-military valuation …
Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen
Cyber Flag: A Realistic Cyberspace Training Construct, Andrew P. Hansen
Theses and Dissertations
As is well understood, the rapidly unfolding challenges of cyberspace is a fundamental warfare paradigm shift revolutionizing the way future wars will be fought and won. A significant test for the Air Force (indeed any organization with a credible presence in cyberspace) will be providing a realistic training environment that fully meets this challenge. Why create another Flag level exercise? Realistic training (that which is effective, comprehensive and coordinated) is crucial to success in time of war. Red Flag provides dominant training within the air domain and now with the evolution of cyberspace, a comprehensive training environment is necessary to …
Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills
Using Plsi-U To Detect Insider Threats By Datamining Email, James S. Okolica, Gilbert L. Peterson, Robert F. Mills
Faculty Publications
Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to an organisation. This paper discusses an approach to assist investigators in identifying potential insider threats. We discern employees' interests from e-mail using an extended version of PLSI. These interests are transformed into implicit and explicit social network graphs, which are used to locate potential insiders by identifying individuals who feel alienated from the organisation or have a hidden interest in a sensitive topic. By applying this technique to the Enron e-mail corpus, a small number of employees appear as potential insider threats.
Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey
Performance Comparison Of Pb(Zr0.52Ti0.48)O3-Only And Pb(Zr0.52Ti0.48)O3-On-Silicon Resonators, Hengky Chandrahalim, Sunil A. Bhave, Ronald G. Polcawich, Jeff Pulskamp, Dan Judy, Roger Kaul, Madan Dubey
Faculty Publications
This paper provides a quantitative comparison and explores the design space of lead zirconium titanate (PZT)–only and PZT-on-silicon length-extensional mode resonators for incorporation into radio frequency microelectromechanical system filters and oscillators. We experimentally measured the correlation of motional impedance (RX) and quality factor (Q) with the resonators’ silicon layer thickness (tSi). For identical lateral dimensions and PZT-layer thicknesses (tPZT), the PZT-on-silicon resonator has higher resonant frequency (fC), higher Q (5100 versus 140), lower RX (51 Ω versus 205 Ω), and better linearity [third-order input intercept …
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Network Formation Using Ant Colony Optimization -- A Systematic Review, Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson
Faculty Publications
A significant area of research in the field of hybrid communications is the Network Design Problem (NDP) [1]. The NDP is an NP complete problem [1] that focuses on identifying the optimal network topology for transmitting commodities between nodes, under constraints such as bandwidth, limited compatible directed channels, and link and commodity costs. The NDP focuses on designing a flexible network while trying to achieve optimal flow or routing. If a link (or arc) is used, then an associated fixed cost of the edge is incurred. In addition, there is a cost for using the arc depending on the flow. …