Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Sciences

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore Jul 2012

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore

Faculty Publications

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data …


Network Security Using Self Organized Multi-Agent Swarms, Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson Mar 2009

Network Security Using Self Organized Multi-Agent Swarms, Eric M. Holloway, Gary B. Lamont, Gilbert L. Peterson

Faculty Publications

Computer network cyber-security is a very serious concern in many commercial, industrial, and military environments. This paper proposes a new computer network security approach defined by self organized agent swarms (SOMAS) which provides a novel computer network security management framework based upon desired overall system behaviors. The SOMAS structure evolves based upon the partially observable Markov decision process (POMDP) formal model and the more complex interactive-POMDP and decentralized-POMDP models. Example swarm specific and network based behaviors are formalized and simulated. This paper illustrates through various statistical testing techniques, the significance of this proposed SOMAS architecture.


Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski May 2008

Integrating Trust Into The Cybercraft Initiative Via The Trust Vectors Model, Michael Stevens, Paul D. Williams, Gilbert L. Peterson, Stuart H. Kurkowski

Faculty Publications

This research supports the hypothesis that the Trust Vector model can be modified to fit the CyberCraft Initiative, and that there are limits to the utility of historical data. This research proposed some modifications and expansions to the Trust Model Vector, and identified areas for future research.


Cybercraft: Protecting Electronic Systems With Lightweight Agents, Daniel R. Karrels, Gilbert L. Peterson Jan 2007

Cybercraft: Protecting Electronic Systems With Lightweight Agents, Daniel R. Karrels, Gilbert L. Peterson

Faculty Publications

The United States military is seeking new and innovative methods for securing and maintaining its computing and network resources locally and world-wide. This document presents a work-in-progress research thrust toward building a system capable of meeting many of the US military’s network security and sustainment requirements. The system is based on a Distributed Multi-Agent System (DMAS), that is secure, small, and scalable to the large networks found in the military. It relies on a staged agent architecture capable of dynamic configuration to support changing mission environments. These agents are combined into Hierarchical Peer-to-Peer (HP2P) networks to provide scalable solutions. They …