2018 International Conference on Military Communications and Information Systems (ICMCIS) 2018
DOI: 10.1109/icmcis.2018.8398690
|View full text |Cite
|
Sign up to set email alerts
|

Application of IoT in military operations in a smart city

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3
3

Relationship

3
6

Authors

Journals

citations
Cited by 61 publications
(37 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…4 shows the entire process flow involving the SPF components for a scenario involving a service invocation request from a C2 (Stakeholder) Application. A live demonstration by the NATO IST-147 group was carried out in Warsaw, Poland which showed the military using the SPF edge computing solution for using in HADR scenarios [16], [17]. Considering a similar use-case where the SPF controller can be deployed on a Mobile Tactical Operations Center (MTOC) i.e.…”
Section: A Resource Monitoring and Managementmentioning
confidence: 99%
“…4 shows the entire process flow involving the SPF components for a scenario involving a service invocation request from a C2 (Stakeholder) Application. A live demonstration by the NATO IST-147 group was carried out in Warsaw, Poland which showed the military using the SPF edge computing solution for using in HADR scenarios [16], [17]. Considering a similar use-case where the SPF controller can be deployed on a Mobile Tactical Operations Center (MTOC) i.e.…”
Section: A Resource Monitoring and Managementmentioning
confidence: 99%
“…If used by the defense establishment and the intelligence community a claim that it is an "unusual weapon" is nullified, because government through actions have evidence that it is a "usual weapon". Because hacker and discovery tools are commonly used by both the military and civilians, both communities utilize the same over-arching information technology such as wireless, sharing, data storage, Internet of Things, and communication [13], [14], the legal foundation for prohibiting civilian ownership of potentially weaponized software evaporates.…”
Section: Unusual Weaponsmentioning
confidence: 99%
“…For HADR operations in Smart City environments, the SPF solution can be used to gain hybrid SA i.e. from the IoT assets deployed by Smart Cities as well as by the military at the edge [14], [15].…”
Section: Integrating Spf Within a Military C2 Infrastructurementioning
confidence: 99%