Proceedings of the IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH3709
DOI: 10.1109/naecon.2000.894920
|View full text |Cite
|
Sign up to set email alerts
|

"Cyber Warrior": information superiority through advanced multi-sensory command and control technologies

Abstract: Abstract. This paper explores the functions of a conceptual, future "watch center" whose mission is to support Air Force information assurance requirements. A cognitive systems engineering approach is described through the insertion of multi-sensory, user interface technologies may be accomplished.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Authentication and key agreement : The role of fog nodes is data gathering and aggregation, in which acquiring authentication with various levels of the gateways creates security issues. Hence, an end‐to‐end authentication approach and lightweight authentication techniques are considered significant criteria for acquiring secure information sharing in fog computing 40–49 …”
Section: Challenges Identifiedmentioning
confidence: 99%
See 2 more Smart Citations
“…Authentication and key agreement : The role of fog nodes is data gathering and aggregation, in which acquiring authentication with various levels of the gateways creates security issues. Hence, an end‐to‐end authentication approach and lightweight authentication techniques are considered significant criteria for acquiring secure information sharing in fog computing 40–49 …”
Section: Challenges Identifiedmentioning
confidence: 99%
“…The present-day security analysis is devised mostly based on the deep learning mechanism as mentioned above, but the traditional application domains utilize the instruction-based intrusion detection mechanism, 39 TCPDump-based mechanism, 40 and applied cognitive task analysis. 41 The traditional intrusion detection methods did not utilize any machine learning mechanisms; instead, some instructions and conditions were utilized to detect the intrusion in the network.…”
Section: Fog-assisted Application Domainsmentioning
confidence: 99%
See 1 more Smart Citation
“…[2] To develop all these objectives, we will start from two hypotheses: availability of a combat network capable of delivering digital data with the appropriated bandwidth and automated information acquisition for COP generation. This process must be performed transparently to the troop units, without their intervention in data gathering and elaboration and without interfering in their tasks.…”
Section: Introductionmentioning
confidence: 99%