2007
DOI: 10.1093/comjnl/bxm063
|View full text |Cite
|
Sign up to set email alerts
|

Hyperion Next-Generation Battlespace Information Services

Abstract: The future digital battlespace will be a fast-paced and frenetic environment that stresses information communication technology systems to the limit. The challenges are most acute in the tactical and operational domains where bandwidth is severely limited, security of information is paramount, the network is under physical and cyber attack and administrative support is minimal. Hyperion is a cluster of research projects designed to provide an automated and adaptive information management capability embedded in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 16 publications
(17 reference statements)
0
8
0
Order By: Relevance
“…In the same work, the authors also consider an autonomic defence mechanism based on CPN (Cognitive Packet Network) protocol and establish it to be capable of tracing back flows coming into a node automatically. Ghanea-Hercock et al [65] provide a survey of the techniques within the Hyperion project. They also suggest an overall system architecture to improve the situational awareness of field commanders by providing an option to fuse and compose information services in real time.…”
Section: Present a Methods Calledmentioning
confidence: 99%
“…In the same work, the authors also consider an autonomic defence mechanism based on CPN (Cognitive Packet Network) protocol and establish it to be capable of tracing back flows coming into a node automatically. Ghanea-Hercock et al [65] provide a survey of the techniques within the Hyperion project. They also suggest an overall system architecture to improve the situational awareness of field commanders by providing an option to fuse and compose information services in real time.…”
Section: Present a Methods Calledmentioning
confidence: 99%
“…It is expected that people, smart objects, machines and the surrounding space will all be embedded with devices such as sensors, RFID tags etc., defining a highly decentralized dynamic cyber environment of resources interconnected by pervasive networks of networks (NoNs). This evolution, which has already been pointed out in several papers for both the civilian and military domains [1,2], is posing challenges and opportunities.…”
Section: Introductionmentioning
confidence: 90%
“…Further work will be useful to evaluate how well such approaches compare with random or misinformed decisions [60], and also to develop appropriate mathematical models that help compute the actual time it takes to reach a safe evacuation point in a random and dangerous context [67,68]. Some of the distributed computing and autonomic network infrastructure needs of such decision systems are discussed in [69][70][71][72]. The optimal allocation of resources, such as emergency equipment or personnel, has also been considered in [73,74].…”
Section: Implementation and Evaluation Of The System In The Dbesmentioning
confidence: 99%