{"title":"Aspect Detection Enhancement for Aspect Based Sentiment Analysis","authors":"Adelica Ndoni, Ivana Ilic Mestric, Michael Street","doi":"10.1109/ICMCIS52405.2021.9486404","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486404","url":null,"abstract":"This paper proposes a new approach to aspect-based sentiment analysis to provide a more accurate insight about sentiment towards certain aspects relevant for the military environment. The goal of this paper is to obtain an assessment of different approaches to aspect detection applicable to NATO specific corpora.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Jansen, M. Manso, Andrew Toth, Kevin S. Chan, T. H. Bloebaum, F. T. Johnsen
{"title":"NATO Core Services profiling for Hybrid Tactical Networks — Results and Recommendations","authors":"N. Jansen, M. Manso, Andrew Toth, Kevin S. Chan, T. H. Bloebaum, F. T. Johnsen","doi":"10.1109/ICMCIS52405.2021.9486415","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486415","url":null,"abstract":"The NATO Research Task Group IST-150 \"NATO Core Services profiling for Hybrid Tactical Networks\" had Federated Mission Networking (FMN) as the main context and motivation for its work. IST-150 intended to investigate Core Services at the tactical level, and provide recommendations for future spirals of FMN targeting the tactical level. Specifically the Message-Oriented Middleware (MOM) Core Service was investigated through an experimental approach. Our work should be taken both as input to future FMN spirals as well as continuing IST research task groups where MOM services play a role.This paper summarizes our findings on publish/subscribe, introduces new recommendations for the use of request/response, and discusses the potential impact these findings have on the future development of FMN. We recommend the following for tactical federated systems: Using the industry standard MQTT for publish/subscribe, and replacing HTTP/TCP in REST-based services with CoAP for request/response services. This paper summarizes the highlights of our work exploring these facets of MOM.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"26 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Image Captioning and Retrieval to Support Military Decision Making","authors":"D. Ghataoura, S. Ogbonnaya","doi":"10.1109/ICMCIS52405.2021.9486395","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486395","url":null,"abstract":"Image data forms an important percentage in the makeup for providing common operational pictures (COPs) required in military decision making and tactical planning, upon which critical decisions and actions are then taken. However, the considerable volume and velocity of this data places a need to process it in a timely manner with suitable meta-data (features) extracted to support information retrieval and decision making processes. In this paper we apply and explore the benefits of using image captioning whose main task is to create machine generated sentences that can describe an image appropriately. In this way user queries can be expressed using natural language sentences (scene descriptions), in order to frame and subsequently improve the efficiency with which relevant images are retrieved","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Lopes, Caroline Bildsten, K. Wrona, Simo Huopio, Daniel Eidenskog, O. Worthington
{"title":"Cyber Security in Virtualized Communication Networks: Open Challenges for NATO","authors":"R. Lopes, Caroline Bildsten, K. Wrona, Simo Huopio, Daniel Eidenskog, O. Worthington","doi":"10.1109/ICMCIS52405.2021.9486421","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486421","url":null,"abstract":"Modern multi-nation military communication and information systems demand rapid deployment and reconfiguration to enable secure information exchange between domains belonging to different nations. In order to support such a multi-nation mission scenarios NATO has been developing the concept of a federated mission network (FMN). These networks are leveraging the advantages of software-defined networking (SDN) and network function virtualization (NFV) to adapt to a wide range of security requirements using network security functions (NSF). The investigation reported in this paper discusses two use cases, namely how to automate security policy evaluation, and how to deploy a security guard (Information Exchange Function) between network segments with different classification. Both cases use network scenarios from protected core network (PCN) because the goal is to compile open challenges to automate the deployment and management of secure coalition networks.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116525979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting BERT Embeddings for Text Correlation of Military Domain Specific Content","authors":"Arvid Kok, Giavid Valiyev, Michael Street","doi":"10.1109/ICMCIS52405.2021.9486408","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486408","url":null,"abstract":"This paper addresses the problem of how to achieve similarity search for text sequence correlation with a proper semantic foundation. Natural Language Processing (NLP) is fundamental for answering Community of Interest (COI) associated questions and this paper presents and compares three methods for similarity search. The methods are using Google introduced transformer models, BERT being the most well known. Combining techniques for pre-processing data, enhancing BERT and post-BERT adjustments are tested in an experimental setting and results are presented in this paper.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vignesh Sridharan, M. Motani, Brian Jalaian, Niranjan Suri
{"title":"Fountain Coding for Information Protection in Tactical Networks","authors":"Vignesh Sridharan, M. Motani, Brian Jalaian, Niranjan Suri","doi":"10.1109/ICMCIS52405.2021.9486393","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486393","url":null,"abstract":"Tactical edge networks are operated in harsh conditions where ensuring information protection is a challenging issue. An insider threat is one of the major issues that arises in such scenarios. For instance, an attacker can compromise one of the nodes and intercept information that is being relayed to other nodes. In this paper, we propose Fountain Coding for Information Protection (FCIP) to mitigate this threat. The source node encodes information from k source symbols into m messages before sending them over the network and the receiver must recover at least k messages to decipher the information. To mitigate the insider threat, we route the encoded packets along disjoint paths. However, this incurs a trade-off with information availability as the encoded packets are routed along sub-optimal paths. It is also necessary to determine the portion of traffic to encode as encoding all the traffic is resource intensive. We formulate a multi-objective optimization problem that takes into account information protection while trading-off with information availability and considers bandwidth, energy and availability constraints. We model a risk metric to determine the cost of information protection that is provided and a cost metric to quantify the cost of information availability. We demonstrate the benefit of FCIP in our performance study by comparing it against a shortest path routing solution and provide optimal results for FCIP. We analyze the trade-off between information protection and availability and provide insight on the performance and benefits of FCIP for different operational scenarios.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128876189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Merlin von Rechenberg, Paulo H. L. Rettore, R. Lopes, P. Sevenich
{"title":"Software-Defined Networking Applied in Tactical Networks: Problems, Solutions and Open Issues","authors":"Merlin von Rechenberg, Paulo H. L. Rettore, R. Lopes, P. Sevenich","doi":"10.1109/ICMCIS52405.2021.9486399","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486399","url":null,"abstract":"Robust and secure communication systems are essential for military operations but the ever-changing scenarios, heterogeneous devices and dense environment of Tactical Networks (TN) make it challenging to fulfill the requirements. Currently, the literature has shown that Software-defined Networking (SDN) has the potential to improve network management and control, helping to overcome some of these issues. But the application of SDN in TNs is not trivial. Therefore, in order to understand the current problems faced in Software-defined Tactical Networks (SDTN), we conducted a literature review focused on the current problems and solutions, aiming to identify open issues in SDTN. Therefore, we created four main problem categories (i.e. performance, availability, security, and robustness), describing the proposed solutions to handle these issues as well as discussing the approaches, test environments, and the reproducibility of these solutions.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130106186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaakko Marin, Matias Turunen, Micael Bernhardt, T. Riihonen
{"title":"Self-interference Cancelation Performance in Full-Duplex Jamming and Spectrum Monitoring","authors":"Jaakko Marin, Matias Turunen, Micael Bernhardt, T. Riihonen","doi":"10.1109/ICMCIS52405.2021.9486389","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486389","url":null,"abstract":"The use of drones in illegal activities has increased in recent years. One method for countering their operation in restricted areas is by transmitting a high-powered jamming signal over the frequencies used by the target drone. To improve the performance of jammers, full-duplex is introduced. In full-duplex systems, the transceiver is able to transmit and receive using the same time-frequency resources, which allows a device to conduct spectrum monitoring while preventing drone operations by transmitting jamming. In this study, the self-interference cancelation of typical jamming waveforms is experimentally measured and signal detection is performed over samples with imperfect self-interference cancelation.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128192893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Gaze-Based Adaptive Notifications to Support Image Analysts","authors":"Maykel Van Miltenburg, Ghanshaam Sewnath","doi":"10.1109/ICMCIS52405.2021.9486410","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486410","url":null,"abstract":"An application that emulates the working environment of an image analyst has been developed. An eye-tracker is used to observe the viewing behavior and based on this viewing behavior and image analyst’s computer keyboard interaction, the application tries to optimize the presentation of notifications (namely, adaptive notifications). Within the study, three notification modes were explored: adaptive notifications, non-adaptive notifications and no notifications. The goal of the study was to explore whether adaptive notifications result in higher task performance, situational awareness, and sense of trust, and a lower sense of irritation. A total of fifteen participants participated. They observed two simultaneous video streams and reported mission-relevant information. Each participant performed three scenarios with a different notification mode in each scenario. Task performance was logged in the background by the application. Results indicate that task performance was higher when using the adaptive notification mode compared to the other modes. More specifically, the mode with adapted notifications resulted in fewer false alarms and more correct rejections compared to other modes. There were no significant differences in situational awareness, trust and irritation between the different notification modes. Adaptive notifications based on gaze input can increase the image analyst’s task performance.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Value Based Collection in Intelligence Analysis","authors":"Todd C. Robinson, Liam Pardoe","doi":"10.1109/ICMCIS52405.2021.9486414","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486414","url":null,"abstract":"Intelligence analysis is not a passive process, but proactive and reactive. Analysts have the opportunity to request collection of further intelligence to improve the analysis. The identification and selection of collection opportunities is a human led process requiring an understanding of the value of a collection to be balanced against the cost and risks of making the collection. Argumentation frameworks are a mathematical formalization to describe arguments and conflicts between such arguments. Argumentation frameworks can be used to represent intelligence analyses, with observations, hypotheses and assumptions represented as arguments and conflicts between these represented by attacks. A value of information can be defined over an argumentation framework based on the change in the result of evaluation of the framework, according to argumentation semantics, when arguments are added or removed. When accompanied by a representation of collection opportunities, the value of information can be used to assess which collection opportunity is most beneficial. In this paper we define a framework for calculating the net benefit over a closed set of potential collection opportunities. This framework is demonstrated against an example intelligence analysis on maritime situational awareness scenario.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133655545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}