2018 International Conference on Military Communications and Information Systems (ICMCIS)最新文献

筛选
英文 中文
Application of IoT in military operations in a smart city 物联网在智慧城市军事行动中的应用
F. T. Johnsen, Z. Zieliński, K. Wrona, Niranjan Suri, Christoph Fuchs, Manas Pradhan, J. Furtak, Bogdan Vasilache, V. Pellegrini, Michal Dyk, M. Marks, Mateusz Krzyszton
{"title":"Application of IoT in military operations in a smart city","authors":"F. T. Johnsen, Z. Zieliński, K. Wrona, Niranjan Suri, Christoph Fuchs, Manas Pradhan, J. Furtak, Bogdan Vasilache, V. Pellegrini, Michal Dyk, M. Marks, Mateusz Krzyszton","doi":"10.1109/ICMCIS.2018.8398690","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398690","url":null,"abstract":"This paper addresses a scenario where a medium sized smart city in an Alliance nation has been struck by disaster. A small, multi-national force is deployed for disaster relief. Situational awareness (SA) is important so that resources, including personnel and supplies, may be prioritized to have the most impact and help those in the most need. This SA can be significantly enhanced via information obtained from Internet of Things (IoT) devices, especially in a smart city environment. This paper, which presents work performed by the NATO IST-147 “Military Applications of Internet of Things” group, explores the potential to exploit smart city IoT capabilities in military operations.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military 在军事中实现网络态势感知的可视化技术的比较分析
Salvador Llopis, Javier Hingant, I. Pérez, M. Esteve, Federico Carvajal, W. Mees, Thibault Debatty
{"title":"A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military","authors":"Salvador Llopis, Javier Hingant, I. Pérez, M. Esteve, Federico Carvajal, W. Mees, Thibault Debatty","doi":"10.1109/ICMCIS.2018.8398693","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398693","url":null,"abstract":"Starting from a common fictional scenario, simulated data sources and a set of measurements will feed two different visualization techniques with the aim to make a comparative analysis. Both visualization techniques described in this paper use the operational picture concept, deemed as the most appropriate tool for military commanders and their staff to achieve cyber situational awareness and to understand the cyber defence implications in operations. Cyber Common Operational Picture (CyCOP) is a tool developed by Universitat Politècnica de València in collaboration with the Spanish Ministry of Defence whose objective is to generate the Cyber Hybrid Situational Awareness (CyHSA). Royal Military Academy in Belgium developed a 3D Operational Picture able to display mission critical elements intuitively using a priori defined domain-knowledge. A comparative analysis will assist researchers in their way to progress solutions and implementation aspects.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Applicability of risk analysis methods to risk-aware routing in software-defined networks 风险分析方法在软件定义网络中风险感知路由中的适用性
Sebastian Szwaczyk, K. Wrona, M. Amanowicz
{"title":"Applicability of risk analysis methods to risk-aware routing in software-defined networks","authors":"Sebastian Szwaczyk, K. Wrona, M. Amanowicz","doi":"10.1109/ICMCIS.2018.8398688","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398688","url":null,"abstract":"Managing risk related to operation of Communication and Information Systems (CIS) is nowadays a very important objective of every organization. Incorrectly performed, risk assessment may lead to critical errors in the entire risk management process and expose an organization to unacceptable operational risk. Unfortunately, most of the currently adopted risk assessment approaches are only marginally applicable to modern IT systems. In this paper we evaluate suitability of various existing risk analysis approaches in support of risk management process for operation of Software Defined Network (SDN). Our objective is to identify risk analysis methods, which are most suitable for supporting risk-aware routing in SDN. From a large set of available risk analysis methods, we select methods that can be potentially used for risk-aware routing system in SDN and compare their suitability for this task. We conclude that the most suitable for our use case are risk assessment methods based on Bayesian networks.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deep learning NATO document labels: A preliminary investigation 深度学习北约文件标签:初步调查
M. Richter, Michael Street, P. Lenk
{"title":"Deep learning NATO document labels: A preliminary investigation","authors":"M. Richter, Michael Street, P. Lenk","doi":"10.1109/ICMCIS.2018.8398703","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398703","url":null,"abstract":"This paper provides an introductory, mostly nontechnical exposition of recent Deep Learning concepts, as relevant to NATO information processing requirements. A baseline case of learning confidentiality classification rules for NATO documents is described, originally performed by applying classical machine learning methods. In the course of the investigation described in this paper, the classical approaches have been complemented by Deep Learning experiments. These experiments shed some light on the potential advantages of using Deep Learning approaches for NATO document processing and beyond.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133260207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Full-duplex radio technology for simultaneously detecting and preventing improvised explosive device activation 同时探测和防止简易爆炸装置激活的全双工无线电技术
T. Riihonen, D. Korpi, Matias Turunen, M. Valkama
{"title":"Full-duplex radio technology for simultaneously detecting and preventing improvised explosive device activation","authors":"T. Riihonen, D. Korpi, Matias Turunen, M. Valkama","doi":"10.1109/ICMCIS.2018.8398707","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398707","url":null,"abstract":"Originating from civilian/commercial wireless networks, the progressive concept of same frequency simultaneous transmission and reception (SF-STAR), a.k.a. in-band full-duplex operation, has high potential also at the future battlefield. The prospects of a military full-duplex radio (MFDR) are not limited to enhancing the spectral efficiency of tactical communications, which would already be a significant advancement considering the universal congestion of electromagnetic spectrum. Perhaps even more importantly, armed forces could gain a major technical advantage by employing multifunction MFDRs that are capable of jointly conducting signals intelligence, electronic warfare, and tactical communications owing to their SF-STAR capability. This study focuses on one specific promising application, where a radio transceiver performs spectrum monitoring and signal surveillance for potential hostile transmissions when simultaneously performing an electronic attack against opposing forces' receivers at the same frequency band. In particular, we demonstrate by experiments in a laboratory environment that the MFDR technology can be successfully used for detecting an attempt to control remotely an improvised explosive device while also preventing its activation by transmitting a jamming signal.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115294704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Graph-based APT detection 基于图的APT检测
Thibault Debatty, W. Mees, Thomas Gilon
{"title":"Graph-based APT detection","authors":"Thibault Debatty, W. Mees, Thomas Gilon","doi":"10.1109/ICMCIS.2018.8398708","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398708","url":null,"abstract":"In this paper we propose a new algorithm to detect Advanced Persistent Threats (APT's) that relies on a graph model of HTTP traffic. We also implement a complete detection system with a web interface that allows to interactively analyze the data. We perform a complete parameter study and experimental evaluation using data collected on a real network. The results show that the performance of our system is comparable to currently available antiviruses, although antiviruses use signatures to detect known malwares while our algorithm solely uses behavior analysis to detect new undocumented attacks.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134087650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
End-to-end optimization for tactical cognitive radio networks 战术认知无线电网络的端到端优化
S. Couturier, Timo Bräysy, Boyd Buchin, J. Krygier, V. Le Nir, Niels Smit, T. Tuukkanen, E. Verheul
{"title":"End-to-end optimization for tactical cognitive radio networks","authors":"S. Couturier, Timo Bräysy, Boyd Buchin, J. Krygier, V. Le Nir, Niels Smit, T. Tuukkanen, E. Verheul","doi":"10.1109/ICMCIS.2018.8398705","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398705","url":null,"abstract":"Cognitive Radios are able to dynamically use free spectrum in their vicinity, avoiding interference and congestion and thus providing robust communication links. Cognitive Radio Networks go one step further, as they do not only consider the link to the next node but focus on end-to-end optimization. Dynamic adaptations of the whole protocol stack are required, especially on the network layer. This paper analyzes networking technologies regarding their support for end-to-end optimization in tactical environments and proposes enhancements. Based on the findings, an architecture framework for Cognitive Radio Networks is proposed.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bit-interleaved polar coded modulation with iterative decoding 具有迭代解码的位交错极化编码调制
Souradip Saha, M. Tschauner, M. Adrat, Tim Schmitz, P. Jax, P. Vary
{"title":"Bit-interleaved polar coded modulation with iterative decoding","authors":"Souradip Saha, M. Tschauner, M. Adrat, Tim Schmitz, P. Jax, P. Vary","doi":"10.1109/ICMCIS.2018.8398698","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398698","url":null,"abstract":"Polar Codes are a recently proposed class of linear block error correction codes. They are provably capacity achieving codes over Binary Discrete Memoryless Channels (B-DMC) and have hence garnered a lot of interest from the scientific community. It is also a proposed channel coding method for 5G technology. Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) is a well known design to improve the error correcting performance of underlying channel codes over continuous channels especially Additive White Gaussian Noise (AWGN) channels. The novel idea in this paper, is to combine these powerful error correcting techniques i.e. integrate Polar Codes in a BICM-ID design to produce a high performance Bit-Interleaved Polar Coded Modulation with Iterative Decoding (BIPCM-ID) system. The error correcting performance of such a BIPCM-ID system has been analyzed through simulations over AWGN channel and multiple modulation schemes. Additionally error floor removal has been implemented and system performance has been discussed.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Limiting the flooding of simplified multicast forwarding to a defined scope 将简化组播转发的泛洪限制在定义的范围内
M. Hauge, L. Landmark
{"title":"Limiting the flooding of simplified multicast forwarding to a defined scope","authors":"M. Hauge, L. Landmark","doi":"10.1109/ICMCIS.2018.8398712","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398712","url":null,"abstract":"We discuss efficient methods for delivering traffic to a group of receivers that is expected to be in close proximity of each other. The methods are based on techniques for efficient flooding of the whole network. If the network covers a large military unit such as a battalion and the data is meant for one company, it is not resource efficient to flood the data to the whole battalion. Therefore, in this article we discuss improvements to Simplified Multicast Forwarding (SMF) that can limit SMF's flooding of a packet to a smaller segment of the network. We also propose a method where the new SMF techniques are used in conjunction with connectionless multicast (Xcast) to improve the flexibility and robustness of the forwarding method.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128082379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Realizing overlay Xcast in a tactical service infrastructure: An approach based on a service-oriented architecture 在战术服务基础设施中实现覆盖Xcast:一种基于面向服务的体系结构的方法
A. Diefenbach, R. Lopes, Thorsten Lampe, Christoph Prasse, J. Sliwa, R. Goniacz, Antti Viidanoja
{"title":"Realizing overlay Xcast in a tactical service infrastructure: An approach based on a service-oriented architecture","authors":"A. Diefenbach, R. Lopes, Thorsten Lampe, Christoph Prasse, J. Sliwa, R. Goniacz, Antti Viidanoja","doi":"10.1109/ICMCIS.2018.8398724","DOIUrl":"https://doi.org/10.1109/ICMCIS.2018.8398724","url":null,"abstract":"The service-oriented architecture (SOA) paradigm is increasingly applied to the armed forces' IT infrastructures. Previously, the tactical service infrastructure (TSI) developed in the TACTICS project by various European partners was proposed to overcome the challenges posed by the disadvantaged networks of the tactical battlefield. In this paper we focus on the realization of an overlay Xcast mechanism in this TSI to make good usage of the scarce bandwidth typically available in tactical military networks. The mechanism was implemented and its feasibility demonstrated in the TACTICS project.","PeriodicalId":428365,"journal":{"name":"2018 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书