Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Ang Yang, Hussein A. Abbass, Ruhul A. Sarker |
WISDOM-II: A Network Centric Model for Warfare. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Yunxiang Ling, Xiangning Shi, Wenyuan Wang |
SimGrid-HLA - Simulation Grid prototype Oriented to Evaluation of Warfare Performance. |
SKG |
2005 |
DBLP DOI BibTeX RDF |
SimGrid, evaluation of warfare performance, prototype, federate, HLA/RTI |
78 | Yunxiang Ling, Miao Zhang, Xiaojun Lu, Wenyuan Wang, Songyang Lao |
Model Searching Algorithm Based on Response Order and Access Order in War-Game Simulation Grid. |
Edutainment |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Maksim Tsvetovat, Maciej Latek |
Dynamics of Agent Organizations: Application to Modeling Irregular Warfare. |
MABS |
2008 |
DBLP DOI BibTeX RDF |
Terrorist Networks, Irregular Warfare, Social Network Analysis, Organizational Learning, Multiagent Simulation, Dynamic Social Networks |
65 | Mark Adkins, John Kruse, Robert Younger |
Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
collaboration, ubiquitous computing, situation awareness, network centric warfare |
65 | Marion G. Cerut |
Mobile Agents in Network-Centric Warfare. |
ISADS |
2001 |
DBLP DOI BibTeX RDF |
heterogeneous distributed information systems, Internet, communications, mobile agents, Command and control, intelligence, network-centric warfare |
65 | Carmine A. Vaccarino, George Konomos |
Real-Time Simulation For Verification Of Tactical Electronic Warfare System. |
ACM Annual Conference (1) |
1978 |
DBLP DOI BibTeX RDF |
Electronic warfare, Operational flight program, Verification, Real-time simulation |
61 | Gianluca Baldassarre |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
61 | Allen Ott, Alex Moir, John T. Rickard |
A Game Theoretic Engine for Cyber Warfare. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
61 | Jared Holsopple, Shanchieh Jay Yang, Moises Sudit |
Mission Impact Assessment for Cyber Warfare. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
61 | Robert J. Elder, Alexander H. Levis, Bahram Yousefi |
Alternatives to Cyber Warfare: Deterrence and Assurance. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
52 | James Walden |
A real-time information warfare exercise on a virtual network. |
SIGCSE |
2005 |
DBLP DOI BibTeX RDF |
capture the flag, network security, virtual machine, computer security, laboratory, exercise, user-mode linux, information warfare |
52 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein |
Surviving information warfare attacks on databases. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency |
52 | Sung-Do Chi, Yong-Jun You, Chan-Ho Jung, Jang-Se Lee, Jae-Ick Kim |
FAMES: fully agent-based modeling & emergent simulation. |
SpringSim |
2009 |
DBLP BibTeX RDF |
FAMES, SES/MB, battleship agent, modeling and simulation, agent-based |
44 | Henrik Bliddal |
CBRN Terrorism and the Challenge of Daesh. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Alessandro Niglia, Carlos Veraza |
Building Resilience Through Social Media After an Attack on Critical Infrastructure. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Francesco Cavallaro, Andrea Chiappetta, Massimiliano De Santis, Anna Pinnarelli |
Critical Infrastructure Protection: Smart Grids. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Edoardo Camilli |
OSINT, Big Data & Critical Infrastructures Protection (CIP). |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Elina Lange Ionatamishvili, Sanda Svetoka |
Strategic Communications and Social Media in the Russia-Ukraine Conflict. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Anke Schmidt-Felzmann |
"Sweden Under Attack!" Lessons from Past Incidents for Coping with a Comprehensive Synchronized Attack on Critical Energy and Information Infrastructure. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Ben Hiller |
Cyber Security and CIP: A Potential Role for OSCE. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Antonia Colibasanu |
NATO's Frontier Critical Infrastructure Protection Buildup - Discussion on the Romanian Energy Sector Protection Challenges. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Liviu Lazar |
NATO Dialogue with the Defence and Security Industry in the Context of the Hybrid Threats. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Gianni Cuozzo |
Critical Infrastructure Cyber-Attack Through Firmware Exploitation. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Mikael Tofvesson |
Identifying and Countering Information Influence Activities Using a Comprehensive Society Approach. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Daniel S. Hamilton |
Going Beyond Static Understandings: Resilience Must Be Shared, and It Must Be Projected Forward. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Mark Rhinard, Bengt Sundelius |
Stronger Together: Enhancing Cooperation Capacity for Forward Resilience. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Drazen Zgaljic, Paola Badurina-Tomic, Matej Plenca |
The Importance of Port Security System in the Implementation of Transport Modal-Shift. |
Critical Infrastructure Protection Against Hybrid Warfare Security Related Challenges |
2016 |
DBLP DOI BibTeX RDF |
|
44 | Robin Wikström, József Mezei |
Intrusion Detection with Type-2 Fuzzy Ontologies and Similarity Measures. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Oleg Chertov, Dan Tavrov |
Microfiles as a Potential Source of Confidential Information Leakage. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai J. Choi, Peng Liu 0005 |
Cyber Insider Mission Detection for Situation Awareness. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Dan E. Tamir, Naphtali David Rishe, Mark Last, Abraham Kandel |
Soft Computing Based Epidemical Crisis Prediction. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Gulshan Kumar, Krishan Kumar 0001 |
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | James Llinas |
Information Fusion Process Design Issues for Hard and Soft Information: Developing an Initial Prototype. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Fei-Yue Wang 0001, Xiaochen Li, Wenji Mao |
An ACP-Based Approach to Intelligence and Security Informatics. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Charles LeDoux, Arun Lakhotia |
Malware and Machine Learning. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Daniel Ortiz Arroyo |
Decision Support in Open Source Intelligence. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Suchitra Abel |
Uncertainty Modeling: The Computational Economists' View on Cyberwarfare. |
Intelligent Methods for Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Napoleon C. Paxton, Stephen Russell 0001, Ira S. Moskowitz, Paul Hyden |
A Survey of Community Detection Algorithms Based On Analysis-Intent. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Tudor Dumitras |
Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Patrick Sweeney, George Cybenko |
Identifying and Exploiting the Cyber High Ground for Botnets. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons |
Cyber Attribution: An Argumentation-Based Approach. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Sanjay Goel, Yuan Hong |
Cyber War Games: Strategic Jostling Among Traditional Adversaries. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Noam Ben-Asher, Cleotilde Gonzalez |
CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Christopher Kiekintveld, Viliam Lisý, Radek Píbil |
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | B. Aditya Prakash |
Graph Mining for Cyber Security. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Rami Puzis, Yuval Elovici |
Active Discovery of Hidden Profiles in Social Networks Using Malware. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Samuel N. Hamilton |
Automated Adversary Profiling. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Kristin E. Heckman, Frank J. Stech |
Cyber Counterdeception: How to Detect Denial & Deception (D&D). |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Julie L. Marble, William F. Lawless, Ranjeev Mittu, Joseph T. Coyne, Myriam Abramson, Ciara Sibley |
The Human Factor in Cybersecurity: Robust & Intelligent Defense. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Ehab Al-Shaer, Mohammad Ashiqur Rahman |
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Andrew Ruef, Chris Rohlf |
Programming Language Theoretic Security in the Real World: A Mirage or the Future? |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
43 | Xiaohui Cui, Thomas E. Potok |
A Particle Swarm Social Model for Multi-Agent Based Insurgency Warfare Simulation. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Ang Yang, Hussein A. Abbass, Ruhul A. Sarker |
Evolving agents for network centric warfare. |
GECCO Workshops |
2005 |
DBLP DOI BibTeX RDF |
network theory, multi-agent systems, complex adaptive systems |
43 | Xiaofei Wang, Yunqiu Chen |
Web-oriented Warfare Command Decision Support System Based on Agent and Data Warehouse. |
CW |
2005 |
DBLP DOI BibTeX RDF |
|
43 | George F. Stone III, Gregory A. McIntyre |
JWARS: the joint warfare system (JWARS): a modeling and analysis tool for the defense department. |
WSC |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Yong-Woon Moon, Hae-Sun Jung, Chang-Sung Jeong |
Context-awareness in Battlefield using Ubiquitous Computing: Network Centric Warfare. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Military Operation, Ubiquitous Computing, Middleware, Context-awareness, Network Centric Warfare |
39 | Saurabh Mukherjee, Shashikala Tapaswi |
Modeling and Simulation of Virtual Warfare Using Virtual Reality Paradigm. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Virtual warfare, Dedicated virtual reality system software, Virtual reality |
39 | Brajendra Panda, Joseph Giordano |
An overview of post information warfare data recovery. |
SAC |
1998 |
DBLP DOI BibTeX RDF |
recovery, data dependency, damage assessment, information warfare |
35 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
35 | J. S. Keane, Jerzy W. Rozenblit, Michael Barnes |
The Advanced Battlefield Architecture for Tactical Information Selection (ABATIS). |
ECBS |
1997 |
DBLP DOI BibTeX RDF |
Advanced Battlefield Architecture for Tactical Information Selection, warfare, display strategy testing, hierarchical design methodology, object-oriented design methodology, battlefield visualization, process centered display, display layer, object-oriented methods, class diagrams, object modeling technique |
35 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
35 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
34 | Zhigang Wang, Biao Liu, Xingang Cui, Yibo Li, Yongwen Yang, Zhichao Lyu |
The Application of Micro Coaxial Rotorcraft in Warfare: An Overview, Key Technologies, and Warfare Scenarios. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Marthie Grobler, Ignus P. Swart |
On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain. |
HCC |
2014 |
DBLP DOI BibTeX RDF |
|
34 | Murdoch Watney |
Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung |
Cyber military strategy for cyberspace superiority in cyber warfare. |
CyberSec |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Xiangyong Chen, Yuanwei Jing, Chunji Li, Nan Jiang, Georgi M. Dimirovski |
Effectiveness evaluation of warfare command systems with dissymmetrical warfare information. |
ACC |
2010 |
DBLP DOI BibTeX RDF |
|
34 | Kedar Sambhoos, James Llinas |
Evaluation methods for distributed multi-platform systems in electronic warfare and information-warfare related missions. |
FUSION |
2009 |
DBLP BibTeX RDF |
|
34 | Samuel Liles |
Cyber warfare compared to fourth and fifth generation warfare as applied to the Internet. |
ISTAS |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Tara Leweling, Ron Walters |
The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
34 | Ken Webb |
Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
34 | Geoffrey Darnton |
Content Analysis as a Tool of Information Warfare. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
34 | Chester L. Smith |
Reply by Chester Smith [9/11 was not Guerilla Warfare: Comments on "Efficiency of Guerilla/Terrorist Warfare" by Chester L. Smith]. |
IEEE Technol. Soc. Mag. |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Avishag Gordon |
9/11 was not Guerilla Warfare: Comments on "Efficiency of Guerilla/Terrorist Warfare" by Chester L. Smith. |
IEEE Technol. Soc. Mag. |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Samuel N. Hamilton, Wendy L. Hamilton |
Adversary Modeling and Simulation in Cyber Warfare. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Doo-Yeoun Cho, Myeong-Jo Son, Jung-Ho Kang, Sung-Jun Lee, Ju-Hwan Cha, Seong-Jin Yoo, Hyo-Kwang Lee, Kyu-Yeul Lee, Tae Wan Kim, Yong-Seog Ko |
Analysis of a submarine's evasive capability against an antisubmarine warfare torpedo using DEVS modeling and simulation. |
SpringSim (2) |
2007 |
DBLP BibTeX RDF |
evasive capability, simulation based acquisition (SBA), submarine, unified modeling language (UML), DEVS formalism |
30 | Darren Baker |
Advances in Communications Electronic Warfare. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Jun-feng Song, Weiming Zhang 0003, Weidong Xiao, Zhen-ning Xu |
Study on Construction and Integration of Military Domain Ontology, Situation Ontology and Military Rule Ontology for Network Centric Warfare. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Gaoming Huang, Luxi Yang, Zhenya He |
Time-delay direction finding based on canonical correlation analysis [electronic warfare applications]. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | John Kruse, Mark Adkins, Kimberly A. Holloman |
Network Centric Warfare in the U.S. Navy's Fifth Fleet. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Joshua Sinai |
Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Martin Fredriksson, Rune Gustavsson |
Quality of Service in Network-Centric Warfare and Challenges in Open Computational Systems Engineering. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Terence Robinson |
Simulation in support of military operations, tactics, and planning: ODIN: an underwater warfare simulation environment. |
WSC |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Alok R. Chaturvedi, Mukul Gupta, Shailendra Raj Mehta, Wei T. Yue |
Agent-based Simulation Approach to Information Warfare in the SEAS Environment. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Pan Shi, Yifeng Lian |
Game-Theoretical Effectiveness Evaluation of DDoS Defense. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
effectiveness evaluation, Game Theory, congestion control, DDoS |
26 | Daniel P. Jenkins, Neville A. Stanton, Paul M. Salmon, Guy H. Walker, Mark S. Young, Ian R. Whitworth, Andy Farmilo, Geoffrey Hone |
The Development of a Cognitive Work Analysis Tool. |
HCI (13) |
2007 |
DBLP DOI BibTeX RDF |
Software Development, Training, Tools, Cognitive Work Analysis |
26 | Yang Hu, Chen Hang |
A Dynamic Reconfigurable Adaptive Software Architecture for Federate in HLA-based simulation. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Xiong Li, Sheng Dang |
Tactical Battlefield Entities Simulation Model Based on Multi-agent Interactions. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
multi-agent system, interactions, agent, modeling and simulation |
26 | David P. Biros, Kent Marett, Brent T. Langhals |
Vigilance and Error Detection in an Automated Command and Control Environment. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Shen Zhihe, Liu Feng |
Applying Improved BP Neural Network In Underwater Targets Recognition. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Vishal Vatsa, Shamik Sural, Arun K. Majumdar |
A Game-Theoretic Approach to Credit Card Fraud Detection. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | O. Sami Saydjari |
Defending Cyberspace. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Martin Fredriksson, Rune Gustavsson |
Methodological principles in construction and observation of open computational systems. |
AAMAS |
2002 |
DBLP DOI BibTeX RDF |
scalability and complexity issues, multiagent systems, methodologies and tools |
26 | Kenneth Y. Jo |
Satellite communications representation in network simulation. |
WSC |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Brent Heeringa, Paul R. Cohen |
An underlying model for defeat mechanisms. |
WSC |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Stephanie M. White, Michael Edwards |
Domain Engineering: The Challenge, Status, and Trends. |
ECBS |
1996 |
DBLP DOI BibTeX RDF |
reuse, systems engineering, product lines, Domain engineering, business strategy, system families |
26 | Mark A. Woyna, John H. Christiansen, Christopher W. Hield, Kathy Lee Simunich |
Modeling Battlefield Sensor Environments with an Object Database Management System. |
SIGMOD Conference |
1993 |
DBLP DOI BibTeX RDF |
C++, SQL |
22 | Zhanshan (Sam) Ma |
Towards an Extended Evolutionary Game Theory with Survival Analysis and Agreement Algorithms for Modeling Uncertainty, Vulnerability, and Deception. |
AICI |
2009 |
DBLP DOI BibTeX RDF |
Extended Evolutionary Game Theory, Agreement Algorithms, Frailty, Dynamic Hybrid Fault Models, UUUR (Uncertain and latent and Unobservable or Unobserved Risks), Strategic Information Warfare, Security, Reliability, Survivability, Deception, Evolutionary Game Theory, Survival Analysis |
22 | Mariusz Chmielewski |
Ontology Applications for Achieving Situation Awareness in Military Decision Support Systems. |
ICCCI |
2009 |
DBLP DOI BibTeX RDF |
Military operations, ontology, decision support, situation awareness, semantic models, Network Centric Warfare |