Pub Date : 2012-10-11DOI: 10.1109/MAES.2012.6328837
J. Elm, R. Rassa
Understanding the value of Systems Engineering (SE) is necessary to justify a project's investment in SE resources and activities. To identify the value of SE, the National Defense Industrial Association (NDIA), in collaboration with the Software Engineering Institute (SEI), developed and executed a survey of defense industrial contractors. [1] The survey analyzed the relationships between the SE activities applied to individual projects, and performance of those projects. Results of this survey, published in 2007 and 2008, indicated strong relationships between many SE efforts applied early in the project and the overall success of the project. Today, NDIA, in collaboration with the Institute of Electrical and Electronics Engineers Aerospace and Electronic Systems Society (IEEE-AESS) and SEI, is engaged in extending that study to build a stronger business case for the application of effective SE to product development projects.
{"title":"Developing a business case for Systems Engineering","authors":"J. Elm, R. Rassa","doi":"10.1109/MAES.2012.6328837","DOIUrl":"https://doi.org/10.1109/MAES.2012.6328837","url":null,"abstract":"Understanding the value of Systems Engineering (SE) is necessary to justify a project's investment in SE resources and activities. To identify the value of SE, the National Defense Industrial Association (NDIA), in collaboration with the Software Engineering Institute (SEI), developed and executed a survey of defense industrial contractors. [1] The survey analyzed the relationships between the SE activities applied to individual projects, and performance of those projects. Results of this survey, published in 2007 and 2008, indicated strong relationships between many SE efforts applied early in the project and the overall success of the project. Today, NDIA, in collaboration with the Institute of Electrical and Electronics Engineers Aerospace and Electronic Systems Society (IEEE-AESS) and SEI, is engaged in extending that study to build a stronger business case for the application of effective SE to product development projects.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125186107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-06DOI: 10.1109/MAES.2012.6226691
S. Gandhi, A. Gorod, B. Sauser
The ever increasing complexity of the current dynamic environment, results in the need to engineer multiple integrated complex systems, which coexist to obtain a common goal and are known as System of Systems (SoS). In order to address the risk management challenges posed by a SoS, a holistic approach is needed, which deals with a risk that could be greater than the sum of its individual constituent risks. This paper focuses on a comparative analysis of systemic risk management with the traditional aspect being currently undertaken for SoS. This paper also highlights the importance of the application of systemic risk in the SoS domain and the understanding of interconnectedness between the various constituents of the systemic risk.
{"title":"A systemic approach to managing risks of SoS","authors":"S. Gandhi, A. Gorod, B. Sauser","doi":"10.1109/MAES.2012.6226691","DOIUrl":"https://doi.org/10.1109/MAES.2012.6226691","url":null,"abstract":"The ever increasing complexity of the current dynamic environment, results in the need to engineer multiple integrated complex systems, which coexist to obtain a common goal and are known as System of Systems (SoS). In order to address the risk management challenges posed by a SoS, a holistic approach is needed, which deals with a risk that could be greater than the sum of its individual constituent risks. This paper focuses on a comparative analysis of systemic risk management with the traditional aspect being currently undertaken for SoS. This paper also highlights the importance of the application of systemic risk in the SoS domain and the understanding of interconnectedness between the various constituents of the systemic risk.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127039244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929037
Varuna Gupta, A. Mazouz, A. Agarwal, G. Hamza-Lup
The proposed research is aimed at enhancing system design productivity by exploiting the principle of “design and reuse” to its full potential. Specifically, we present a statistical model for selecting from a component library the optimal components for a network-on-chip architecture such that to satisfy certain system performance requirements. Our model is based on regression analysis and Taguchi's optimization technique. The model estimates the relationship between system performance and component attributes, to help the architect in the component selection process. Having such a model in the system design phase will allow the architect not only to make informed decisions when selecting components but also to exchange components with similar characteristics to fine tune system performance.
{"title":"A statistical model for system components selection","authors":"Varuna Gupta, A. Mazouz, A. Agarwal, G. Hamza-Lup","doi":"10.1109/SYSCON.2011.5929037","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929037","url":null,"abstract":"The proposed research is aimed at enhancing system design productivity by exploiting the principle of “design and reuse” to its full potential. Specifically, we present a statistical model for selecting from a component library the optimal components for a network-on-chip architecture such that to satisfy certain system performance requirements. Our model is based on regression analysis and Taguchi's optimization technique. The model estimates the relationship between system performance and component attributes, to help the architect in the component selection process. Having such a model in the system design phase will allow the architect not only to make informed decisions when selecting components but also to exchange components with similar characteristics to fine tune system performance.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"798 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929072
A. Ebrahimi, Ahmad Habibi Zad Navin, M. Kamal Mirnia, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi
In recent years, many approaches for correlating alerts and discovering attack scenarios have been proposed. However, most of them have difficulties such as high dependency to predefined correlation rule definitions and domain knowledge, huge volume of computing workload in some cases and limited capability in discovering new attack scenarios. Therefore, in this paper, we proposed a new alert correlation method to automatically extract multi-step attack scenarios. This method works based on a multi-phase process which acts on the IDS generated alerts. In normalization phase, alerts are turned to the form that can be easily processed by the proposed system. In alert Winnowing phase, for each alert is determined that it belongs to which alert sequence or attack scenario. After determining alerts scenarios, for each scenario its sub scenarios and Meta alerts are extracted. Finally, from the produced Meta alerts, the multi-step attack graph is constructed for each attack scenario. We evaluate our approach using DARPA 2000 data sets. Our experiments show our approach can effectively construct multi-step attack scenarios and give high level view of intruder intentions.
{"title":"Automatic attack scenario discovering based on a new alert correlation method","authors":"A. Ebrahimi, Ahmad Habibi Zad Navin, M. Kamal Mirnia, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi","doi":"10.1109/SYSCON.2011.5929072","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929072","url":null,"abstract":"In recent years, many approaches for correlating alerts and discovering attack scenarios have been proposed. However, most of them have difficulties such as high dependency to predefined correlation rule definitions and domain knowledge, huge volume of computing workload in some cases and limited capability in discovering new attack scenarios. Therefore, in this paper, we proposed a new alert correlation method to automatically extract multi-step attack scenarios. This method works based on a multi-phase process which acts on the IDS generated alerts. In normalization phase, alerts are turned to the form that can be easily processed by the proposed system. In alert Winnowing phase, for each alert is determined that it belongs to which alert sequence or attack scenario. After determining alerts scenarios, for each scenario its sub scenarios and Meta alerts are extracted. Finally, from the produced Meta alerts, the multi-step attack graph is constructed for each attack scenario. We evaluate our approach using DARPA 2000 data sets. Our experiments show our approach can effectively construct multi-step attack scenarios and give high level view of intruder intentions.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125815328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929093
H. Darabi, M. Mansouri, A. Mostashari, B. Heydari
Extended Enterprise is a set of inter-connected organizations that acts collaboratively to produce a product or deliver a service that is beyond the reach of each one of them. Using the system theory, we define the act of collaboration as a sub-system of extended enterprise entitled enterprise systems governance. In this paper, we use transactional cost analysis in order to build an analytical tool to measure the efficiency and effectiveness of governance strategies that can be used in such a system. The analysis is based on agent-based modeling method, and we will apply the method to Federal Aviation Administration NextGen Project.
{"title":"Enterprise systems governance using transactional cost analysis: An agent-based framework","authors":"H. Darabi, M. Mansouri, A. Mostashari, B. Heydari","doi":"10.1109/SYSCON.2011.5929093","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929093","url":null,"abstract":"Extended Enterprise is a set of inter-connected organizations that acts collaboratively to produce a product or deliver a service that is beyond the reach of each one of them. Using the system theory, we define the act of collaboration as a sub-system of extended enterprise entitled enterprise systems governance. In this paper, we use transactional cost analysis in order to build an analytical tool to measure the efficiency and effectiveness of governance strategies that can be used in such a system. The analysis is based on agent-based modeling method, and we will apply the method to Federal Aviation Administration NextGen Project.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126735188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929118
B. Heydari, M. Finger
In this paper, the issue of boundary is investigated as an important enterprise governance problem. The Mechanism and systemic trends that affect the enterprise value chain are discussed from a system of systems perspective. Then, from the enterprise governance perspective, the value chain is divided into competition, collaboration, and observation. This division is considered as dynamic and is related to enterprise differentiating factors. The boundaries of these sections are analyzed based on a model developed within the new institutional economics framework. The paper ends with a case study for the boundary decision of the high quality wireless video service analyzed with the proposed model.
{"title":"Enterprise governance and boundary decisions: The case of wireless technology","authors":"B. Heydari, M. Finger","doi":"10.1109/SYSCON.2011.5929118","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929118","url":null,"abstract":"In this paper, the issue of boundary is investigated as an important enterprise governance problem. The Mechanism and systemic trends that affect the enterprise value chain are discussed from a system of systems perspective. Then, from the enterprise governance perspective, the value chain is divided into competition, collaboration, and observation. This division is considered as dynamic and is related to enterprise differentiating factors. The boundaries of these sections are analyzed based on a model developed within the new institutional economics framework. The paper ends with a case study for the boundary decision of the high quality wireless video service analyzed with the proposed model.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929039
J. Dahmann, G. Rebovich, J. Lane, Ralph Lowry, Kristen J. Baldwin
This paper builds on and extends U.S. Department of Defense published guidance on systems engineering (SE) of systems of systems (SoS) by developing and presenting a view of SoS SE that translates the SoS SE core elements, their interrelationships, and SoS decision-making artifacts and information from a “trapeze” model to a more familiar and intuitive time-sequenced “wave” model representation. The information is thus rendered in a form more readily usable by SoS SE practitioners in the field and one that corresponds with incremental development approaches that are the norm for SoS capability evolution. The paper describes and motivates the development of the wave model, discusses its key characteristics, and provides examples of SoS efforts that reflect this view of SoS SE. Finally, the paper describes how the information critical to successful SoS SE is created, where it fits into the wave model, how it evolves over time, and in which artifacts the information is normally contained.
{"title":"An implementers' view of systems engineering for systems of systems","authors":"J. Dahmann, G. Rebovich, J. Lane, Ralph Lowry, Kristen J. Baldwin","doi":"10.1109/SYSCON.2011.5929039","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929039","url":null,"abstract":"This paper builds on and extends U.S. Department of Defense published guidance on systems engineering (SE) of systems of systems (SoS) by developing and presenting a view of SoS SE that translates the SoS SE core elements, their interrelationships, and SoS decision-making artifacts and information from a “trapeze” model to a more familiar and intuitive time-sequenced “wave” model representation. The information is thus rendered in a form more readily usable by SoS SE practitioners in the field and one that corresponds with incremental development approaches that are the norm for SoS capability evolution. The paper describes and motivates the development of the wave model, discusses its key characteristics, and provides examples of SoS efforts that reflect this view of SoS SE. Finally, the paper describes how the information critical to successful SoS SE is created, where it fits into the wave model, how it evolves over time, and in which artifacts the information is normally contained.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129891774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929088
Sandra Smith, A. Beaulieu, W. Phillips
Large scale distributed systems often require security protocols to ensure high integrity. We present a modeling approach that uses UML 2 without extensions to support the design, composition and verification of security protocols. The approach assumes a strong threat model, in which an attacker can intercept, modify, and spoof all communications, with the exception of those protected by known-strong encryption. Through a series of models of extensively-studied protocols we demonstrate that the approach allows protocol properties to be accurately represented, and protocols to be automatically tested to detect potential security flaws. The approach benefits from the existing strong tool support for UML 2, allowing automatic generation of protocol implementations from the models.
{"title":"Modeling and verifying security protocols using UML 2","authors":"Sandra Smith, A. Beaulieu, W. Phillips","doi":"10.1109/SYSCON.2011.5929088","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929088","url":null,"abstract":"Large scale distributed systems often require security protocols to ensure high integrity. We present a modeling approach that uses UML 2 without extensions to support the design, composition and verification of security protocols. The approach assumes a strong threat model, in which an attacker can intercept, modify, and spoof all communications, with the exception of those protected by known-strong encryption. Through a series of models of extensively-studied protocols we demonstrate that the approach allows protocol properties to be accurately represented, and protocols to be automatically tested to detect potential security flaws. The approach benefits from the existing strong tool support for UML 2, allowing automatic generation of protocol implementations from the models.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929062
K. Rezaie, A. Haeri
Flexible manufacturing systems (FMS) attract more attention in recent years. Design and establishing of a FMS need much investment. So it is necessary to make best decision for selection of a FMS alternative. In this paper an approach for selecting a FMS alternative on the basis of the performance criteria is presented. Six input and output factors are used for FMS selection. Initially the approach use Principle Component Analysis (PCA) for decreasing number of criteria. After performing PCA two criteria are generated instead of initial six criteria. After that Pareto optimality and Pareto front concepts are used for rank FMS alternatives on the basis of the two new criteria. The proposed approach is performed on a data set that contains specification of 12 FMS alternatives. At the end suggestions for future research is mentioned.
{"title":"Using PCA and Pareto optimality to select flexible manufacturing systems","authors":"K. Rezaie, A. Haeri","doi":"10.1109/SYSCON.2011.5929062","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929062","url":null,"abstract":"Flexible manufacturing systems (FMS) attract more attention in recent years. Design and establishing of a FMS need much investment. So it is necessary to make best decision for selection of a FMS alternative. In this paper an approach for selecting a FMS alternative on the basis of the performance criteria is presented. Six input and output factors are used for FMS selection. Initially the approach use Principle Component Analysis (PCA) for decreasing number of criteria. After performing PCA two criteria are generated instead of initial six criteria. After that Pareto optimality and Pareto front concepts are used for rank FMS alternatives on the basis of the two new criteria. The proposed approach is performed on a data set that contains specification of 12 FMS alternatives. At the end suggestions for future research is mentioned.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125765517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929046
Stefan Hoelldampf, D. Zaum, I. Neumann, M. Olbrich, E. Barke
Today's simulation tools can not keep up with novel design methodologies at system level such as TLM. We propose to automatically precompute numerical models from analog netlists and interface a simulation kernel via SystemC to the digital domain. Our simulation system has performed orders of magnitude faster compared to traditional analog circuit simulators interfaced to SystemC while keeping full accuracy.
{"title":"Fast mixed-signal simulation using SystemC","authors":"Stefan Hoelldampf, D. Zaum, I. Neumann, M. Olbrich, E. Barke","doi":"10.1109/SYSCON.2011.5929046","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929046","url":null,"abstract":"Today's simulation tools can not keep up with novel design methodologies at system level such as TLM. We propose to automatically precompute numerical models from analog netlists and interface a simulation kernel via SystemC to the digital domain. Our simulation system has performed orders of magnitude faster compared to traditional analog circuit simulators interfaced to SystemC while keeping full accuracy.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131637287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}