首页 > 最新文献

Information & Security: An International Journal最新文献

英文 中文
Developing Regional Air Defence Capabilities: Role of NC3A 发展区域防空能力:NC3A的作用
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2511
M. Bartolozzi
The South Eastern European nations of the Balkan Region form an area of countries with similar geo-political issues. These nations need to go through a modernization process of their Air Defence capabilities, in times where financial limitations make it difficult for a single nation to acquire such capabilities on their own. The NATO C3 Agency is highly engaged with the nations of South East Europe in supporting their C4ISR transformation efforts, and possesses all skills, capabilities, and tools to design, procure and implement a regional, multi-national air defence capability, with truly joint situational awareness and integration of national sensors and Missile Defence systems.
巴尔干地区的东南欧国家组成了一个具有类似地缘政治问题的地区。这些国家需要经历其防空能力的现代化进程,在财政限制使单个国家难以独自获得这种能力的时代。北约C3机构与东南欧国家高度合作,支持他们的C4ISR转型工作,并拥有所有技能、能力和工具来设计、采购和实施区域、多国防空能力,具有真正的联合态势感知和国家传感器和导弹防御系统的集成。
{"title":"Developing Regional Air Defence Capabilities: Role of NC3A","authors":"M. Bartolozzi","doi":"10.11610/ISIJ.2511","DOIUrl":"https://doi.org/10.11610/ISIJ.2511","url":null,"abstract":"The South Eastern European nations of the Balkan Region form an area of countries with similar geo-political issues. These nations need to go through a modernization process of their Air Defence capabilities, in times where financial limitations make it difficult for a single nation to acquire such capabilities on their own. The NATO C3 Agency is highly engaged with the nations of South East Europe in supporting their C4ISR transformation efforts, and possesses all skills, capabilities, and tools to design, procure and implement a regional, multi-national air defence capability, with truly joint situational awareness and integration of national sensors and Missile Defence systems.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UBIQUITOUS INSECURITY? HOW TO "HACK" IT SYSTEMS 无处不在的不安全感?如何“黑”it系统
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0706
Michael Näf
ly, a port specifies the endpoint of a connection on a networked device. Ports are identified as numbers. Many port numbers are standardized14 and denote a specific network or application protocol (e.g. port number 80 for HTTP or 23 for Telnet). A lot of the software components serving the respective protocols contain well-known and well-documented vulnerabilities or weaknesses (for instance, a system with anonymous login enabled). Thus, it is only a matter of finding computers that make use of those vulnerable protocols in order to try and attack the affected systems. This search can be automated using a number of tools. One famous example is SATAN (Security Administrator Tool for Analyzing Networks). SATAN is downloadable at no charge and comes with an easy-to-use HTML-based user interface. The tool automatically and efficiently scans any given host (or the respective subnet) for a number of known vulnerabilities and produces a clear and readable report. This report can then be used as a basis to look for actual vulnerabilities.15 2.3. How to Write a Computer Virus Computer viruses and worms are a common way of accessing computer systems without authorization. The effects differ: some viruses merely cause annoyance and inconvenience; others affect the functionality and stability of computing environments or compromise the confidentiality or integrity of (sometimes valuable) information. Three major aspects are important if someone wants to write their own computer virus: ● Payload. What does the virus do once it has infected a system? The amount of damage to be caused by the virus is arbitrary and can be freely specified by the author; ● Delivery and Propagation. How does the virus reach the target systems? And, in case of a (selfpropagating) worm, how does the worm automatically spread to other computer systems? ● Execution. How is the virus payload executed on the target machine? Computer viruses are not dangerous as long as they are not executed. There are two generic methods of ensuring that a virus is executed: (1) The virus can be programmed to exploit one of the countless vulnerabilities that exist in many of today’s mail clients or operating system components. Consequently, these types of viruses are executed without any form of user interaction; (2) Alternatively, the virus can rely on user interaction, in which case the virus is typically delivered as a simple e-mail attachment with a subject heading and content that invites people to open the attachment. The virus is executed as soon as the attachment is opened. Short Analysis of the ILOVEYOU Worm This section gives a short overview of the infamous ILOVEYOU worm by exploring each of the three aspects identified above. The goal is to give some insights into the internals of a virus (or worm) and show how easy it is to create this digital germ. ● Payload: The ILOVEYOU worm is written in Visual Basic Script, an easy-to-learn and powerful programming language by Microsoft, which is often
实际上,端口指定了网络设备上连接的端点。端口标识为数字。许多端口号都是标准化的,以表示特定的网络或应用协议(例如,HTTP的端口号是80,Telnet的端口号是23)。许多服务于各自协议的软件组件都包含众所周知的、有充分记录的漏洞或弱点(例如,启用了匿名登录的系统)。因此,只需找到利用这些易受攻击协议的计算机,就可以尝试攻击受影响的系统。这种搜索可以使用许多工具自动完成。一个著名的例子是撒旦(分析网络的安全管理员工具)。撒旦可以免费下载,并带有一个易于使用的基于html的用户界面。该工具自动有效地扫描任何给定的主机(或相应的子网),以查找许多已知漏洞,并生成清晰可读的报告。然后,该报告可以作为查找实际漏洞的基础。15 2.3。如何编写计算机病毒计算机病毒和蠕虫是未经授权进入计算机系统的一种常见方法。它们的影响各不相同:有些病毒只会造成烦恼和不便;其他影响计算环境的功能和稳定性,或损害(有时是有价值的)信息的机密性或完整性。如果有人想编写自己的计算机病毒,有三个主要方面很重要:一旦病毒感染了系统,它会做什么?病毒造成的损害的数量是任意的,可以由作者自由指定;●交付和传播。病毒是如何到达目标系统的?而且,在(自我传播)蠕虫的情况下,蠕虫是如何自动传播到其他计算机系统的?●执行。如何在目标计算机上执行病毒有效负载?计算机病毒只要不被执行就没有危险。有两种确保病毒被执行的一般方法:(1)病毒可以被编程来利用当今许多邮件客户端或操作系统组件中存在的无数漏洞之一。因此,这些类型的病毒在没有任何形式的用户交互的情况下执行;(2)或者,病毒可以依赖于用户交互,在这种情况下,病毒通常以简单的电子邮件附件的形式发送,带有主题标题和邀请人们打开附件的内容。一旦打开附件,病毒就会执行。这一节通过对上述三个方面的探讨,对臭名昭著的ILOVEYOU蠕虫进行了简短的概述。我们的目标是深入了解病毒(或蠕虫)的内部结构,并展示创造这种数字细菌是多么容易。●有效载荷:ILOVEYOU蠕虫是用Visual Basic Script编写的,这是一种易于学习且功能强大的微软编程语言,经常用于(动态)网页或电子邮件。ILOVEYOU蠕虫的全部有效载荷仅用于自传播目的,不会造成进一步的损害。在其他活动中,16蠕虫在目标机器上搜索某些类型的文件,并根据文件的类型修改这些文件。例如,它将用自身的副本替换所有出现的JPEG文件(一种常用的图像格式),并添加.vbs扩展名(表示Visual Basic Script文件)。如果用户稍后试图打开其中一个修改过的JPEG文件,他或她将看不到图像,而是(重新)激活蠕虫。图2:17给出了相应的蠕虫源代码摘录
{"title":"UBIQUITOUS INSECURITY? HOW TO \"HACK\" IT SYSTEMS","authors":"Michael Näf","doi":"10.11610/ISIJ.0706","DOIUrl":"https://doi.org/10.11610/ISIJ.0706","url":null,"abstract":"ly, a port specifies the endpoint of a connection on a networked device. Ports are identified as numbers. Many port numbers are standardized14 and denote a specific network or application protocol (e.g. port number 80 for HTTP or 23 for Telnet). A lot of the software components serving the respective protocols contain well-known and well-documented vulnerabilities or weaknesses (for instance, a system with anonymous login enabled). Thus, it is only a matter of finding computers that make use of those vulnerable protocols in order to try and attack the affected systems. This search can be automated using a number of tools. One famous example is SATAN (Security Administrator Tool for Analyzing Networks). SATAN is downloadable at no charge and comes with an easy-to-use HTML-based user interface. The tool automatically and efficiently scans any given host (or the respective subnet) for a number of known vulnerabilities and produces a clear and readable report. This report can then be used as a basis to look for actual vulnerabilities.15 2.3. How to Write a Computer Virus Computer viruses and worms are a common way of accessing computer systems without authorization. The effects differ: some viruses merely cause annoyance and inconvenience; others affect the functionality and stability of computing environments or compromise the confidentiality or integrity of (sometimes valuable) information. Three major aspects are important if someone wants to write their own computer virus: ● Payload. What does the virus do once it has infected a system? The amount of damage to be caused by the virus is arbitrary and can be freely specified by the author; ● Delivery and Propagation. How does the virus reach the target systems? And, in case of a (selfpropagating) worm, how does the worm automatically spread to other computer systems? ● Execution. How is the virus payload executed on the target machine? Computer viruses are not dangerous as long as they are not executed. There are two generic methods of ensuring that a virus is executed: (1) The virus can be programmed to exploit one of the countless vulnerabilities that exist in many of today’s mail clients or operating system components. Consequently, these types of viruses are executed without any form of user interaction; (2) Alternatively, the virus can rely on user interaction, in which case the virus is typically delivered as a simple e-mail attachment with a subject heading and content that invites people to open the attachment. The virus is executed as soon as the attachment is opened. Short Analysis of the ILOVEYOU Worm This section gives a short overview of the infamous ILOVEYOU worm by exploring each of the three aspects identified above. The goal is to give some insights into the internals of a virus (or worm) and show how easy it is to create this digital germ. ● Payload: The ILOVEYOU worm is written in Visual Basic Script, an easy-to-learn and powerful programming language by Microsoft, which is often","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125916103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Art of Achieving Political Goals without Use of Force: War by Non-Military Means 不使用武力实现政治目标的艺术:非军事手段的战争
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3911
V. Stoilova
Nowadays, the boundaries between war and peace are increasingly blurred. Over the past few years we can observe the appearance of new terms in the field of international relations – ‘hybrid war,’ ‘hybrid conflicts’ or ‘hybrid threats.’ Despite the absence of a generally recognized definition of the concept, its characteristics are close to the definition of terrorism. Some security analysts indicate this type of conflict as a war, combining conventional methods with guerrilla, cyber and information warfare techniques (media and Internet) as well as with non-military actions, which run contrary to international law and aim to achieve specific policy goals.
如今,战争与和平之间的界限越来越模糊。在过去的几年里,我们可以观察到国际关系领域出现了新的术语——“混合战争”、“混合冲突”或“混合威胁”。尽管这个概念没有一个普遍认可的定义,但其特征接近恐怖主义的定义。一些安全分析人士指出,这种类型的冲突是一场战争,将传统方法与游击战、网络和信息战技术(媒体和互联网)以及非军事行动相结合,这些行动违反国际法,旨在实现特定的政策目标。
{"title":"The Art of Achieving Political Goals without Use of Force: War by Non-Military Means","authors":"V. Stoilova","doi":"10.11610/ISIJ.3911","DOIUrl":"https://doi.org/10.11610/ISIJ.3911","url":null,"abstract":"Nowadays, the boundaries between war and peace are increasingly blurred. Over the past few years we can observe the appearance of new terms in the field of international relations – ‘hybrid war,’ ‘hybrid conflicts’ or ‘hybrid threats.’ Despite the absence of a generally recognized definition of the concept, its characteristics are close to the definition of terrorism. Some security analysts indicate this type of conflict as a war, combining conventional methods with guerrilla, cyber and information warfare techniques (media and Internet) as well as with non-military actions, which run contrary to international law and aim to achieve specific policy goals.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123595300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testbed for implementation of advanced IT Participation 实现高级IT参与的测试平台
Pub Date : 1900-01-01 DOI: 10.11610/isij.0611
A. Nachev
{"title":"Testbed for implementation of advanced IT Participation","authors":"A. Nachev","doi":"10.11610/isij.0611","DOIUrl":"https://doi.org/10.11610/isij.0611","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123769690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Classroom to Online Teaching – A Case during COVID19 从课堂到网络教学——covid - 19期间的一个案例
Pub Date : 1900-01-01 DOI: 10.11610/isij.4620
Harri Ruoslahti
The Covid19-virus outbreak during the spring of 2020 forced many changes in work, life and society Laurea University of Applied Sciences (Laurea) closed all of its six campuses on March 9, 2020, and all teaching activities were transferred to online communication and learning platforms such as Zoom, Teams and Optima This article presents qualitative case study research Six teachers of Laurea University of Applied Sciences wrote short narratives of their experiences in moving from classroom to online teaching The narratives were analysed, and the results grouped under relevant themes: Level of Preparation, Challenges and Risks, and Student Feedback and New ways of Work The transition from classroom to online teaching was relatively easy for the respondents The main reason was that the program already had created extensive online content and could be used for a fast transition The contribution of this article is in presenting one practical case of rapid transition from classroom to online learning
2020年春季新冠肺炎疫情的爆发,迫使工作、生活和社会发生了许多变化。2020年3月9日,劳瑞尔应用科技大学(劳瑞尔)关闭了全部六个校区,所有教学活动转移到Zoom、本文采用定性案例研究的方法,对Laurea应用科学大学的6位教师从课堂教学转向网络教学的经历进行了简短的叙述,并对叙述进行了分析,并将结果按相关主题进行了分组:准备水平、挑战和风险、学生反馈和新的工作方式从课堂教学到在线教学的过渡对受访者来说相对容易,主要原因是该计划已经创建了广泛的在线内容,可以用于快速过渡。本文的贡献在于提供了一个从课堂到在线学习快速过渡的实际案例
{"title":"From Classroom to Online Teaching – A Case during COVID19","authors":"Harri Ruoslahti","doi":"10.11610/isij.4620","DOIUrl":"https://doi.org/10.11610/isij.4620","url":null,"abstract":"The Covid19-virus outbreak during the spring of 2020 forced many changes in work, life and society Laurea University of Applied Sciences (Laurea) closed all of its six campuses on March 9, 2020, and all teaching activities were transferred to online communication and learning platforms such as Zoom, Teams and Optima This article presents qualitative case study research Six teachers of Laurea University of Applied Sciences wrote short narratives of their experiences in moving from classroom to online teaching The narratives were analysed, and the results grouped under relevant themes: Level of Preparation, Challenges and Risks, and Student Feedback and New ways of Work The transition from classroom to online teaching was relatively easy for the respondents The main reason was that the program already had created extensive online content and could be used for a fast transition The contribution of this article is in presenting one practical case of rapid transition from classroom to online learning","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Necessity to Create a National Processing Centre 论建立国家加工中心的必要性
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2821
A. Biryukov, O. Gordieiev, O. Yakimenko
The wide spread of Visa and Master Card international payment systems and the absence of a national processing centre in Ukraine adversely affect the development of the country’s banking system and cause further problems. This article gives a brief description of the problems and suggests measures towards their solution.
Visa和Master Card国际支付系统的广泛使用以及乌克兰缺乏国家处理中心对该国银行系统的发展产生了不利影响,并造成了进一步的问题。本文对这些问题进行了简要的描述,并提出了解决这些问题的措施。
{"title":"On the Necessity to Create a National Processing Centre","authors":"A. Biryukov, O. Gordieiev, O. Yakimenko","doi":"10.11610/ISIJ.2821","DOIUrl":"https://doi.org/10.11610/ISIJ.2821","url":null,"abstract":"The wide spread of Visa and Master Card international payment systems and the absence of a national processing centre in Ukraine adversely affect the development of the country’s banking system and cause further problems. This article gives a brief description of the problems and suggests measures towards their solution.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Modeling and Simulation to Enhance National and Multi-National Cooperation 应用建模和仿真来加强国家和多国合作
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0301
Roland J. Ronald
The article presents case studies and practical applications enabling the readers to learn about military simulations and how they are used in defense and crisis management. It is the first in a series that will describe the application of modeling and simulation to enhance country-to-country, agency-to-agency and coalition-to-coalition cooperation and understanding and provides information on the availability of M&S applications, their potential benefits and associated cost. The content is relative to company news – updating the reader on the latest developments in the military simulation and training industry and assisting in developing a hypothetical plan for the implementation and use of various M&S applications. The coverage focus is generally on the command laboratory simulation but is defined in the context of crisis management center concepts. HLA and Beyond: Interoperability Challenges Judith Dahmann, Marnie Salisbury, Phil Barry Chris Turrell and Paul Blemberg
本文介绍了案例研究和实际应用,使读者能够了解军事模拟以及如何在国防和危机管理中使用它们。这是第一个系列,将描述建模和仿真的应用,以加强国家对国家、机构对机构和联盟对联盟的合作和理解,并提供关于M&S应用的可用性、其潜在效益和相关成本的信息。内容与公司新闻有关,向读者介绍军事模拟和训练行业的最新发展,并协助制定实施和使用各种M&S应用程序的假设计划。报道的重点通常是指挥实验室模拟,但在危机管理中心概念的背景下定义。HLA和超越:互操作性挑战Judith Dahmann, Marnie Salisbury, Phil Barry Chris Turrell和Paul Blemberg
{"title":"Applying Modeling and Simulation to Enhance National and Multi-National Cooperation","authors":"Roland J. Ronald","doi":"10.11610/ISIJ.0301","DOIUrl":"https://doi.org/10.11610/ISIJ.0301","url":null,"abstract":"The article presents case studies and practical applications enabling the readers to learn about military simulations and how they are used in defense and crisis management. It is the first in a series that will describe the application of modeling and simulation to enhance country-to-country, agency-to-agency and coalition-to-coalition cooperation and understanding and provides information on the availability of M&S applications, their potential benefits and associated cost. The content is relative to company news – updating the reader on the latest developments in the military simulation and training industry and assisting in developing a hypothetical plan for the implementation and use of various M&S applications. The coverage focus is generally on the command laboratory simulation but is defined in the context of crisis management center concepts. HLA and Beyond: Interoperability Challenges Judith Dahmann, Marnie Salisbury, Phil Barry Chris Turrell and Paul Blemberg","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IMoViS: A System for Mobile Visualization of Intrusion Detection Data 入侵检测数据的移动可视化系统
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1214
A. Sanna, C. Fornaro
Intrusion detection applications often produce large amount of data. The visualization of this information is a key task in order to allow the user to effectively detect attacks and intrusions. Information visualization is an important sub-discipline within the field of scientific visualization and focuses on visual mechanisms designed to communicate clearly to the user the structure of information and to facilitate the access to large data repositories. Information visualization helps people in dealing with all this information by taking advantage of the visual perception capabilities of the human being. By presenting the information in a more graphically oriented fashion, it is possible for the human brain to take advantage of its perceptual system in the initial information acquiring, rather than immediately relying entirely on the cognitive system. Some of the most important papers in the field are collected in a book. Information visualization algorithms require merging of data visualization methods, computer graphics solutions, and graphical interface design.
入侵检测应用通常会产生大量的数据。为了使用户能够有效地检测攻击和入侵,这些信息的可视化是一项关键任务。信息可视化是科学可视化领域的一个重要分支学科,它关注的是旨在向用户清楚地传达信息结构并促进对大型数据存储库的访问的可视化机制。信息可视化通过利用人类的视觉感知能力来帮助人们处理所有这些信息。通过以一种更加图形化的方式呈现信息,人类大脑有可能在最初的信息获取中利用其感知系统,而不是立即完全依赖于认知系统。这一领域一些最重要的论文汇集在一本书里。信息可视化算法需要合并数据可视化方法、计算机图形解决方案和图形界面设计。
{"title":"IMoViS: A System for Mobile Visualization of Intrusion Detection Data","authors":"A. Sanna, C. Fornaro","doi":"10.11610/ISIJ.1214","DOIUrl":"https://doi.org/10.11610/ISIJ.1214","url":null,"abstract":"Intrusion detection applications often produce large amount of data. The visualization of this information is a key task in order to allow the user to effectively detect attacks and intrusions. Information visualization is an important sub-discipline within the field of scientific visualization and focuses on visual mechanisms designed to communicate clearly to the user the structure of information and to facilitate the access to large data repositories. Information visualization helps people in dealing with all this information by taking advantage of the visual perception capabilities of the human being. By presenting the information in a more graphically oriented fashion, it is possible for the human brain to take advantage of its perceptual system in the initial information acquiring, rather than immediately relying entirely on the cognitive system. Some of the most important papers in the field are collected in a book. Information visualization algorithms require merging of data visualization methods, computer graphics solutions, and graphical interface design.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125421729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Naval Craft, Weapon and Sensor Systems 海军舰艇、武器和传感器系统
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1304
Lürssen Werft
The article provides an inside view on trends in technology of current and future naval construction programmes as seen by Lürssen, the German shipyard for naval vessels located in Bremen, Germany. The changing operational requirements recognised in many western European and overseas navies focus on a surface combatant such as a corvette-sized ship with advanced capabilities to meet the specific demands for littoral warfare operations. Based on these new requirements the article outlines technologies in current and future designs for Corvetteand Frigatesized ships. It includes different types of platforms together with their specific benefits and capabilities for the intended employment in littoral warfare. In addition, measures to reduce the ship’s signatures for enhanced survivability are broadly discussed. With respect to adequate sea-keeping, manoeuvrability, speed and endurance (properties) in the littoral environment, the article also expands on the development and characteristics of new propulsion systems emphasising the overall need for a high degree of automation in all system components. The discussion on modern combat system technology once again underlines the need for a modular and flexible system design with open system architecture. The highest possible level of system automation reducing the number of personnel in the CIC and ensuring immediate reaction in a threat scenario is a further topic. Full integration of all sensors and weapons coupled with proven operational software is the essential technical requirement in this context. Finally, the article comments on some economical aspects of current building philosophies touching thereby on possibilities for crew reduction, costs reduction, potential capabilities for midlife refit, and growth potential. The overall issue of ―Transforming the Bulgarian Navy‖ is aimed at a permanent adaptation of Bulgarian Naval Forces to achieve high performance standards and combat effectiveness to meet the requirements of maritime warfare in the 21 st century including those of interoperability and joint forces operations. This article on ―Technologies for Advanced Naval Capabilities‖ has been developed from a leading modern shipyard’s point of view, based on some essential convictions:  A glance at trends of technologies in current and future naval construction programmes will show that evolution in modern shipbuilding has not come to an end and is continuing; Naval Craft, Weapon and Sensor Systems 52  Changing operational requirements for surface combatants due to the current global threat perception are demanding that these new technologies are integrated into combat ships of the future;  The most important aspect driving future shipbuilding programmes worldwide will be the overall requirement for the vessels’ littoral warfare capability and effectiveness to counter asymmetric attacks;  Procurement programmes will increasingly be ruled by nations’ restricted defence budgets. Background of L
本文提供了位于德国不来梅的德国海军舰艇造船厂l rssen所看到的当前和未来海军建造计划技术趋势的内部观点。许多西欧和海外海军认识到,不断变化的作战需求集中在水面作战舰艇上,如轻型护卫舰大小的舰艇,具有先进的能力,以满足沿海作战的具体需求。基于这些新要求,文章概述了当前和未来轻护舰和护卫舰设计中的技术。它包括不同类型的平台,以及它们在沿海战争中预期使用的特定优势和能力。此外,还广泛讨论了降低舰船特征以提高生存能力的措施。关于在沿海环境中足够的耐海性、机动性、速度和续航力(性能),文章还扩展了新推进系统的发展和特点,强调了所有系统组件高度自动化的总体需求。对现代作战系统技术的讨论再次强调了采用开放式系统架构进行模块化和柔性系统设计的必要性。尽可能提高系统自动化水平,减少CIC人员数量,并确保在威胁场景中立即做出反应,这是一个进一步的主题。在这种情况下,所有传感器和武器的全面集成以及经过验证的操作软件是基本的技术要求。最后,本文对当前建筑理念的一些经济方面进行了评论,从而触及了人员减少、成本降低、中年改装的潜在能力和增长潜力的可能性。“改造保加利亚海军”的总体问题旨在永久适应保加利亚海军部队,以实现高性能标准和战斗力,以满足21世纪海上战争的要求,包括互操作性和联合部队作战。这篇关于“先进海军能力技术”的文章是从一个领先的现代造船厂的角度出发,基于一些基本信念:·对当前和未来海军建设计划的技术趋势的一瞥将表明,现代造船的发展尚未结束,而且还在继续;由于当前的全球威胁感知,水面战斗人员的作战需求不断变化,要求将这些新技术集成到未来的战斗舰艇中;•推动全球未来造船计划的最重要方面将是对船舶濒海作战能力和对抗不对称攻击的有效性的总体要求;采购项目将越来越多地由各国有限的国防预算决定。LÜRSSEN Fr. lrssen Werft (LÜRSSEN)位于德国不来梅,在为德国海军和世界海军建造先进和高质量的创新船只方面取得了非凡的成功记录。LÜRSSEN已经获得了世界范围内的声誉,特别是从快速攻击艇(FAC),直升机轻型护卫舰,舰队支援舰和水雷对抗(MCM)船的建设计划。LÜRSSEN的整体高科技形象标志着许多“世界第一”的技术创新,例如:·半排水量船体的发展,现在形成了所有现代快速巡逻艇(FPB)和FAC设计的基础;建造第一艘1000吨以下的轻型直升机护卫舰,包括飞行甲板和机库;•在小型护卫舰上安装和集成首个CIWS门将;•将首个点防御导弹系统(PDMS)集成到fpb和其他水面战舰上;开发第一个完全可操作的遥控扫雷系统。在过去的几十年里,LÜRSSEN已经增加了产品范围,甚至包括招标和舰队支援船,如德国海军舰艇柏林,其长度超过170米,排水量为20,000吨。LÜRSSEN也完全参与生产德国护卫舰,124型。目前,LÜRSSEN与另外两家德国造船厂合作设计并建造了德国海军轻型护卫舰,130型(见图1)。Fr. lrssen Werft 53未来海军舰艇的新作战要求今天,德国和欧洲的海军造船业受到许多沿海地区国家新作战要求的特别挑战。对成熟技术的快速转化和开发更先进的新作战能力技术的需求是由神奇的术语“濒海作战”驱动的
{"title":"Naval Craft, Weapon and Sensor Systems","authors":"Lürssen Werft","doi":"10.11610/ISIJ.1304","DOIUrl":"https://doi.org/10.11610/ISIJ.1304","url":null,"abstract":"The article provides an inside view on trends in technology of current and future naval construction programmes as seen by Lürssen, the German shipyard for naval vessels located in Bremen, Germany. The changing operational requirements recognised in many western European and overseas navies focus on a surface combatant such as a corvette-sized ship with advanced capabilities to meet the specific demands for littoral warfare operations. Based on these new requirements the article outlines technologies in current and future designs for Corvetteand Frigatesized ships. It includes different types of platforms together with their specific benefits and capabilities for the intended employment in littoral warfare. In addition, measures to reduce the ship’s signatures for enhanced survivability are broadly discussed. With respect to adequate sea-keeping, manoeuvrability, speed and endurance (properties) in the littoral environment, the article also expands on the development and characteristics of new propulsion systems emphasising the overall need for a high degree of automation in all system components. The discussion on modern combat system technology once again underlines the need for a modular and flexible system design with open system architecture. The highest possible level of system automation reducing the number of personnel in the CIC and ensuring immediate reaction in a threat scenario is a further topic. Full integration of all sensors and weapons coupled with proven operational software is the essential technical requirement in this context. Finally, the article comments on some economical aspects of current building philosophies touching thereby on possibilities for crew reduction, costs reduction, potential capabilities for midlife refit, and growth potential. The overall issue of ―Transforming the Bulgarian Navy‖ is aimed at a permanent adaptation of Bulgarian Naval Forces to achieve high performance standards and combat effectiveness to meet the requirements of maritime warfare in the 21 st century including those of interoperability and joint forces operations. This article on ―Technologies for Advanced Naval Capabilities‖ has been developed from a leading modern shipyard’s point of view, based on some essential convictions:  A glance at trends of technologies in current and future naval construction programmes will show that evolution in modern shipbuilding has not come to an end and is continuing; Naval Craft, Weapon and Sensor Systems 52  Changing operational requirements for surface combatants due to the current global threat perception are demanding that these new technologies are integrated into combat ships of the future;  The most important aspect driving future shipbuilding programmes worldwide will be the overall requirement for the vessels’ littoral warfare capability and effectiveness to counter asymmetric attacks;  Procurement programmes will increasingly be ruled by nations’ restricted defence budgets. Background of L","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125557345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Validation Of Metamodels For Intelligent Agents In Conflict 冲突智能体元模型的实验验证
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1205
James Moffat, S. Witty
As discussed in a previous paper, we are attempting to develop mathematical ‘metamodels’ of agent-based simulation models. These meta-models fall within the area of what is loosely referred to as complexity theory, and exploit the mathematical approaches which are being developed to gain understanding of natural non-linear systems (such as ecosystems of species, or the physics of spin systems). Such an approach is most likely to be relevant to future command and control structures such as Network Centric Warfare. In particular, Moffat discusses in detail the connection between the mathematics of complexity and the likely emergent behaviour of future command and control driven ‘Information Age’ conflict.
正如在之前的一篇论文中所讨论的,我们正试图开发基于智能体的仿真模型的数学“元模型”。这些元模型属于被宽泛地称为复杂性理论的领域,并利用正在开发的数学方法来理解自然非线性系统(如物种生态系统或自旋系统的物理学)。这种方法最有可能与未来的指挥和控制结构相关,例如网络中心战。特别是,莫法特详细讨论了复杂性的数学与未来指挥和控制驱动的“信息时代”冲突的可能的紧急行为之间的联系。
{"title":"Experimental Validation Of Metamodels For Intelligent Agents In Conflict","authors":"James Moffat, S. Witty","doi":"10.11610/ISIJ.1205","DOIUrl":"https://doi.org/10.11610/ISIJ.1205","url":null,"abstract":"As discussed in a previous paper, we are attempting to develop mathematical ‘metamodels’ of agent-based simulation models. These meta-models fall within the area of what is loosely referred to as complexity theory, and exploit the mathematical approaches which are being developed to gain understanding of natural non-linear systems (such as ecosystems of species, or the physics of spin systems). Such an approach is most likely to be relevant to future command and control structures such as Network Centric Warfare. In particular, Moffat discusses in detail the connection between the mathematics of complexity and the likely emergent behaviour of future command and control driven ‘Information Age’ conflict.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Information & Security: An International Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1