首页 > 最新文献

Information & Security: An International Journal最新文献

英文 中文
Multi-agent systems in defense and security: Research projects, systems, and software tools 国防和安全中的多代理系统:研究项目、系统和软件工具
Pub Date : 1900-01-01 DOI: 10.11610/isij.0806
I. Monitor
{"title":"Multi-agent systems in defense and security: Research projects, systems, and software tools","authors":"I. Monitor","doi":"10.11610/isij.0806","DOIUrl":"https://doi.org/10.11610/isij.0806","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training 基于imeca的私有通信安全评估技术:技术与培训
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3505
I. Androulidakis, V. Kharchenko, Andriy Kovalenko
Nowadays, almost everywhere, there are a huge number of privately owned telephone exchanges that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the public telephone network. Such communications cover most vital infrastructures, including hospitals, ministries, police, army, banks, public bodies/authorities, companies, industries and so on. The purpose of this paper is to raise awareness in regards to security and privacy threats present in private communications, helping both users and vendors safeguard their systems. This article provides an introduction to private branch exchanges (PBXs) and private communications, and a review of relevant threats and vulnerabilities. Finally, one possible approach to assessment of private communications security is presented, along with appropriate taxonomies. Such approach relies on performing gap analysis and is based on the IMECA technique.
如今,几乎到处都有大量私人拥有的电话交换机,它们服务于私人或公共实体的通信需求,在内部电话之间进行连接,并将它们与公共电话网中的其他用户连接起来。这种通信覆盖最重要的基础设施,包括医院、部委、警察、军队、银行、公共机构/当局、公司、工业等等。本文的目的是提高人们对私有通信中存在的安全和隐私威胁的认识,帮助用户和供应商保护他们的系统。本文介绍了私有分支交换机(pbx)和私有通信,并回顾了相关的威胁和漏洞。最后,提出了一种评估私有通信安全性的可能方法,以及适当的分类法。这种方法依赖于执行差距分析,并基于IMECA技术。
{"title":"Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training","authors":"I. Androulidakis, V. Kharchenko, Andriy Kovalenko","doi":"10.11610/ISIJ.3505","DOIUrl":"https://doi.org/10.11610/ISIJ.3505","url":null,"abstract":"Nowadays, almost everywhere, there are a huge number of privately owned telephone exchanges that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the public telephone network. Such communications cover most vital infrastructures, including hospitals, ministries, police, army, banks, public bodies/authorities, companies, industries and so on. The purpose of this paper is to raise awareness in regards to security and privacy threats present in private communications, helping both users and vendors safeguard their systems. This article provides an introduction to private branch exchanges (PBXs) and private communications, and a review of relevant threats and vulnerabilities. Finally, one possible approach to assessment of private communications security is presented, along with appropriate taxonomies. Such approach relies on performing gap analysis and is based on the IMECA technique.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124061894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas 蒂莫西·托马斯作品中俄美信息战观的比较分析
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0108
T. Tagarev
{"title":"The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas","authors":"T. Tagarev","doi":"10.11610/ISIJ.0108","DOIUrl":"https://doi.org/10.11610/ISIJ.0108","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128085705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide 互联网、公民社会与全球治理:数字鸿沟中被忽视的政治维度
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0703
D. Zinnbauer
The catchphrase of the “digital divide” has evolved into a central point of reference for policymakers and IT practitioners alike. It provides an imaginative shorthand for the multiple imbalances that characterize the diffusion of novel information and communication technologies (ICTs) along income, gender, age and many other socioeconomic categories. The numbers are well-known and widely published:
“数字鸿沟”这一流行语已经演变为政策制定者和IT从业者的中心参考点。它为新型信息通信技术(ict)在收入、性别、年龄和许多其他社会经济类别中传播的多重不平衡提供了一种富有想象力的简写。这些数字是众所周知的,并被广泛发表:
{"title":"Internet, Civil Society and Global Governance: The Neglected Political Dimension of the Digital Divide","authors":"D. Zinnbauer","doi":"10.11610/ISIJ.0703","DOIUrl":"https://doi.org/10.11610/ISIJ.0703","url":null,"abstract":"The catchphrase of the “digital divide” has evolved into a central point of reference for policymakers and IT practitioners alike. It provides an imaginative shorthand for the multiple imbalances that characterize the diffusion of novel information and communication technologies (ICTs) along income, gender, age and many other socioeconomic categories. The numbers are well-known and widely published:","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
How to Counter Hybrid Threats 如何应对混合威胁
Pub Date : 1900-01-01 DOI: 10.11610/isij.3909
L. Monov, M. Karev
This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.
本文介绍了网络环境,揭示了混合威胁的一些方面,应对混合威胁的决策过程以及处理该问题的三种可能选择。为了发现可能的混合行动,我们需要一种考虑国家利益以及主要趋势和威胁以及弱点和影响的方法。这种方法的实施将提供充分的数据和资料来支持各项决定,在综合战略办法中考虑到所有权力手段。
{"title":"How to Counter Hybrid Threats","authors":"L. Monov, M. Karev","doi":"10.11610/isij.3909","DOIUrl":"https://doi.org/10.11610/isij.3909","url":null,"abstract":"This article introduces the network context and reveals some aspects of the hybrid threats, the decision-making process to counter hybrid threats and three possible options to handle that issue. In order to discover possible hybrid actions, we need a methodology that considers national interests along with major trends and threats as well as weaknesses and impacts. The implementation of such methodology will provide sufficient data and information to support decisions, accounting for all instruments of power in an integrated strategic approach.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125253993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Government PKI Deployment and Usage in Taiwan 政府PKI在台湾的部署与使用
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1503
C. Ou, C. Ho, Hwai-Ling Shan
The ongoing e-Government Program in Taiwan started in 1997. It is based on the Government Service Network, which is the backbone infrastructure of the network transaction environment. During the first phase of this program in 1998, Taiwan established its first Certification Authority, namely, the Government Certification Authority (GCA), and this launched the electronic certification services in Taiwan. From 2001 to 2004, the Government Public Key Infrastructure (GPKI) has been established according to the planning set forth in the e-Government Program with the aim of strengthening electronic government infrastructure and establishing electronic certification and security applications for executive administration. Besides GPKI applications, PKI interoperability has become a major issue in Taiwan recently. Several interoperability schemes, such as strict hierarchy and Bridge Certificate Authority (BCA), have been deployed in different PKI domains. To achieve global PKI interoperability in Taiwan, BCA is being adapted as a major CA-CA interoperability engine, which will ensure trusted relationships between the different PKI domains.
台湾正在进行的电子政府计划始于1997年。它是基于政务服务网的,政务服务网是网络交易环境的骨干基础设施。1998年第一阶段,台湾成立了第一个核证机关,即政府核证机关(GCA),开启了台湾的电子核证服务。2001年至2004年,政府根据电子政府计划的规划,建立了政府公开密码匙基础设施(GPKI),目的是加强电子政府基础设施,建立行政管理的电子认证和安全应用。除了GPKI的应用外,PKI的互操作性也成为台湾近年来的主要议题。在不同的PKI域中,已经部署了严格层次结构和桥接证书颁发机构(BCA)等多种互操作性方案。为了在台湾实现全球PKI互操作性,BCA正在被调整为主要的CA-CA互操作性引擎,这将确保不同PKI域之间的信任关系。
{"title":"Government PKI Deployment and Usage in Taiwan","authors":"C. Ou, C. Ho, Hwai-Ling Shan","doi":"10.11610/ISIJ.1503","DOIUrl":"https://doi.org/10.11610/ISIJ.1503","url":null,"abstract":"The ongoing e-Government Program in Taiwan started in 1997. It is based on the Government Service Network, which is the backbone infrastructure of the network transaction environment. During the first phase of this program in 1998, Taiwan established its first Certification Authority, namely, the Government Certification Authority (GCA), and this launched the electronic certification services in Taiwan. From 2001 to 2004, the Government Public Key Infrastructure (GPKI) has been established according to the planning set forth in the e-Government Program with the aim of strengthening electronic government infrastructure and establishing electronic certification and security applications for executive administration. Besides GPKI applications, PKI interoperability has become a major issue in Taiwan recently. Several interoperability schemes, such as strict hierarchy and Bridge Certificate Authority (BCA), have been deployed in different PKI domains. To achieve global PKI interoperability in Taiwan, BCA is being adapted as a major CA-CA interoperability engine, which will ensure trusted relationships between the different PKI domains.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125634803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Steganographic Algorithm for Hiding Messages in Music 一种隐藏音乐信息的隐写算法
Pub Date : 1900-01-01 DOI: 10.11610/isij.4718
M. Bajor, M. Niemiec
Steganography in audio files usually revolves around well-known concepts and algorithms, least significant bit algorithm to name one. This paper proposes a new, alternative approach where steganographic information is connected with the medium even more – by using the medium itself as the information. The goal of this paper is to present a new aspect of steganography, which utilizes machine learning. This form of steganography may produce statistically indeterminable steganographic files which are immune to brute force attempts at trying to retrieve the hidden messages. Then the proposed solution is verified against statistical analysis and brute force attacks with promising results. A R T I C L E I N F O : RECEIVED: 04 JUNE 2020 REVISED: 24 AUG 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : steganography, audio, MIDI format, machine learning Creative Commons BY-NC 4.0
音频文件中的隐写术通常围绕着众所周知的概念和算法,最低有效位算法就是其中之一。本文提出了一种新的替代方法,通过使用媒介本身作为信息,将隐写信息与媒介联系得更加紧密。本文的目标是介绍利用机器学习的隐写术的一个新方面。这种形式的隐写可能产生统计上无法确定的隐写文件,这些文件在试图检索隐藏信息时不受暴力破解的影响。通过统计分析和蛮力攻击验证了该方案的有效性。A R T I C L EI N F O:收稿日期:2020年6月4日修正值:2020年8月24日在线日期:2020年9月22日K E Y W O R D S:隐写,音频,MIDI格式,机器学习创作共用BY-NC 4.0
{"title":"A New Steganographic Algorithm for Hiding Messages in Music","authors":"M. Bajor, M. Niemiec","doi":"10.11610/isij.4718","DOIUrl":"https://doi.org/10.11610/isij.4718","url":null,"abstract":"Steganography in audio files usually revolves around well-known concepts and algorithms, least significant bit algorithm to name one. This paper proposes a new, alternative approach where steganographic information is connected with the medium even more – by using the medium itself as the information. The goal of this paper is to present a new aspect of steganography, which utilizes machine learning. This form of steganography may produce statistically indeterminable steganographic files which are immune to brute force attempts at trying to retrieve the hidden messages. Then the proposed solution is verified against statistical analysis and brute force attacks with promising results. A R T I C L E I N F O : RECEIVED: 04 JUNE 2020 REVISED: 24 AUG 2020 ONLINE: 22 SEP 2020 K E Y W O R D S : steganography, audio, MIDI format, machine learning Creative Commons BY-NC 4.0","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134515668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues 基于面向服务体系结构的智能信息系统:安全问题综述
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2710
Jugoslav Achkoski, Metodija Dojchinovski, V. Trajkovik
Security is an important requirement for a service-oriented architecture (SOA), since SOA in principle considers services spread widely on different locations and diverse operational platforms. The main challenge for SOA security still drifts around ‘clouds’ and there is still a lack of suitable frameworks for security models based on consistent and convenient methods. In this paper, we propose security solutions for an Intelligence Information System completely based on SOA. Contemporary security architectures and security protocols are still evolving. SOA-based systems are characterized with differences in security implementation as encryption, access control, security monitoring, security management through disparate domains etc. Domains have services as endpoints in the information systems, which usually form composite services. The workflow which is established through composite services is extending on different endpoints in different domains. The paper’s main aim is to provide a contribution in developing suitable security solutions to Intelligence Information Systems using web service security standards in order to reach appropriate level of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more. The paper reflects an approach in which useful information provided by the services is sent out directly from the creators of information to the consumers of information. We introduce security and logging system that can be used as verification and validation middleware
安全性是面向服务的体系结构(SOA)的一个重要需求,因为SOA原则上考虑广泛分布在不同位置和不同操作平台上的服务。SOA安全的主要挑战仍然围绕着“云”,并且仍然缺乏基于一致和方便方法的安全模型的合适框架。本文提出了一个完全基于SOA的智能信息系统的安全解决方案。当代安全体系结构和安全协议仍在不断发展。基于soa的系统在安全实现方面具有不同的特点,如加密、访问控制、安全监控、通过不同域进行安全管理等。域将服务作为信息系统中的端点,这些服务通常形成组合服务。通过组合服务建立的工作流在不同领域的不同端点上进行扩展。本文的主要目的是为使用web服务安全标准的智能信息系统开发合适的安全解决方案提供贡献,以达到考虑认证,授权,隐私,完整性,信任,联邦身份,机密性等的适当级别的信息安全。这篇论文反映了一种方法,在这种方法中,服务提供的有用信息直接从信息的创造者发送给信息的消费者。介绍了可作为验证和确认中间件的安全系统和日志系统
{"title":"An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues","authors":"Jugoslav Achkoski, Metodija Dojchinovski, V. Trajkovik","doi":"10.11610/ISIJ.2710","DOIUrl":"https://doi.org/10.11610/ISIJ.2710","url":null,"abstract":"Security is an important requirement for a service-oriented architecture (SOA), since SOA in principle considers services spread widely on different locations and diverse operational platforms. The main challenge for SOA security still drifts around ‘clouds’ and there is still a lack of suitable frameworks for security models based on consistent and convenient methods. In this paper, we propose security solutions for an Intelligence Information System completely based on SOA. Contemporary security architectures and security protocols are still evolving. SOA-based systems are characterized with differences in security implementation as encryption, access control, security monitoring, security management through disparate domains etc. Domains have services as endpoints in the information systems, which usually form composite services. The workflow which is established through composite services is extending on different endpoints in different domains. The paper’s main aim is to provide a contribution in developing suitable security solutions to Intelligence Information Systems using web service security standards in order to reach appropriate level of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more. The paper reflects an approach in which useful information provided by the services is sent out directly from the creators of information to the consumers of information. We introduce security and logging system that can be used as verification and validation middleware","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack 在勒索软件攻击期间观察、测量和收集物理机器上的硬盘性能指标
Pub Date : 1900-01-01 DOI: 10.11610/isij.4723
Dimo Dimov, Yuliyan Tsonev
Ransomware is a type of malicious activity aiming to prevent users from accessing their data by encrypting it. For the purposes of analysis of the behaviour of the crypto viruses, objectively collected data is required. Getting metrics from a virtual machine would be resembling the original behaviour of the ransomware on a physical device. Observing, measuring, collecting and extracting data on a physical device during and after encryption is challenging, since all the data would be corrupted once the encryption process is complete. By utilizing two user profiles, members of the local admin group and custom access control lists on certain recourse, a lab laptop is infected with five different samples of ransomware crypto viruses that do not require connection to the command and control server in order to function as intended. A data set of HDD metrics is successfully collected and extracted. A R T I C L E I N F O : RECEIVED: 28 APR 2020 REVISED: 16 MAY 2020 ONLINE: 18 MAY 2020 K E Y W O R D S : measurement, extraction, ransomware, encryption, malware, malicious, cybersecurity Creative Commons BY-NC 4.0
勒索软件是一种恶意活动,旨在通过加密来阻止用户访问他们的数据。为了分析加密病毒的行为,需要客观地收集数据。从虚拟机获取指标将类似于勒索软件在物理设备上的原始行为。在加密期间和之后,在物理设备上观察、测量、收集和提取数据是具有挑战性的,因为一旦加密过程完成,所有数据都会损坏。通过使用两个用户配置文件、本地管理组成员和特定资源上的自定义访问控制列表,一台实验室笔记本电脑感染了五种不同的勒索软件加密病毒样本,这些病毒不需要连接到命令和控制服务器就可以按预期运行。成功地收集并提取了HDD指标的数据集。A R T I C L EI N F O:收稿日期:2020年4月28日修订日期:2020年5月16日在线日期:2020年5月18日K E Y O O R D S:测量、提取、勒索软件、加密、恶意软件、恶意软件、网络安全Creative Commons BY-NC 4.0
{"title":"Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack","authors":"Dimo Dimov, Yuliyan Tsonev","doi":"10.11610/isij.4723","DOIUrl":"https://doi.org/10.11610/isij.4723","url":null,"abstract":"Ransomware is a type of malicious activity aiming to prevent users from accessing their data by encrypting it. For the purposes of analysis of the behaviour of the crypto viruses, objectively collected data is required. Getting metrics from a virtual machine would be resembling the original behaviour of the ransomware on a physical device. Observing, measuring, collecting and extracting data on a physical device during and after encryption is challenging, since all the data would be corrupted once the encryption process is complete. By utilizing two user profiles, members of the local admin group and custom access control lists on certain recourse, a lab laptop is infected with five different samples of ransomware crypto viruses that do not require connection to the command and control server in order to function as intended. A data set of HDD metrics is successfully collected and extracted. A R T I C L E I N F O : RECEIVED: 28 APR 2020 REVISED: 16 MAY 2020 ONLINE: 18 MAY 2020 K E Y W O R D S : measurement, extraction, ransomware, encryption, malware, malicious, cybersecurity Creative Commons BY-NC 4.0","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Terrain Reasoning Algorithm for Defending a Fire Zone 火区防御的地形推理算法
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0304
Mikel D. Petty, R. Franceschini, A. Mukherjee
Distributed simulation is an approach to building large-scale simulation models from a set of independent simulator nodes communicating via a network. The simulator nodes each independently simulate the activities of one or more entities in the simulated world and report the attributes (e.g., location and velocity) and actions (e.g., weapons firing) of those entities via the network to the other simulator nodes using a pre-defined communications protocol. In a typical distributed simulation, the simulated entities coexist in a common simulated environment and can interact with each other; their interactions are realized via the exchange of messages in the protocol.
分布式仿真是一种从一组通过网络通信的独立仿真器节点构建大规模仿真模型的方法。每个模拟器节点独立地模拟模拟世界中一个或多个实体的活动,并使用预定义的通信协议通过网络向其他模拟器节点报告这些实体的属性(例如,位置和速度)和动作(例如,武器发射)。在典型的分布式仿真中,仿真实体共存于一个共同的仿真环境中,并且可以相互交互;它们的交互是通过协议中的消息交换来实现的。
{"title":"A Terrain Reasoning Algorithm for Defending a Fire Zone","authors":"Mikel D. Petty, R. Franceschini, A. Mukherjee","doi":"10.11610/ISIJ.0304","DOIUrl":"https://doi.org/10.11610/ISIJ.0304","url":null,"abstract":"Distributed simulation is an approach to building large-scale simulation models from a set of independent simulator nodes communicating via a network. The simulator nodes each independently simulate the activities of one or more entities in the simulated world and report the attributes (e.g., location and velocity) and actions (e.g., weapons firing) of those entities via the network to the other simulator nodes using a pre-defined communications protocol. In a typical distributed simulation, the simulated entities coexist in a common simulated environment and can interact with each other; their interactions are realized via the exchange of messages in the protocol.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131143312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information & Security: An International Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1