首页 > 最新文献

Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS最新文献

英文 中文
Impact analysis for cyber defense optimization 网络防御优化影响分析
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2023-01-01 DOI: 10.1177/15485129221149380
S. Noel
{"title":"Impact analysis for cyber defense optimization","authors":"S. Noel","doi":"10.1177/15485129221149380","DOIUrl":"https://doi.org/10.1177/15485129221149380","url":null,"abstract":"","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"10 1","pages":"39 - 39"},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73648762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimental intervention to investigate user perceptions of computer versus manual board wargame 一个实验干预调查用户的感知电脑与手动棋盘战争游戏
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2023-01-01 DOI: 10.1177/15485129221141711
Jeremy Smith, T. Ringrose, S. Barker
Analysis of the literature related to wargaming identifies a requirement for the perception of immersion and engagement in wargaming. The references generally indicate that the computer is less able to facilitate collective engagement than a manual system; however, there is as yet little empirical evidence to support this. There are also suggestions that players perceive manual games differently to a computer wargame. An experiment, derived from the previous analysis, was performed to address the research question: Is there a discernible difference between the levels of players’ engagement in computer wargames versus manual wargames? The experiment provides empirical evidence that there is a difference in players’ engagement with a computer wargame compared to a manual game, in particular with the manual game providing greater engagement with other players. Hence, if engagement between players is to be encouraged and regarded as an important aspect of a wargame for defense applications, then this provides evidence that the manual approach can indeed be better.
对兵棋推演相关文献的分析表明,兵棋推演需要沉浸感和参与感。参考文献一般表明,与人工系统相比,计算机不太能够促进集体参与;然而,目前几乎没有经验证据支持这一观点。还有人认为玩家对手动游戏的理解与电脑战争游戏不同。根据之前的分析,我们进行了一个实验来解决这个研究问题:玩家在电脑战争游戏和手动战争游戏中的参与度是否存在明显的差异?该实验提供了经验证据,表明玩家对电脑战争游戏的粘性与手动游戏存在差异,特别是手动游戏提供了与其他玩家更大的粘性。因此,如果玩家之间的互动是被鼓励的,并被视为防御类战争游戏的一个重要方面,那么这就证明了手动方法确实更好。
{"title":"An experimental intervention to investigate user perceptions of computer versus manual board wargame","authors":"Jeremy Smith, T. Ringrose, S. Barker","doi":"10.1177/15485129221141711","DOIUrl":"https://doi.org/10.1177/15485129221141711","url":null,"abstract":"Analysis of the literature related to wargaming identifies a requirement for the perception of immersion and engagement in wargaming. The references generally indicate that the computer is less able to facilitate collective engagement than a manual system; however, there is as yet little empirical evidence to support this. There are also suggestions that players perceive manual games differently to a computer wargame. An experiment, derived from the previous analysis, was performed to address the research question: Is there a discernible difference between the levels of players’ engagement in computer wargames versus manual wargames? The experiment provides empirical evidence that there is a difference in players’ engagement with a computer wargame compared to a manual game, in particular with the manual game providing greater engagement with other players. Hence, if engagement between players is to be encouraged and regarded as an important aspect of a wargame for defense applications, then this provides evidence that the manual approach can indeed be better.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"28 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81630027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of agent-based modeling to model intermediate force capabilities in (counter)mobility crowd scenarios 使用基于代理的建模来模拟(反)机动人群场景中的中间力量能力
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-12-05 DOI: 10.1177/15485129221141717
Jessica Afara, Victoria Ajila, Hannah Macdonell, P. Dobias
In this paper, we use an agent-based model (ABM) to run (counter)mobility scenarios to explore which characteristics of intermediate force capabilities (IFC) are relevant to these, and how they can affect outcomes in gray zone conflicts. Using an ABM called Map-Aware Non-Uniform Automata (MANA), developed by the New Zealand Defense Technology Agency, we implemented two scenarios where the friendly forces’ mobility was limited by large groups of civilians. Then, we employed data farming and analytics methods to analyze the data and identify key parameters influencing the outcomes. The main parameters appeared to be the IFC Range, Power (a measure of the duration of the effect), and Crowd Density. Future research could include a wide range of mobility scenarios and possibly a more detailed IFC representation.
在本文中,我们使用基于主体的模型(ABM)来运行(反)机动场景,以探索中间力量能力(IFC)的哪些特征与这些场景相关,以及它们如何影响灰色地带冲突的结果。使用新西兰国防技术局开发的一种名为地图感知非统一自动机(MANA)的反弹道导弹,我们实施了两种场景,其中友军的机动性受到大量平民的限制。然后,我们采用数据种植和分析方法对数据进行分析,找出影响结果的关键参数。主要参数似乎是IFC范围,功率(影响持续时间的度量)和人群密度。未来的研究可能包括更广泛的移动场景,可能还包括更详细的IFC表示。
{"title":"Use of agent-based modeling to model intermediate force capabilities in (counter)mobility crowd scenarios","authors":"Jessica Afara, Victoria Ajila, Hannah Macdonell, P. Dobias","doi":"10.1177/15485129221141717","DOIUrl":"https://doi.org/10.1177/15485129221141717","url":null,"abstract":"In this paper, we use an agent-based model (ABM) to run (counter)mobility scenarios to explore which characteristics of intermediate force capabilities (IFC) are relevant to these, and how they can affect outcomes in gray zone conflicts. Using an ABM called Map-Aware Non-Uniform Automata (MANA), developed by the New Zealand Defense Technology Agency, we implemented two scenarios where the friendly forces’ mobility was limited by large groups of civilians. Then, we employed data farming and analytics methods to analyze the data and identify key parameters influencing the outcomes. The main parameters appeared to be the IFC Range, Power (a measure of the duration of the effect), and Crowd Density. Future research could include a wide range of mobility scenarios and possibly a more detailed IFC representation.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"55 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82891525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verification, validation, and accreditation for models and simulations in the Australian defence context: a review 澳大利亚国防环境下模型和模拟的验证、验证和认证:综述
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-11-21 DOI: 10.1177/15485129221134632
Kerryn R. Owen, R. Chakrabortty
Building simulation models that are valid and credible is an enduring challenge in the Australian Defence Organisation (ADO) context. Establishing validity and credibility can be achieved through the rigorous use of appropriate Verification, Validation, and Accreditation (VVA) processes. Such processes are well-known in modeling and simulation (M&S) practice. However, these are generally not applied within the ADO, typically due to resourcing concerns and a lack of authoritative guidance. Even if there are any, due to security concerns and commercial reasons, the application of M&S within ADO is generally not published in open-access platforms. Depending on where in the M&S life-cycle VVA is started, it may also serve a secondary aim of risk reduction, assisting in the early discovery of possible problems or mistakes. This research reviews current VVA practices from academic literature and recommends processes that are appropriate for application to combat simulation tools within the ADO context. A scoping review has been conducted to gather insight into current VVA practice in the M&S community. The results of this review are presented in the form of charting relevant characteristics from selected references. The scoping review shows that executable validation of simulation results against referent data sourced from physical experiments is the most prevalent form of VVA, with referent data from comparative models being a prevalent alternative. Furthermore, there is evident reliance on graphical comparison of data; this could be enhanced with objective data comparators, such as aggregate error measures or statistical techniques. Finally, there is an evident gap in VVA references from Australia, which could be addressed through the propagation and reporting of prevalent VVA practices within the ADO context.
在澳大利亚国防组织(ADO)的背景下,建立有效和可信的仿真模型是一个持久的挑战。建立有效性和可信性可以通过严格使用适当的验证、确认和认可(VVA)过程来实现。这样的过程在建模和仿真(M&S)实践中是众所周知的。然而,这些通常不会在ADO内应用,这通常是由于资源问题和缺乏权威指导。即使有,出于安全考虑和商业原因,ADO内的M&S应用一般不会在开放访问平台上发布。根据玛莎百货生命周期中VVA的启动位置,它也可能服务于降低风险的次要目标,帮助早期发现可能的问题或错误。本研究从学术文献中回顾了当前的VVA实践,并推荐了适合于ADO上下文中战斗模拟工具应用的过程。已经进行了范围审查,以收集对M&S社区当前VVA实践的见解。本综述的结果以图表的形式从选定的参考文献的相关特征。范围审查表明,根据来自物理实验的参考数据对仿真结果进行可执行验证是VVA最普遍的形式,来自比较模型的参考数据是一种普遍的替代方案。此外,显然依赖于数据的图形比较;这可以用客观数据比较器来加强,例如汇总误差测量或统计技术。最后,来自澳大利亚的VVA参考存在明显的差距,这可以通过在ADO上下文中传播和报告流行的VVA实践来解决。
{"title":"Verification, validation, and accreditation for models and simulations in the Australian defence context: a review","authors":"Kerryn R. Owen, R. Chakrabortty","doi":"10.1177/15485129221134632","DOIUrl":"https://doi.org/10.1177/15485129221134632","url":null,"abstract":"Building simulation models that are valid and credible is an enduring challenge in the Australian Defence Organisation (ADO) context. Establishing validity and credibility can be achieved through the rigorous use of appropriate Verification, Validation, and Accreditation (VVA) processes. Such processes are well-known in modeling and simulation (M&S) practice. However, these are generally not applied within the ADO, typically due to resourcing concerns and a lack of authoritative guidance. Even if there are any, due to security concerns and commercial reasons, the application of M&S within ADO is generally not published in open-access platforms. Depending on where in the M&S life-cycle VVA is started, it may also serve a secondary aim of risk reduction, assisting in the early discovery of possible problems or mistakes. This research reviews current VVA practices from academic literature and recommends processes that are appropriate for application to combat simulation tools within the ADO context. A scoping review has been conducted to gather insight into current VVA practice in the M&S community. The results of this review are presented in the form of charting relevant characteristics from selected references. The scoping review shows that executable validation of simulation results against referent data sourced from physical experiments is the most prevalent form of VVA, with referent data from comparative models being a prevalent alternative. Furthermore, there is evident reliance on graphical comparison of data; this could be enhanced with objective data comparators, such as aggregate error measures or statistical techniques. Finally, there is an evident gap in VVA references from Australia, which could be addressed through the propagation and reporting of prevalent VVA practices within the ADO context.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"19 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90789557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wargaming: a structured conversation wg:结构化的对话
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-11-21 DOI: 10.1177/15485129221134530
Jeffrey A. Appleget
{"title":"Wargaming: a structured conversation","authors":"Jeffrey A. Appleget","doi":"10.1177/15485129221134530","DOIUrl":"https://doi.org/10.1177/15485129221134530","url":null,"abstract":"","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"36 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79894214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation analysis of applicant scheduling and processing alternatives at a military entrance processing station 某军事入口处理站申请人调度及处理方案仿真分析
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-11-14 DOI: 10.1177/15485129221134536
Phillip M. LaCasse, L. Champagne, Jonathan M Escamilla
Eligibility for enlistment into the US military is assessed by the United States Military Entrance Processing Command (USMEPCOM), an independent agency that reports to the Office of the Secretary of Defense (OSD) and not to any specific branch of military service. This research develops a discrete-event simulation for applicant processing operations at a Military Entrance Processing Station (MEPS) to investigate the viability of potential alternatives to the current applicant arrival and processing operation. Currently, all applicants arrive to the MEPS at the beginning of the processing day in a single batch. This research models and compares two alternatives with the status quo: split-shift processing, by which applicant arrivals occur in two batches: one at 06:00 and one at 11:00 and appointment-based processing, by which applicants may arrive during one of three, four, six, or eight appointment windows. Express-lane processing is also explored, in which applicants are allowed to bypass select processing stations. Experimental results indicate that split-shift processing is not viable under the current processing model due to an unacceptable decrease in applicant throughput. Results from appointment-based scenarios are mixed, with the critical factors being the time between appointment batches and their associated arrival times.
加入美国军队的资格是由美国军事入境处理司令部(USMEPCOM)评估的,这是一个独立的机构,向国防部长办公室(OSD)报告,而不是向任何特定的军事服务部门报告。本研究针对军事入境处理站(MEPS)的申请人处理操作开发了一个离散事件模拟,以调查当前申请人到达和处理操作的潜在替代方案的可行性。目前,所有申请人在处理日开始时都以单批方式到达MEPS。本研究对现状的两种选择进行了建模和比较:分班处理,申请人分两批到达:一批在06:00,另一批在11:00;基于预约的处理,申请人可以在三个、四个、六个或八个预约窗口中的一个到达。还探索了快速通道处理,允许申请人绕过选定的处理站。实验结果表明,由于申请人吞吐量的不可接受的下降,在当前的处理模型下,分班处理是不可行的。基于预约的场景的结果是混合的,关键因素是预约批次之间的时间和它们相关的到达时间。
{"title":"Simulation analysis of applicant scheduling and processing alternatives at a military entrance processing station","authors":"Phillip M. LaCasse, L. Champagne, Jonathan M Escamilla","doi":"10.1177/15485129221134536","DOIUrl":"https://doi.org/10.1177/15485129221134536","url":null,"abstract":"Eligibility for enlistment into the US military is assessed by the United States Military Entrance Processing Command (USMEPCOM), an independent agency that reports to the Office of the Secretary of Defense (OSD) and not to any specific branch of military service. This research develops a discrete-event simulation for applicant processing operations at a Military Entrance Processing Station (MEPS) to investigate the viability of potential alternatives to the current applicant arrival and processing operation. Currently, all applicants arrive to the MEPS at the beginning of the processing day in a single batch. This research models and compares two alternatives with the status quo: split-shift processing, by which applicant arrivals occur in two batches: one at 06:00 and one at 11:00 and appointment-based processing, by which applicants may arrive during one of three, four, six, or eight appointment windows. Express-lane processing is also explored, in which applicants are allowed to bypass select processing stations. Experimental results indicate that split-shift processing is not viable under the current processing model due to an unacceptable decrease in applicant throughput. Results from appointment-based scenarios are mixed, with the critical factors being the time between appointment batches and their associated arrival times.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"79 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73268539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using network digital twins to improve cyber resilience of missions 利用网络数字孪生提高任务的网络弹性
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-10-11 DOI: 10.1177/15485129221131226
R. Bagrodia
The need to secure information and weapon systems against cyber threats is a critical objective for the US Department of Defense and its allied partners. Understanding the end-to-end performance of such systems under realistic operational conditions, including cyber disruptions, is critical for achieving mission goals. Identifying and mitigating shortfalls in operational performance under adverse operational conditions can provide significant value to our defense capabilities and directly save lives. As an illustrative example, we consider the Joint All Domain Command and Control (JADC2) system. JADC2 fundamentally relies on communications and networks to contain, extract, and disseminate time-sensitive, missionrelevant information to win decisively against opposing forces. Future conflicts are likely to involve attempts to disrupt information systems that are critical for JADC2 communication and for assured operation of highly sophisticated weapons systems. Disruption is already a capability of potential adversary forces and will spread to secondary threats allied to them. The complexity of a JADC2 combined cyber and kinetic battlefield requires the training, analysis, test, and evaluation communities to adequately account for potential impacts of degraded network operations and/or exploitation of cyber vulnerabilities on overall mission outcomes. This has motivated a significant amount of ongoing research and development into tools, techniques, and methodologies to assess cyber resiliency of military systems in general, and combat systems in particular. The complexity and interdependencies among combat systems and connections among them complicate current resiliency analysis methods. For example, a risk associated with a single point of failure in a network could be mitigated with redundant components, assuming that the failure is a random hardware failure. However, an unmitigated cyber vulnerability could result in identical failures in redundant components as well. Even if there is no vulnerability in the component itself, an attack that succeeds in interfering with timing of data exchanges, for example by loading a data bus, could result in degraded combat system performance. Similarly, establishing communication links through delayed, intermittently connected, low-bandwidth environments may require the relaying of information using multiple hops, which increases susceptibility to man-in-the-middle attacks. It is also the case that a cyber vulnerability in a weapon system is not necessarily a mission vulnerability, as exploiting that vulnerability may or may not impact the overall system capabilities needed to achieve mission objectives. To assure a mission against cyber threats, cyber resilience of the weapon system must be assessed in a realistic tactical environment, so as to:
保护信息和武器系统免受网络威胁的需求是美国国防部及其盟友的关键目标。了解此类系统在实际操作条件下的端到端性能,包括网络中断,对于实现任务目标至关重要。在不利的作战条件下,识别和减轻作战性能的不足可以为我们的防御能力提供重要价值,并直接挽救生命。作为一个说明性的例子,我们考虑了联合全域指挥与控制(JADC2)系统。JADC2从根本上依赖于通信和网络来包含、提取和传播时间敏感的、与任务相关的信息,以决定性地赢得对对方部队的胜利。未来的冲突可能涉及试图破坏对JADC2通信和确保高度复杂武器系统的操作至关重要的信息系统。破坏已经是潜在对手力量的一种能力,并将扩散到与他们结盟的次要威胁。JADC2联合网络和动态战场的复杂性要求训练、分析、测试和评估团体充分考虑网络作战退化和/或利用网络漏洞对整体任务结果的潜在影响。这激发了大量正在进行的工具、技术和方法的研究和开发,以评估军事系统,特别是作战系统的网络弹性。作战系统之间的复杂性和相互依赖性以及它们之间的联系使现有的弹性分析方法复杂化。例如,假设故障是随机硬件故障,可以使用冗余组件减轻与网络中单点故障相关的风险。然而,一个未缓解的网络漏洞也可能导致冗余组件出现相同的故障。即使组件本身没有漏洞,成功干扰数据交换时间的攻击,例如通过加载数据总线,也可能导致作战系统性能下降。类似地,通过延迟、间歇连接、低带宽环境建立通信链接可能需要使用多跳中继信息,这增加了对中间人攻击的敏感性。此外,武器系统中的网络漏洞不一定是任务漏洞,因为利用该漏洞可能会或可能不会影响实现任务目标所需的整体系统能力。为了确保应对网络威胁的任务,必须在现实战术环境中评估武器系统的网络弹性,以便:
{"title":"Using network digital twins to improve cyber resilience of missions","authors":"R. Bagrodia","doi":"10.1177/15485129221131226","DOIUrl":"https://doi.org/10.1177/15485129221131226","url":null,"abstract":"The need to secure information and weapon systems against cyber threats is a critical objective for the US Department of Defense and its allied partners. Understanding the end-to-end performance of such systems under realistic operational conditions, including cyber disruptions, is critical for achieving mission goals. Identifying and mitigating shortfalls in operational performance under adverse operational conditions can provide significant value to our defense capabilities and directly save lives. As an illustrative example, we consider the Joint All Domain Command and Control (JADC2) system. JADC2 fundamentally relies on communications and networks to contain, extract, and disseminate time-sensitive, missionrelevant information to win decisively against opposing forces. Future conflicts are likely to involve attempts to disrupt information systems that are critical for JADC2 communication and for assured operation of highly sophisticated weapons systems. Disruption is already a capability of potential adversary forces and will spread to secondary threats allied to them. The complexity of a JADC2 combined cyber and kinetic battlefield requires the training, analysis, test, and evaluation communities to adequately account for potential impacts of degraded network operations and/or exploitation of cyber vulnerabilities on overall mission outcomes. This has motivated a significant amount of ongoing research and development into tools, techniques, and methodologies to assess cyber resiliency of military systems in general, and combat systems in particular. The complexity and interdependencies among combat systems and connections among them complicate current resiliency analysis methods. For example, a risk associated with a single point of failure in a network could be mitigated with redundant components, assuming that the failure is a random hardware failure. However, an unmitigated cyber vulnerability could result in identical failures in redundant components as well. Even if there is no vulnerability in the component itself, an attack that succeeds in interfering with timing of data exchanges, for example by loading a data bus, could result in degraded combat system performance. Similarly, establishing communication links through delayed, intermittently connected, low-bandwidth environments may require the relaying of information using multiple hops, which increases susceptibility to man-in-the-middle attacks. It is also the case that a cyber vulnerability in a weapon system is not necessarily a mission vulnerability, as exploiting that vulnerability may or may not impact the overall system capabilities needed to achieve mission objectives. To assure a mission against cyber threats, cyber resilience of the weapon system must be assessed in a realistic tactical environment, so as to:","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"45 1","pages":"97 - 106"},"PeriodicalIF":0.8,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74493440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of the attack helicopter Mil Mi-24 conducting anti-surface air operations in support of a battalion task group 模拟攻击直升机Mi-24进行反水面空中作战,以支持一个营任务组
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-09-22 DOI: 10.1177/15485129221118094
Z. Korecki, Tomas Hoika, Jiří Ulvr, M. Janošek, Matúš Grega
The paper presents an experiment of air support of ground units at the level of battalion task force in an offensive operation. Statistical techniques were used in this approach to estimate the outcomes of the operation from the data generated by a simulation model. The experiment was conducted with the support of the Masa SWORD simulation technology for different scenarios involving the pilot characteristics, firing distances, range of air defense, and the use of different unit sensor capacities. As part of the different scenarios, we present sensor results for use in different attack scenarios with different enemy capabilities at the tactical level and the impact of air support of the battalion’s task force in destroying a company-sized enemy. The experiment allows evaluation of different pilot training levels, stress levels, and other climatic influences. These factors provide information on when and how (with what desired effect) a strike can be executed, by what means (systems) it is to be executed, and what the constraints are in executing it. The constraints are imposed by electronic warfare (EW), level of camouflage, and air defense. We have determined using the Masa SWORD simulation program that the use of helicopters to support the battalion task group will significantly reduce the loss of life and reduce the time to destroy the enemy.
本文介绍了在进攻作战中对营级特遣部队地面部队进行空中支援的试验。该方法采用统计技术,根据模拟模型产生的数据估计手术结果。在马萨剑仿真技术的支持下,针对不同的飞行员特性、射击距离、防空范围、不同单元传感器容量等不同场景进行了实验。作为不同场景的一部分,我们展示了在战术层面上不同敌人能力的不同攻击场景中使用的传感器结果,以及营特遣部队在摧毁连大小敌人时空中支援的影响。该实验可以评估不同的飞行员训练水平、压力水平和其他气候影响。这些因素提供了关于何时以及如何(以期望的效果)执行打击的信息,通过什么手段(系统)执行打击,以及执行打击的约束是什么。这些限制是由电子战(EW)、伪装水平和防空施加的。我们已经通过马萨之剑模拟程序确定,使用直升机支援营任务组将大大减少生命损失并缩短摧毁敌人的时间。
{"title":"Simulation of the attack helicopter Mil Mi-24 conducting anti-surface air operations in support of a battalion task group","authors":"Z. Korecki, Tomas Hoika, Jiří Ulvr, M. Janošek, Matúš Grega","doi":"10.1177/15485129221118094","DOIUrl":"https://doi.org/10.1177/15485129221118094","url":null,"abstract":"The paper presents an experiment of air support of ground units at the level of battalion task force in an offensive operation. Statistical techniques were used in this approach to estimate the outcomes of the operation from the data generated by a simulation model. The experiment was conducted with the support of the Masa SWORD simulation technology for different scenarios involving the pilot characteristics, firing distances, range of air defense, and the use of different unit sensor capacities. As part of the different scenarios, we present sensor results for use in different attack scenarios with different enemy capabilities at the tactical level and the impact of air support of the battalion’s task force in destroying a company-sized enemy. The experiment allows evaluation of different pilot training levels, stress levels, and other climatic influences. These factors provide information on when and how (with what desired effect) a strike can be executed, by what means (systems) it is to be executed, and what the constraints are in executing it. The constraints are imposed by electronic warfare (EW), level of camouflage, and air defense. We have determined using the Masa SWORD simulation program that the use of helicopters to support the battalion task group will significantly reduce the loss of life and reduce the time to destroy the enemy.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"32 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89404541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supporting shipboard helicopter flight testing with simulation and metrics for predicting pilot workload 支持舰载直升机飞行测试,模拟和指标预测飞行员的工作量
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-09-21 DOI: 10.1177/15485129221118937
Perry Comeau, A. Wall, E. Thornhill, S. McTavish, Richard G. Lee
Shipboard helicopter operations are much more challenging and complex than land-based operations due to many factors associated with the presence of the ship. To determine those conditions in which safe operations may occur, a First of Class Flight Trial (FOCFT) is conducted for every new ship–helicopter pair. This trial results in a Ship–Helicopter Operating Limit (SHOL) envelope that is used to document operational limits for regular operations. Conducting a FOCFT is a, expensive, and time-consuming task that requires testing all aspects of operations. Modeling and simulation efforts to support shipboard helicopter operations have been ongoing internationally for many years with the intention of de-risking FOCFT and introducing efficiency into the testing process. Canada will be accepting several new ship classes into its fleet over the next two decades. In support of FOCFT for these new ships, modeling and simulation tools are being developed by the National Research Council (NRC) Canada and Defence Research and Development Canada (DRDC) and significant advancements have occurred in the past decade. As part of this work, NRC and DRDC now use a framework and analysis approach that is intended to standardize SHOL testing with the use of modeling and simulation. This paper introduces that framework and gives details on the modeling and simulation tools that can be used to reduce risk and increase efficiency for Canada’s upcoming FOCFTs.
由于与舰载直升机存在相关的许多因素,舰载直升机作战比陆基作战更具挑战性和复杂性。为了确定安全操作可能发生的条件,对每对新船-直升机进行首级飞行试验(FOCFT)。该试验产生了舰载直升机操作限制(SHOL)包线,用于记录常规操作的操作限制。执行FOCFT是一项昂贵且耗时的任务,需要测试操作的各个方面。支持舰载直升机操作的建模和仿真工作已经在国际上进行了多年,目的是降低FOCFT的风险,并在测试过程中引入效率。在接下来的20年里,加拿大将会接收几艘新级别的舰船。为了支持这些新舰艇的FOCFT,加拿大国家研究委员会(NRC)和加拿大国防研究与发展部(DRDC)正在开发建模和仿真工具,并且在过去十年中已经取得了重大进展。作为这项工作的一部分,NRC和DRDC现在使用一个框架和分析方法,旨在通过建模和仿真来标准化SHOL测试。本文介绍了该框架,并详细介绍了建模和仿真工具,这些工具可用于降低加拿大即将推出的FOCFTs的风险并提高效率。
{"title":"Supporting shipboard helicopter flight testing with simulation and metrics for predicting pilot workload","authors":"Perry Comeau, A. Wall, E. Thornhill, S. McTavish, Richard G. Lee","doi":"10.1177/15485129221118937","DOIUrl":"https://doi.org/10.1177/15485129221118937","url":null,"abstract":"Shipboard helicopter operations are much more challenging and complex than land-based operations due to many factors associated with the presence of the ship. To determine those conditions in which safe operations may occur, a First of Class Flight Trial (FOCFT) is conducted for every new ship–helicopter pair. This trial results in a Ship–Helicopter Operating Limit (SHOL) envelope that is used to document operational limits for regular operations. Conducting a FOCFT is a, expensive, and time-consuming task that requires testing all aspects of operations. Modeling and simulation efforts to support shipboard helicopter operations have been ongoing internationally for many years with the intention of de-risking FOCFT and introducing efficiency into the testing process. Canada will be accepting several new ship classes into its fleet over the next two decades. In support of FOCFT for these new ships, modeling and simulation tools are being developed by the National Research Council (NRC) Canada and Defence Research and Development Canada (DRDC) and significant advancements have occurred in the past decade. As part of this work, NRC and DRDC now use a framework and analysis approach that is intended to standardize SHOL testing with the use of modeling and simulation. This paper introduces that framework and gives details on the modeling and simulation tools that can be used to reduce risk and increase efficiency for Canada’s upcoming FOCFTs.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"17 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82484328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Considering the cost of cyber warfare: advancing cyber warfare analytics to better assess tradeoffs in system destruction warfare 考虑网络战的成本:推进网络战分析以更好地评估系统破坏战中的权衡
IF 0.8 Q3 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2022-09-13 DOI: 10.1177/15485129221114354
Robert Swallow
The Chinese People’s Liberation Army (PLA) intends to wage systems confrontation and system destruction warfare. “System-of-systems thinking drives how the PLA understands and seeks to win modern warfare … and to achieve integrated joint operations and ‘win informationized local wars’.”1 This paper seeks to raise the odds that the PLA overspends in their pursuit and fails to achieve their objectives by increasing the focus on the role cyber analytics plays in winning system-of-systems warfare, what former Deputy Secretary of Defense Robert Work described as algorithmic warfare.2
中国人民解放军(PLA)打算进行系统对抗和系统破坏战。“系统的系统思维驱动着解放军如何理解和寻求赢得现代战争……以及实现一体化联合作战和‘赢得信息化局部战争’。”“本文试图通过增加对网络分析在赢得系统战(前国防部副部长罗伯特·沃克称之为算法战)中所起作用的关注,提高解放军在追求方面超支并未能实现其目标的可能性。
{"title":"Considering the cost of cyber warfare: advancing cyber warfare analytics to better assess tradeoffs in system destruction warfare","authors":"Robert Swallow","doi":"10.1177/15485129221114354","DOIUrl":"https://doi.org/10.1177/15485129221114354","url":null,"abstract":"The Chinese People’s Liberation Army (PLA) intends to wage systems confrontation and system destruction warfare. “System-of-systems thinking drives how the PLA understands and seeks to win modern warfare … and to achieve integrated joint operations and ‘win informationized local wars’.”1 This paper seeks to raise the odds that the PLA overspends in their pursuit and fails to achieve their objectives by increasing the focus on the role cyber analytics plays in winning system-of-systems warfare, what former Deputy Secretary of Defense Robert Work described as algorithmic warfare.2","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":"22 1","pages":"3 - 37"},"PeriodicalIF":0.8,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72552495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1