Search Results
-
A Cyberworm that Knows no Boundaries
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different ... More
Language: ENGCopyright: 2011 -
The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces
With the establishment of U. S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U... More
Language: ENGCopyright: 2014 -
Data Flood: Helping the Navy Address the Rising Tide of Sensor Information
Navy analysts are struggling to keep pace with the growing flood of data collected by intelligence, surveillance, and reconnaissance sensors. This challenge is sure to intensify as the Navy continues to field new and additional sensors. The authors explore options for solving the Navy's "big data" c... More
Language: ENGCopyright: 2014 -
data_flood: Helping the Navy Address the Rising Tide of Sensor Information
Navy analysts are struggling to keep pace with the growing flood of data collected by intelligence, surveillance, and reconnaissance sensors. This challenge is sure to intensify as the Navy continues to field new and additional sensors. The authors explore options for solving the Navy's "big data"... More
Language: ENGCopyright: 2014 -
Redefining Information Warfare Boundaries For An Army In A Wireless World
by Christopher Paul • Endy Y. Min • Jerry M. Sollinger • Bruce J. Held • Isaac R. Porche • Michael York • Chad C. Serena • Elliot AxelbandThe U. S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U. S. military found significant overl... More
Language: ENGCopyright: 2013 -
Integrating Social Media into Information Systems: Requirements, Gaps, and Potential Solutions (G - Reference, Information and Interdisciplinary Subjects)
by Parisa Roshan • Isaac R. Porche • Ryan Andrew Brown • Astrid Stuth Cevallos • Osonde A. Osoba • Joshua Mendelsohn • Douglas Douglas Yeung • John Bordeaux • Timothy R. Gulden • Laura Kupe • Luke J. Matthews • Katharine Sieck • Sarah SolimanThis report examines the technical challenges associated with incorporating bulk, automated analysis of social media information into procedures for vetting people seeking entry into the United States. The authors identify functional requirements and a framework for operational metrics for the propo... More
Language: ENGCopyright: 2018