Sciweavers

676 search results - page 3 / 136
» Ubiquitous command and control
Sort
View
ISORC
2000
IEEE
13 years 10 months ago
Establishing a Data-Mining Environment for Wartime Event Prediction with an Object-Oriented Command and Control Database
This paper documents progress to date on a research project, the goal of which is wartime event prediction. The paper describes the operational concept, the datamining environment...
Marion G. Ceruti, S. Joe McCarthy
LCN
2006
IEEE
14 years 2 days ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
DSN
2008
IEEE
14 years 16 days ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
CIG
2005
IEEE
13 years 11 months ago
Pared-down Poker: Cutting to the Core of Command and Control
Poker poses cognitive challenges like those of warfare, business and other real world domains. This makes poker a good test bed for basic research on how people make Command and Co...
Kevin Burns
DSRT
2005
IEEE
13 years 11 months ago
Using Web Services and Data Mediation/Storage Services to Enable Command and Control to Simulation Interoperability
The Extensible Battle Management Language project has implemented XML based data mediation services to translate from legacy XML schemas into XML schemas, based on a common tag se...
Andreas Tolk, J. Mark Pullen