Information Science

Multi-Temporal Analysis of Underbody IED Theater Events on Ground Vehicles

Modeling and simulation were used to analyze the effects of underbody blasts on moving vehicles.Army TARDEC, Warren, MichiganRecently, modeling and simulation (M&S) engineers have made impressive strides in improving ground vehicle reliability and soldier safety. This work involved live-fire testing and evaluation (LFT&E) of the effects of underbody improvised explosive device (IED) blasts on moving ground vehicles. A multi-fidelity, multi-temporal M&S methodology was developed and successfully applied towards reconstruction of theater IED events.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Failure analysis, Crashworthiness, Impact tests, Military vehicles and equipment


Ontology for Insider Threat Indicators

The ontology provides a mechanism for sharing and testing indicators of insider threat across multiple participants without compromising organization-sensitive data.The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending on the problem space. Organizations have begun to acknowledge the importance of detecting and preventing insider threats, but there is a surprising lack of standards within the insider threat domain to assist in the development, description, testing, and sharing of these techniques. For many organizations, establishing an insider threat program and beginning to look for potentially malicious insider activity is a new business activity.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Security systems, Data management


Data Mining in Cyber Operations

Data mining models describe dynamic behavior of attacks and failures, enabling defenders to detect and differentiate simultaneous attacks on a target network.Air Force Research Laboratory, Rome, New YorkDefending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the complexity and massive amounts of information transferred across the global network daily. The cyber infrastructure is made up of the data resources, network protocols, computing platforms, and computational services that bring people, information, and computational tools together.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Communication protocols, Cyber security, Data acquisition, Data acquisition (obsolete)


Framework for Resilient Remote Monitoring

This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.Raytheon BBN Technologies, Cambridge, MassachusettsSystem administrators and cyber defenders continue to face challenges in securing systems as attacks keep increasing in the level of sophistication, and the number of connected systems keeps increasing. To support and automate manual activities associated with obtaining information about systems and taking corrective action in response to suspicious activities, an increasing number of technologies for remote monitoring are becoming available with the premise of increasing resiliency by decreasing the time-to-detect and time-to-mitigate targeted attacks.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Cyber security


Communication Protocol for CyAMS and the Cyber Fighter Associate Interface

This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.Army Research Laboratory, Aberdeen Proving Ground, MarylandAs the military adopts more networked equipment, the opportunity for cyber attacks to occur has also risen. To mitigate the effect these attacks have, network administrators and security experts must be able to decide on the best course of action based on many factors. The Cyber Fighter Associate (CyFiA) will help decide the best course of action given a set of cyber agility maneuvers by measuring the cost and utility of potential maneuvers, along with node and network facts, to select the maneuvers that will lead to mission success.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Communication protocols, Cyber security


Reduced Order Modeling for Rapid Simulation of Blast Events of a Military Ground Vehicle and its Occupants

This method determines effects of blast loading on soldier injuries. Improvised Explosive Devices (IEDs) pose a significant threat to military ground vehicles and soldiers in the field. Full-system end-to-end models, as well as Reduced Order Modeling and Simulation (M&S) methodologies, are extensively used for the development of blast-worthy ground vehicles.

Posted in: Briefs, DTB, Aerospace, Defense, Electronics & Computers, Information Sciences, Test & Measurement, Computer simulation, Hazards and emergency management, Hazards and emergency operations, Injuries, Military vehicles and equipment


Integrated Underwater Security System

ATLAS ELEKTRONIK UK Winfrith Newburgh, Dorchester, UK +44-1305-212400 SIGNALIS SAS Bezons, France +33-1-39-96-44-44 Effective surveillance of coastal border areas requires the use of very sensitive and advanced radar systems and processing software. SIGNALIS and ATLAS ELEKTRONIK have jointly developed an interface for Cerberus Mod 2 Diver Detection Sonar (DDS), providing a fully integrated underwater surveillance and security system.

Posted in: Application Briefs, DTB, Aerospace, Defense, Electronics & Computers, Data Acquisition, Detectors, Sensors, Radar, Security systems, Marine vehicles and equipment