Information Science

Multi-Temporal Analysis of Underbody IED Theater Events on Ground Vehicles

Modeling and simulation were used to analyze the effects of underbody blasts on moving vehicles.

Army TARDEC, Warren, Michigan

Recently, modeling and simulation (M&S) engineers have made impressive strides in improving ground vehicle reliability and soldier safety. This work involved live-fire testing and evaluation (LFT&E) of the effects of underbody improvised explosive device (IED) blasts on moving ground vehicles. A multi-fidelity, multi-temporal M&S methodology was developed and successfully applied towards reconstruction of theater IED events.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Failure analysis, Crashworthiness, Impact tests, Military vehicles and equipment

Ontology for Insider Threat Indicators

The ontology provides a mechanism for sharing and testing indicators of insider threat across multiple participants without compromising organization-sensitive data.

The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending on the problem space. Organizations have begun to acknowledge the importance of detecting and preventing insider threats, but there is a surprising lack of standards within the insider threat domain to assist in the development, description, testing, and sharing of these techniques. For many organizations, establishing an insider threat program and beginning to look for potentially malicious insider activity is a new business activity.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Security systems, Data management

Data Mining in Cyber Operations

Data mining models describe dynamic behavior of attacks and failures, enabling defenders to detect and differentiate simultaneous attacks on a target network.

Air Force Research Laboratory, Rome, New York

Defending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the complexity and massive amounts of information transferred across the global network daily. The cyber infrastructure is made up of the data resources, network protocols, computing platforms, and computational services that bring people, information, and computational tools together.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Communication protocols, Cyber security, Data acquisition, Data acquisition (obsolete)

Framework for Resilient Remote Monitoring

This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.

Raytheon BBN Technologies, Cambridge, Massachusetts

System administrators and cyber defenders continue to face challenges in securing systems as attacks keep increasing in the level of sophistication, and the number of connected systems keeps increasing. To support and automate manual activities associated with obtaining information about systems and taking corrective action in response to suspicious activities, an increasing number of technologies for remote monitoring are becoming available with the premise of increasing resiliency by decreasing the time-to-detect and time-to-mitigate targeted attacks.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Cyber security

Communication Protocol for CyAMS and the Cyber Fighter Associate Interface

This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.

Army Research Laboratory, Aberdeen Proving Ground, Maryland

As the military adopts more networked equipment, the opportunity for cyber attacks to occur has also risen. To mitigate the effect these attacks have, network administrators and security experts must be able to decide on the best course of action based on many factors. The Cyber Fighter Associate (CyFiA) will help decide the best course of action given a set of cyber agility maneuvers by measuring the cost and utility of potential maneuvers, along with node and network facts, to select the maneuvers that will lead to mission success.

Posted in: Briefs, Aerospace, Defense, Information Sciences, Communication protocols, Cyber security

Integrated Underwater Security System

ATLAS ELEKTRONIK UK Winfrith Newburgh, Dorchester, UK +44-1305-212400 SIGNALIS SAS Bezons, France +33-1-39-96-44-44

Effective surveillance of coastal border areas requires the use of very sensitive and advanced radar systems and processing software. SIGNALIS and ATLAS ELEKTRONIK have jointly developed an interface for Cerberus Mod 2 Diver Detection Sonar (DDS), providing a fully integrated underwater surveillance and security system.

Posted in: Application Briefs, DTB, Aerospace, Defense, Electronics & Computers, Data Acquisition, Detectors, Sensors, Radar, Security systems, Marine vehicles and equipment

Reduced Order Modeling for Rapid Simulation of Blast Events of a Military Ground Vehicle and its Occupants

This method determines effects of blast loading on soldier injuries.

Improvised Explosive Devices (IEDs) pose a significant threat to military ground vehicles and soldiers in the field. Full-system end-to-end models, as well as Reduced Order Modeling and Simulation (M&S) methodologies, are extensively used for the development of blast-worthy ground vehicles.

Posted in: Briefs, DTB, Aerospace, Defense, Electronics & Computers, Information Sciences, Test & Measurement, Computer simulation, Hazards and emergency management, Hazards and emergency operations, Injuries, Military vehicles and equipment

Materials Design Principles for the Dynamic Fracture of Laminar Composite Structures

Providing significant improvements in impact and ballistic resistance via materials and structural design.

Crack bridging (e.g., from stitches or pins) and friction have profound and potentially very useful effects on delamination crack growth, controlling growth rates (damage levels) and the energy absorbed. However, the implications for structural design principles have remained quite obscure. The difficulty is that no simple analogue of crack toughness, which underpins static structural design, exists for dynamic cases with large-scale bridging effects. The external shape of the structure and the loading configuration dictate stress waves, frictional contact zones, and crack tip stress intensity factors in a way that is very difficult to approach, other than by brute case-specific numerical simulation. The problem is compounded by the common occurrence of multiple cracking, a complexity that is rarely entertained in laboratory fracture specimen design. Physically sound material models for the important structural problem of multiple, nonlinear cracking in laminated structures with large-scale bridging due to friction and reinforcement had previously remained undeveloped, in spite of the technological importance of these systems.

Posted in: Briefs, Aerospace, Defense, Electronics & Computers, Information Sciences, Materials, Finite element analysis, Composite materials

Developing and Validating Statistical Cyber Defenses

The development and validation of advanced cyber security technology frequently relies on data that captures normal and suspicious activities at various system layers.

Enterprise business processes are more connected than ever before, driven by the ability to share the right information with the right partners at the right time. While this interconnectedness and situational awareness is crucial to success, it also opens the possibility for misuse of the same capabilities by sophisticated adversaries to spread attacks and corrupt critical, sensitive information. This is particularly true for an insider threat scenario in which adversaries have legitimate access to some resources and unauthorized access to other resources that is not directly controlled by a fine-grained policy.

Posted in: Briefs, Aerospace, Defense, Electronics & Computers, Information Sciences, Statistical analysis, Collaboration and partnering, Cyber security, Data acquisition, Data acquisition (obsolete)

Supervisory Control State Diagrams to Depict Autonomous Activity

This method will enable a human operator to monitor, inspect, and manipulate activities of multiple UAVs, including situation assessment, decision-making, planning, and actions.

The military seeks to enable agile and adaptive mission management and control for a team comprised of unmanned aerial vehicles (UAVs), unattended ground sensors (UGS), dismounted war-fighters with mobile control stations, and an operator located in a central control station. With UAVs equipped and authorized to re-plan and act without human input, the challenge is developing methods for a human operator to sufficiently monitor, inspect, and manipulate the UAVs’ activities, which include goal-directed task selection, situation assessment, decision-making, planning, and actions.

Posted in: Briefs, Aerospace, Defense, Electronics & Computers, Information Sciences, Sensors and actuators, Human factors, Military vehicles and equipment, Unmanned aerial vehicles