Information Science

Multi-Temporal Analysis of Underbody IED Theater Events on Ground Vehicles

Modeling and simulation were used to analyze the effects of underbody blasts on moving vehicles.

Army TARDEC, Warren, Michigan

Recently, modeling and simulation (M&S) engineers have made impressive strides in improving ground vehicle reliability and soldier safety. This work involved live-fire testing and evaluation (LFT&E) of the effects of underbody improvised explosive device (IED) blasts on moving ground vehicles. A multi-fidelity, multi-temporal M&S methodology was developed and successfully applied towards reconstruction of theater IED events.

Posted in: Briefs, Aerospace, Defense, Information Technology, Failure analysis, Crashworthiness, Impact tests, Military vehicles and equipment
Read More >>

Ontology for Insider Threat Indicators

The study of insider threat presents some of the most complex challenges in information security. Even defining the insider threat has proven difficult, with interpretations and scope varying depending on the problem space. Organizations have begun to acknowledge the importance of detecting and preventing insider threats, but there is a surprising lack of standards within the insider threat domain to assist in the development, description, testing, and sharing of these techniques. For many organizations, establishing an insider threat program and beginning to look for potentially malicious insider activity is a new business activity.

Posted in: Briefs, Aerospace, Defense, Information Technology, Security systems, Security systems, Data management
Read More >>

Data Mining in Cyber Operations

Data mining models describe dynamic behavior of attacks and failures, enabling defenders to detect and differentiate simultaneous attacks on a target network.

Air Force Research Laboratory, Rome, New York

Defending cyberspace is a complex and largely scoped challenge that considers emerging threats to security in space, land, and sea. The global cyber infrastructure presents many challenges because of the complexity and massive amounts of information transferred across the global network daily. The cyber infrastructure is made up of the data resources, network protocols, computing platforms, and computational services that bring people, information, and computational tools together.

Posted in: Briefs, Aerospace, Defense, Information Technology, Communication protocols, Communication protocols, Cyber security, Data acquisition, Data acquisition (obsolete)
Read More >>

Framework for Resilient Remote Monitoring

This method provides continuous monitoring across network-attached devices to identify and mitigate targeted cyber attacks.

Raytheon BBN Technologies, Cambridge, Massachusetts

System administrators and cyber defenders continue to face challenges in securing systems as attacks keep increasing in the level of sophistication, and the number of connected systems keeps increasing. To support and automate manual activities associated with obtaining information about systems and taking corrective action in response to suspicious activities, an increasing number of technologies for remote monitoring are becoming available with the premise of increasing resiliency by decreasing the time-to-detect and time-to-mitigate targeted attacks.

Posted in: Briefs, Aerospace, Defense, Information Technology, Cyber security
Read More >>

Communication Protocol for CyAMS and the Cyber Fighter Associate Interface

This program evaluates agility maneuvers that may be employed within networks to mitigate the effect of cyber attacks.

Army Research Laboratory, Aberdeen Proving Ground, Maryland

As the military adopts more networked equipment, the opportunity for cyber attacks to occur has also risen. To mitigate the effect these attacks have, network administrators and security experts must be able to decide on the best course of action based on many factors. The Cyber Fighter Associate (CyFiA) will help decide the best course of action given a set of cyber agility maneuvers by measuring the cost and utility of potential maneuvers, along with node and network facts, to select the maneuvers that will lead to mission success.

Posted in: Briefs, Aerospace, Defense, Information Technology, Communication protocols, Communication protocols, Cyber security
Read More >>

Reduced Order Modeling for Rapid Simulation of Blast Events of a Military Ground Vehicle and its Occupants

Improvised Explosive Devices (IEDs) pose a significant threat to military ground vehicles and soldiers in the field. Full-system end-to-end models, as well as Reduced Order Modeling and Simulation (M&S) methodologies, are extensively used for the development of blast-worthy ground vehicles.

Posted in: Briefs, DTB, Aerospace, Defense, Electronics & Computers, Information Technology, Test & Measurement, Computer simulation, Hazards and emergency management, Hazards and emergency operations, Injuries, Military vehicles and equipment
Read More >>

Integrated Underwater Security System

ATLAS ELEKTRONIK UK
Winfrith Newburgh, Dorchester, UK
+44-1305-212400
www.uk.atlas-elektronik.com
SIGNALIS SAS
Bezons, France
+33-1-39-96-44-44
www.signalis.com

Effective surveillance of coastal border areas requires the use of very sensitive and advanced radar systems and processing software. SIGNALIS and ATLAS ELEKTRONIK have jointly developed an interface for Cerberus Mod 2 Diver Detection Sonar (DDS), providing a fully integrated underwater surveillance and security system.

Posted in: Application Briefs, DTB, Aerospace, Defense, Electronics & Computers, Data Acquisition, Detectors, Sensors, Radar, Security systems, Radar, Security systems, Marine vehicles and equipment
Read More >>

Materials Design Principles for the Dynamic Fracture of Laminar Composite Structures

Crack bridging (e.g., from stitches or pins) and friction have profound and potentially very useful effects on delamination crack growth, controlling growth rates (damage levels) and the energy absorbed. However, the implications for structural design principles have remained quite obscure. The difficulty is that no simple analogue of crack toughness, which underpins static structural design, exists for dynamic cases with large-scale bridging effects. The external shape of the structure and the loading configuration dictate stress waves, frictional contact zones, and crack tip stress intensity factors in a way that is very difficult to approach, other than by brute case-specific numerical simulation. The problem is compounded by the common occurrence of multiple cracking, a complexity that is rarely entertained in laboratory fracture specimen design. Physically sound material models for the important structural problem of multiple, nonlinear cracking in laminated structures with large-scale bridging due to friction and reinforcement had previously remained undeveloped, in spite of the technological importance of these systems.

Posted in: Briefs, Aerospace, Defense, Electronics & Computers, Information Technology, Materials, Finite element analysis, Composite materials
Read More >>

Developing and Validating Statistical Cyber Defenses

Enterprise business processes are more connected than ever before, driven by the ability to share the right information with the right partners at the right time. While this interconnectedness and situational awareness is crucial to success, it also opens the possibility for misuse of the same capabilities by sophisticated adversaries to spread attacks and corrupt critical, sensitive information. This is particularly true for an insider threat scenario in which adversaries have legitimate access to some resources and unauthorized access to other resources that is not directly controlled by a fine-grained policy.

Posted in: Briefs, Aerospace, Defense, Electronics & Computers, Information Technology, Statistical analysis, Collaboration and partnering, Cyber security, Data acquisition, Data acquisition (obsolete)
Read More >>

Supervisory Control State Diagrams to Depict Autonomous Activity

The military seeks to enable agile and adaptive mission management and control for a team comprised of unmanned aerial vehicles (UAVs), unattended ground sensors (UGS), dismounted war-fighters with mobile control stations, and an operator located in a central control station. With UAVs equipped and authorized to re-plan and act without human input, the challenge is developing methods for a human operator to sufficiently monitor, inspect, and manipulate the UAVs’ activities, which include goal-directed task selection, situation assessment, decision-making, planning, and actions.

Posted in: Briefs, Aerospace, Defense, Electronics & Computers, Information Technology, Sensors and actuators, Sensors and actuators, Human factors, Military vehicles and equipment, Unmanned aerial vehicles
Read More >>