Narrow your search

Library

Vlaams Parlement (6)

AP (1)

KDG (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

More...

Resource type

book (7)

digital (1)


Language

English (8)


Year
From To Submit

2022 (1)

2020 (3)

2019 (2)

2013 (2)

Listing 1 - 8 of 8
Sort by

Book
Control of Cyber-Physical Systems : Workshop held at Johns Hopkins University, March 2013
Author:
ISBN: 3319011588 3319011596 Year: 2013 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical systems (CPS) involve deeply integrated, tightly coupled computational and physical components. These systems, spanning multiple scientific and technological domains, are highly complex and pose several fundamental challenges. They are also critically important to society’s advancement and security. The design and deployment of the adaptable, reliable CPS of tomorrow requires the development of a basic science foundation, synergistically drawing on various branches of engineering, mathematics, computer science, and domain specific knowledge.   This book brings together 19 invited papers presented at the Workshop on Control of Cyber-Physical Systems, hosted by the Department of Electrical & Computer Engineering at The Johns Hopkins University in March 2013. It highlights the central role of control theory and systems thinking in developing the theory of CPS, in addressing the challenges of cyber-trust and cyber-security, and in advancing emerging cyber-physical applications ranging from smart grids to smart buildings, cars and robotic systems.  .


Digital
Control of Cyber-Physical Systems : Workshop held at Johns Hopkins University, March 2013
Author:
ISBN: 9783319011592 Year: 2013 Publisher: Heidelberg Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-physical systems (CPS) involve deeply integrated, tightly coupled computational and physical components. These systems, spanning multiple scientific and technological domains, are highly complex and pose several fundamental challenges. They are also critically important to society’s advancement and security. The design and deployment of the adaptable, reliable CPS of tomorrow requires the development of a basic science foundation, synergistically drawing on various branches of engineering, mathematics, computer science, and domain specific knowledge.   This book brings together 19 invited papers presented at the Workshop on Control of Cyber-Physical Systems, hosted by the Department of Electrical & Computer Engineering at The Johns Hopkins University in March 2013. It highlights the central role of control theory and systems thinking in developing the theory of CPS, in addressing the challenges of cyber-trust and cyber-security, and in advancing emerging cyber-physical applications ranging from smart grids to smart buildings, cars and robotic systems.  .


Book
Exploring the Role Nuclear Weapons Could Play in Deterring Russian Threats to the Baltic States
Authors: --- --- --- --- --- et al.
Year: 2019 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Despite its global advantages, the North Atlantic Treaty Organization (NATO)'s current deterrent posture in the Baltic states is militarily weak and generally questionable. A Russian invasion there would almost surely capture some or all of those states' capital cities within a few days, presenting NATO with a fait accompli. The United States is currently considering tailored deterrence strategies, including options to use nuclear weapons to deter Russian aggression in the Baltic states. This report examines what role nonstrategic nuclear weapons could play in deterring such an invasion. As part of that analysis, the authors review relevant deterrence theory and current NATO and Russian nuclear and conventional force postures in Europe. They draw on wargame exercises and qualitative modeling to characterize the potential outcomes if NATO, Russia, or both employ nonstrategic nuclear weapons during a war in the Baltic states. The authors then discuss implications for using such weapons to deter a Russian invasion. The insights derived from the research highlight the reality that, even if NATO makes significant efforts to modernize its nonstrategic nuclear weapons, it would have much stronger military incentives to end a future war than Russia would. That is, Russia would still enjoy escalation dominance.

Keywords


Book
Measuring Cybersecurity and Cyber Resiliency
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

This report presents a framework for the development of metrics—and a method for scoring them—that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment. These metrics are developed so as to be suitable for informing acquisition decisions during all stages of weapon systems' life cycles. There are two types of cyber metrics: working-level metrics to counter an adversary's cyber operations and institutional-level metrics to capture any cyber-related organizational deficiencies. The cyber environment is dynamic and complex, the threat is ubiquitous (in peacetime and wartime, deployed and at home), and no set of underlying "laws of nature" govern the cyber realm. A fruitful approach is to define cyber metrics in the context of a two-player cyber game between Red (the attacking side) and Blue (the side trying to ensure a mission). The framework helps, in part, to reveal where strengths in one area might partially offset weaknesses in another. Additional discussions focus on how those metrics can be scored in ways that are useful for supporting decisions. The metrics are aimed at supporting program offices and authorizing officials in risk management and in defining requirements, both operational requirements as well as the more detailed requirements for system design used in contracts, the latter often referred to as derived requirements.

Keywords


Book
The Department of Defense Posture for Artificial Intelligence: Assessment and Recommendations
Authors: --- --- --- --- --- et al.
Year: 2019 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 2019 National Defense Authorization Act mandated a study on artificial intelligence (AI) topics. In this report, RAND Corporation researchers assess the state of AI relevant to the U.S. Department of Defense (DoD), and address misconceptions about AI; they carry out an independent and introspective assessment of the Department of Defense's posture for AI; and they share a set of recommendations for internal actions, external engagements, and potential legislative or regulatory actions to enhance the Department of Defense's posture in AI.

Keywords


Book
An Experiment in Tactical Wargaming with Platforms Enabled by Artificial Intelligence
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

RAND researchers explored the capabilities and limitations of future weapon systems incorporating artificial intelligence and machine learning (AI/ML) through two wargame experiments. The researchers modified and augmented the rules and engagement statistics used in a commercial tabletop wargame to enable (1) remotely operated and fully autonomous combat vehicles and (2) vehicles with AI/ML–enabled situational awareness to show how the two types of vehicles would perform in company-level engagements between Blue (U.S.) and Red (Russian) forces. Those rules sought to realistically capture the capabilities and limitations of those systems, including their vulnerability to selected enemy countermeasures, such as jamming. Future work could improve the realism of both the gameplay and representation of AI/ML–enabled systems. In this experiment, participants played two games: a baseline game and an AI/ML game. Throughout play in the two game scenarios, players on both sides discussed the capabilities and limitations of the remotely operated and fully autonomous systems and their implications for engaging in combat using such systems. These discussions led to changes in how the systems were employed by the players and observations about which limitations should be mitigated before commanders were likely to accept a system and which capabilities needed to be fully understood by commanders so that systems could be employed appropriately. This research demonstrated how such games, by bringing together operators and engineers, could be used by the requirements and acquisition communities to develop realizable requirements and engineering specifications for AI/ML systems.

Keywords


Book
Maintaining the Competitive Advantage in Artificial Intelligence and Machine Learning
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Artificial intelligence (AI) technologies hold the potential to become critical force multipliers in future armed conflicts. The People's Republic of China has identified AI as key to its goal of enhancing its national competitiveness and protecting its national security. If its current AI plan is successful, China will achieve a substantial military advantage over the United States and its allies. That has significant negative strategic implications for the United States. How much of a lead does the United States have, and what do the United States and the U.S. Air Force (USAF) need to do to maintain that lead? To address this question, the authors conducted a comparative analysis of U.S. and Chinese AI strategies, cultural and structural factors, and military capability development, examining the relevant literature in both English and Chinese. They looked at literature on trends and breakthroughs, business concerns, comparative cultural analysis, and military science and operational concepts. The authors found that the critical dimensions for the U.S. Department of Defense (DoD) involve development and engineering for transitioning AI to the military; advances in validation, verification, testing, and evaluation; and operational concepts for AI. Significantly, each of these dimensions is under direct DoD control.

Keywords


Book
Improving the Technical Requirements Development Process for Weapon Systems: A Systems-Based Approach for Managers

Loading...
Export citation

Choose an application

Bookmark

Abstract

The acquisition process for a new weapon system involves developing a set of technical requirements - a set of statements or models defining what a system should do and how well it should do it - for the system's design to ensure that the system provides the needed operational capability within budget and schedule constraints. However, oversights during this process can result in cost or schedule overruns, unsuitable operational performance, or outright cancellation. The U.S. Department of the Air Force (DAF) asked RAND Project AIR FORCE to develop an approach to help improve DAF's technical requirements development process. To do so, the authors consulted policies and the literature, held discussions with DAF stakeholders and subject-matter experts, conducted two case studies, and assessed various tools that might assist development of technical requirements. This report describes the resulting approach, which has been informed by systems-based methods and tools, and includes an exploration of the applicability and feasibility of one specific emerging hazard-analysis tool: system-theoretic process analysis (STPA).

Listing 1 - 8 of 8
Sort by