SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) ;lar1:(fhs)"

Sökning: hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) > Försvarshögskolan

  • Resultat 1-10 av 49
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Sigholm, Johan, et al. (författare)
  • Best-Effort Data Leakage Prevention in Inter-Organizational Tactical MANETs
  • 2012
  • Ingår i: Proceedings of the 2012 IEEE Military Communications Conference. - : IEEE Communications Society. - 9781467317306 - 9781467317290 ; , s. 1143-1149
  • Konferensbidrag (refereegranskat)abstract
    • Reconfigurable Radio Systems (RRS), based on technologies such as Software Defined Radio (SDR) and Mobile Ad-hoc Networks (MANETs) offer considerable advantages for military operations, such as increased network survivability and interoperability. The RRS-based Common Tactical Radio System (GTRS), currently in development by the Swedish Armed Forces, is designed for use in diverse geographical settings and for purposes varying from international combat missions to national contingency operations. However, protecting these networks from attacks and safeguarding the carried information against leaks is an ongoing research challenge, especially in combined scenarios where tactical data may flow across organizational boundaries. This paper presents a best-effort approach to Data Leakage Prevention (DLP) for inter-organizational RRS-based networks. The proposed architecture makes use of data mining techniques and an efficient n-dimensional clustering algorithm which has previously been successfully used for real-time anomaly detection in critical infrastructure protection. The DLP architecture is developed as an extension to the GTRS system, modeled and simulated in OPNET™ Modeler. Our results show that common data leaks can be efficiently identified by the proposed scheme, while keeping the important false positive rate at a very low level.
  •  
2.
  • Franke, Ulrik, et al. (författare)
  • What can we learn from enterprise architecture models? : An experiment comparing models and documents for capability development
  • 2018
  • Ingår i: Software and Systems Modeling. - : Springer. - 1619-1366 .- 1619-1374. ; 17:2, s. 695-711
  • Tidskriftsartikel (refereegranskat)abstract
    • Enterprise architecture (EA) has been established as a discipline to cope with the complex interactions of business operations and technology. Models, i.e., formal descriptions in terms of diagrams and views, are at the heart of the approach. Though it is widely thought that such architecture models can contribute to improved understanding and decision making, this proposition has not rigorously been tested. This article describes an experiment conducted with a real EA model and corresponding real traditional documents, investigating whether the model or the documents lead to better and faster understanding. Understanding is interesting to study, as it is a prerequisite to other EA uses. The subjects (N = 98) were officer cadets, and the experiment was carried out using a comprehensive description of military Close Air Support capability either (1) in the form of a MODAF model or (2) in the form of traditional documents. Based on the results, the model seems to lead to better, though not faster, understanding.
  •  
3.
  • Jiang, Zhihan, et al. (författare)
  • Leveraging Machine Learning for Disease Diagnoses based on Wearable Devices : A Survey
  • 2023
  • Ingår i: IEEE Internet of Things Journal. - : Institute of Electrical and Electronics Engineers (IEEE). - 2327-4662. ; 10:24, s. 21959-21981
  • Tidskriftsartikel (refereegranskat)abstract
    • Many countries around the world are facing a shortage of healthcare resources, especially during the post-epidemic era, leading to a dramatic increase in the need for self-detection and self-management of diseases. The popularity of smart wearable devices, such as smartwatches, and the development of machine learning bring new opportunities for the early detection and management of various prevalent diseases, such as cardiovascular diseases, Parkinson’s disease, and diabetes. In this survey, we comprehensively review the articles related to specific diseases or health issues based on small wearable devices and machine learning. More specifically, we first present an overview of the articles selected and classify them according to their targeted diseases. Then, we summarize their objectives, wearable device and sensor data, machine learning techniques, and wearing locations. Based on the literature review, we discuss the challenges and propose future directions from the perspectives of privacy concerns, security concerns, transmission latency and reliability, energy consumption, multi-modality, multi-sensor, multi-devices, evaluation metrics, explainability, generalization and personalization, social influence, and human factors, aiming to inspire researchers in this field.
  •  
4.
  • Johansson, Linda (författare)
  • Hopp eller hot : om artificiell intelligens
  • 2021. - 1
  • Ingår i: Känsliga frågor, nödvändiga samtal. - Lund : Studentlitteratur AB. - 9789144137346 ; , s. 145-160
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)
  •  
5.
  • Litzinger, Paul, et al. (författare)
  • Using Weather Information to Improve Route Planning
  • 2012
  • Ingår i: Bridging the Geographic Information Sciences. - : Springer Berlin/Heidelberg. - 9783642290633 ; , s. 199-214
  • Bokkapitel (refereegranskat)abstract
    • Weather has a significant influence on navigation processes. Driving dur-ing a heavy rain, for example, is slower and due to poor visibility more dangerous than driving in perfect weather conditions. Thus from time management and safety perspective including weather information is bene-ficial. Weather, especially rain may also be critical for transportation tasks since some commodities like straw or sand should not get wet. In the last years, the quality of weather information and weather forecast has im-proved and could be used to improve route planning. The paper discusses how weather information can be included in route planning algorithms. A first approximating algorithm to incorporate weather forecast data is pre-sented. Some examples showing the impact on route planning conclude the paper.
  •  
6.
  • Berggren, Peter, et al. (författare)
  • Assessing team focused behaviors in emergency response teams using the shared priorities measure
  • 2014
  • Ingår i: Proceedings of the 11th International ISCRAM Conference. - Pennsylvania, USA : ISCRAM. ; , s. 130-134, s. 130-134
  • Konferensbidrag (refereegranskat)abstract
    • The purpose of this work in progress paper is to report on the method development of the Shared Prioritiesmeasure to include content analysis, as a way of gaining a deeper understanding of team work incrisis/emergency response. An experiment is reported where the performance of six trained teams is comparedwith the performance of six non-trained teams. The experiment was performed using an emergency responsemicroworld simulation with a forest fire scenario. Dependent measures were simulation performance, the CrewAwareness Rating Scale (CARS), and content analysis. Trained teams performed better and scored higher onmeasures of team behaviors.
  •  
7.
  • Chaudhary, Waquar Ul Hassan, et al. (författare)
  • Object-based analysis of Multispectral RS Data and GIS for Detection of Climate Change Impact on the Karakoram Range Northern Pakistan
  • 2014
  • Ingår i: Proceedings of the 7th International Congress on Environmental Modelling and Software, June 15-19, San Diego, California, USA. - Manno, Switzerland : International Environmental Modelling and Software Society. - 9788890357442 ; , s. 2036-2043
  • Konferensbidrag (refereegranskat)abstract
    • Changing climate have a great impact on northern area of Pakistan’s environment and is more prone to environmental changes impacts than rest of the country due to its high elevation. However, the results of melting glaciers effect not only the local environment but also the whole country with frequent and heavy floods. Although recent technological development provided solutions of many problems to mankind, the pace of development in the field of environmental preservation technologies are much slower than needed.Remote sensing (RS) from Satellites and Airplanes used in Geographical Information Systems (GIS) are technologies that can aid in understanding the ongoing environmental processes as it enable us to obtain information about vast area and help researchers to observe, understand, forecast and suggest response to changes that occur.It can be natural disasters or man-made disasters and human induced factors. Still analysis accuracy issues are there which plays a vital role for the formulation of any strategy. To achieve better results, object based analysis methods have been tested in here. Various algorithms are developed by the analysts to calculate the magnitude of land cover changes but must be evaluated for each environment that is under observation as for example mountainous areas. Here we have tried object-based methods in comparison with pixel based. Landslides, soil moisture, soil permeability, snow cover and vegetation cover that change during certain period of time can, with those methods, be effectively monitored. The findings were in short;1) Object based analysis shows better accuracy ratio as compared to the pixel based analysis.2) Slow but gradual depletion of snow/ice cover was confirmed in the study area of Karakoram region, Northern Pakistan.3) Snow and ice melting catalyses the floods, mudslides, landslides and lake outburst episodes in the area during last two decades could be clearly observed in the analysed images and survey data.4) Massive landslide/mudslide phenomena was observed in the study area in 2010 and 2012 in Landsat imagery. The artificial lake on the River Hunza was clearly observable in TM and ETM 2010, 2011 and 2012 imagery.5) Bare soil area increased due to glacial retreat therefore gradual increase in the vegetation can be observed from the year 1992 to 2011.
  •  
8.
  • Dougherty, Mark, et al. (författare)
  • The April Fool Turing Test
  • 2006
  • Ingår i: tripleC. - 1726-670X. ; 4:2
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper explores certain issues concerning the Turing test; non-termination, asymmetry and the need for a control experiment. A standard diagonalisation argument to show the non-computability of AI is extended to yields a socalled “April fool Turing test”, which bears some relationship to Wizard of Oz experiments and involves placing several experimental participants in a symmetrical paradox – the “April Fool Turing Test”. The fundamental question which is asked is whether escaping from this paradox is a sign of intelligence. An important ethical consideration with such an experiment is that in order to place humans in such a paradox it is necessary to fool them. Results from an actual April Fool Turing Test experiment are reported. It is concluded that the results clearly illustrate some of the difficulties and paradoxes which surround the classical Turing Test.
  •  
9.
  • Hybrid Warfare : Security and Asymmetric Conflict in International Relations
  • 2021
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • Hybrid Warfare refers to a military strategy that blends conventional warfare, so-called ‘irregular warfare’ and cyber-attacks with other influencing methods, such as fake news, diplomacy and foreign political intervention. As Hybrid Warfare becomes increasingly commonplace, there is an imminent need for research bringing attention to how these challenges can be addressed in order to develop a comprehensive approach towards Hybrid Threats and Hybrid Warfare. This volume supports the development of such an approach by bringing together practitioners and scholarly perspectives on the topic and by covering the threats themselves, as well as the tools and means to counter them, together with a number of real-world case studies.The book covers numerous aspects of current Hybrid Warfare discourses including a discussion of the perspectives of key western actors such as NATO, the US and the EU; an analysis of Russia and China’s Hybrid Warfare capabilities; and the growing threat of cyberwarfare. A range of global case studies – featuring specific examples from the Baltics, Taiwan, Ukraine, Iran and Catalonia – are drawn upon to demonstrate the employment of Hybrid Warfare tactics and how they have been countered in practice. Finally, the editors propose a new method through which to understand the dynamics of Hybrid Threats, Warfare and their countermeasures, termed the ‘Hybridity Blizzard Model’. With a focus on practitioner insight and practicable International Relations theory, this volume is an essential guide to identifying, analysing and countering Hybrid Threats and Warfare.
  •  
10.
  • Sigholm, Johan, et al. (författare)
  • Enhancing Cybersecurity Education through High-Fidelity Live Exercises (HiFLiX)
  • 2019
  • Ingår i: Proceedings of the 52nd Hawaii International Conference on System Sciences. - : IEEE conference proceedings. - 9780998133126 ; , s. 7553-7562
  • Konferensbidrag (refereegranskat)abstract
    • The people responsible for building the IT products and infrastructure of tomorrow – today’s students of the computing disciplines – oftentimes do not have the opportunity or proper motivation to develop cybersecurity skills meeting the needs of the job market. This paper introduces High Fidelity Live eXercises (HiFLiX) a teaching/learning activity designed to expose students to cybersecurity challenges resembling those they could face in a future work environment. We describe a HiFLiX prototype study, conducted as a collaboration between the Massachusetts Institute of Technology’s CyberSecurity@CSAIL research group and NASA’s Jet Propulsion Laboratory. Our analysis indicates that the proposed delivery method met the stipulated cybersecurity educational outcomes and increased the motivation for future cybersecurity studies in the majority of participants. Two previously unknown software flaws were also discovered.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 49
Typ av publikation
konferensbidrag (28)
tidskriftsartikel (12)
bokkapitel (4)
rapport (2)
doktorsavhandling (2)
samlingsverk (redaktörskap) (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (43)
övrigt vetenskapligt/konstnärligt (5)
populärvet., debatt m.m. (1)
Författare/redaktör
Huskaj, Gazmend (11)
Sigholm, Johan (9)
Falco, Gregory (4)
Frank, Anders, 1969- (4)
Boschetti, Nicolò (3)
Wilson, Richard L. (3)
visa fler...
Iftimie, Ion A. (3)
Sivertun, Åke (2)
Johansson, Björn (1)
Westin, Jerker (1)
Dougherty, Mark (1)
Ahlberg, Simon (1)
Ngai, Edith C.-H. (1)
Franke, Ulrik (1)
Bergman, David (1)
Kävrestad, Joakim, 1 ... (1)
Koraeus, Mats, PhD, ... (1)
Johansson, Linda (1)
Brynielsson, Joel (1)
Weissmann, Mikael, D ... (1)
Bjurström, Erik (1)
Backman, Sarah (1)
Wilson, R. L. (1)
Baroutsi, Nicoletta (1)
Berggren, Peter (1)
Turcotte, Isabelle (1)
Tremblay, Sébastien (1)
Bengtsson, Johnny (1)
Schüler, Martin (1)
Wallén, Mattias (1)
Gordon, Nathaniel (1)
Smethurst, Chelsea (1)
Epiphaniou, Gregory (1)
Maple, Carsten (1)
Persson, Anne, Profe ... (1)
Lind, Mats (1)
Chaudhary, Waquar Ul ... (1)
Christensson, S. And ... (1)
Cohen, Mika (1)
Raciti, Massimiliano (1)
Deng, Weipeng (1)
Hemgren Dougherty, S ... (1)
Frank, Anders (1)
Moradian, Esmiralda (1)
Sivertun, Åke, 1950- (1)
Höök, Kristina, Prof ... (1)
Koraeus, Mats (1)
Norsell, Martin, Pro ... (1)
Jørgensen, Kristine, ... (1)
Liu, Jiangchuan (1)
visa färre...
Lärosäte
Högskolan i Skövde (8)
Kungliga Tekniska Högskolan (6)
Linköpings universitet (3)
Uppsala universitet (1)
Högskolan Väst (1)
visa fler...
Jönköping University (1)
RISE (1)
Högskolan Dalarna (1)
visa färre...
Språk
Engelska (47)
Svenska (2)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (49)
Samhällsvetenskap (15)
Teknik (5)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy