22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The CoNSIS Approaches to Network Management <strong>and</strong> Monitoring .......................... 161<br />

Christoph Barz, Anne Diefenbach, Fatih Abut, Matthias Wilmes, Peter Sevenich,<br />

Pierre Simon, Norbert Bret<br />

Multi-Topology Routing for QoS Support in the CoNSIS Convoy MANET .................... 179<br />

Mariann Hauge, Jon Andersson, Margrete A. Brose, Jostein S<strong>and</strong>er<br />

Chapter 3<br />

<strong>Information</strong> <strong>Technology</strong> for Interoperability <strong>and</strong> Decision Support Enhancement ........ 199<br />

Mathematical Foundations of Interoperability <strong>and</strong> Composability ........................... 201<br />

Andreas Tolk<br />

Semantic Interoperability by Means of Computer Languages ............................... 209<br />

Ľubomír Dedera<br />

Semantic Model for Context – Aware Service Provision in Disadvantaged Network Environment ...221<br />

Joanna Śliwa<br />

Run-Time Ontology on the Basis of Event Notification Service .............................. 239<br />

Kamil Gleba, Joanna Śliwa, Damian Duda, Joanna Głowacka, Piotr Pyda<br />

A Robust <strong>and</strong> Scalable Peer-to-Peer Publish/Subscribe Mechanism .......................... 253<br />

Tobias Ginzler<br />

Automatic Exploitation of Multilingual <strong>Information</strong> for <strong>Military</strong> Intelligence Purposes .......... 265<br />

S<strong>and</strong>ra Noubours, Matthias Hecking<br />

<strong>Information</strong> Fusion Under Network Constraints .......................................... 281<br />

Felix Govaers, Alex<strong>and</strong>er Charlish, Wolfgang Koch<br />

Examination of Combination Rules for the Purpose of <strong>Information</strong> Fusion in C2 Systems ....... 295<br />

Ksawery Krenc<br />

Comm<strong>and</strong>ing Multi-Robot Systems with Robot Operating System Using Battle<br />

Management Language .............................................................. 305<br />

Thomas Remmersmann, Alex<strong>and</strong>er Tiderko, Marco Langerwisch,<br />

Stefan Thamke, Markus Ax<br />

Application of CID Server in Decision Support for Comm<strong>and</strong> <strong>and</strong> Control .................... 317<br />

Krzysztof Muchewicz, Marek Piotrowski, Henryk Kruszyński, Robert Palka<br />

Managing Lessons Learnt from Daily Missions – Methodology <strong>and</strong> Tool ...................... 331<br />

Witold Hołubowicz, Wojciech Dymowski, Tomasz Springer<br />

Chapter 4<br />

<strong>Information</strong> Assurance & Cyber Defence ............................................. 345<br />

Federated Cyber Defence System – Applied Methods <strong>and</strong> Techniques ......................... 347<br />

Bartosz Jasiul, Rafał Piotrowski, Przemysław Bereziński, Michał Choraś,<br />

Rafał Kozik, Juliusz Brzostek<br />

Identity <strong>and</strong> Access Services in NATO Federation Scenarios ................................ 359<br />

Robert Malewicz, Rui Fiske, Graeme Lunt<br />

Development of High Assurance Guards for NATO ....................................... 377<br />

Konrad Wrona, Geir Hallingstad<br />

Network Traffic Characteristics for Detecting Future Botnets ............................... 395<br />

Jonathan P. Chapman, Felix Govaers

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!