Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues
Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generatio...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 135 |
---|---|
container_issue | |
container_start_page | 130 |
container_title | |
container_volume | |
creator | Kostis, T.G. Goudosis, A.K. Galanis, K.G. Katsikas, S.K. |
description | Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment. |
doi_str_mv | 10.1109/EMS.2009.23 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5358814</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5358814</ieee_id><sourcerecordid>5358814</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-a8dcdc6de87c0bda318c1455437cbdfa7355c692e13fe50002ef3dabd750074d3</originalsourceid><addsrcrecordid>eNotkE1LwzAchyMiKLMnj17yBTqT5rXHMacbTAU7zyNN_tXg-mKSIv32FvX044GH5_BD6IaSJaWkvNs8VcuCkHJZsDOUlUoTJUvBtJbk_JcpLzgXjAtyibIYfU0KqaQoJblCzWoYTpPv3nHl2_FkUh_ye2h8Bw6_GmcCXvdjlyC0YOIYAFdTTNBGfAD70fmvESJO_Sy1wzhb-BnSdx8-cQV2DD5NeBfj7Fyji8acImT_u0BvD5vDepvvXx5369U-91SJlBvtrLPSgVaW1M4wqi3lQnCmbO0ao5gQVpYFUNaAIIQU0DBnaqdmUNyxBbr963oAOA7BtyZMR8GEnl9gPyL4WZs</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kostis, T.G. ; Goudosis, A.K. ; Galanis, K.G. ; Katsikas, S.K.</creator><creatorcontrib>Kostis, T.G. ; Goudosis, A.K. ; Galanis, K.G. ; Katsikas, S.K.</creatorcontrib><description>Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment.</description><identifier>ISBN: 9781424453450</identifier><identifier>ISBN: 1424453453</identifier><identifier>EISBN: 9780769538860</identifier><identifier>EISBN: 076953886X</identifier><identifier>DOI: 10.1109/EMS.2009.23</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Communications technology ; Computational modeling ; Computer Network Security ; Computer networks ; Computer security ; Computer simulation ; Electronic countermeasures ; Electronic warfare ; False Computer Host Generator ; False Registration Authority ; Physics ; Public Key Infrastructure ; Radar countermeasures</subject><ispartof>2009 Third UKSim European Symposium on Computer Modeling and Simulation, 2009, p.130-135</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5358814$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5358814$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kostis, T.G.</creatorcontrib><creatorcontrib>Goudosis, A.K.</creatorcontrib><creatorcontrib>Galanis, K.G.</creatorcontrib><creatorcontrib>Katsikas, S.K.</creatorcontrib><title>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</title><title>2009 Third UKSim European Symposium on Computer Modeling and Simulation</title><addtitle>ECMS</addtitle><description>Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment.</description><subject>Communication system security</subject><subject>Communications technology</subject><subject>Computational modeling</subject><subject>Computer Network Security</subject><subject>Computer networks</subject><subject>Computer security</subject><subject>Computer simulation</subject><subject>Electronic countermeasures</subject><subject>Electronic warfare</subject><subject>False Computer Host Generator</subject><subject>False Registration Authority</subject><subject>Physics</subject><subject>Public Key Infrastructure</subject><subject>Radar countermeasures</subject><isbn>9781424453450</isbn><isbn>1424453453</isbn><isbn>9780769538860</isbn><isbn>076953886X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkE1LwzAchyMiKLMnj17yBTqT5rXHMacbTAU7zyNN_tXg-mKSIv32FvX044GH5_BD6IaSJaWkvNs8VcuCkHJZsDOUlUoTJUvBtJbk_JcpLzgXjAtyibIYfU0KqaQoJblCzWoYTpPv3nHl2_FkUh_ye2h8Bw6_GmcCXvdjlyC0YOIYAFdTTNBGfAD70fmvESJO_Sy1wzhb-BnSdx8-cQV2DD5NeBfj7Fyji8acImT_u0BvD5vDepvvXx5369U-91SJlBvtrLPSgVaW1M4wqi3lQnCmbO0ao5gQVpYFUNaAIIQU0DBnaqdmUNyxBbr963oAOA7BtyZMR8GEnl9gPyL4WZs</recordid><startdate>200911</startdate><enddate>200911</enddate><creator>Kostis, T.G.</creator><creator>Goudosis, A.K.</creator><creator>Galanis, K.G.</creator><creator>Katsikas, S.K.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200911</creationdate><title>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</title><author>Kostis, T.G. ; Goudosis, A.K. ; Galanis, K.G. ; Katsikas, S.K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-a8dcdc6de87c0bda318c1455437cbdfa7355c692e13fe50002ef3dabd750074d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Communication system security</topic><topic>Communications technology</topic><topic>Computational modeling</topic><topic>Computer Network Security</topic><topic>Computer networks</topic><topic>Computer security</topic><topic>Computer simulation</topic><topic>Electronic countermeasures</topic><topic>Electronic warfare</topic><topic>False Computer Host Generator</topic><topic>False Registration Authority</topic><topic>Physics</topic><topic>Public Key Infrastructure</topic><topic>Radar countermeasures</topic><toplevel>online_resources</toplevel><creatorcontrib>Kostis, T.G.</creatorcontrib><creatorcontrib>Goudosis, A.K.</creatorcontrib><creatorcontrib>Galanis, K.G.</creatorcontrib><creatorcontrib>Katsikas, S.K.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kostis, T.G.</au><au>Goudosis, A.K.</au><au>Galanis, K.G.</au><au>Katsikas, S.K.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues</atitle><btitle>2009 Third UKSim European Symposium on Computer Modeling and Simulation</btitle><stitle>ECMS</stitle><date>2009-11</date><risdate>2009</risdate><spage>130</spage><epage>135</epage><pages>130-135</pages><isbn>9781424453450</isbn><isbn>1424453453</isbn><eisbn>9780769538860</eisbn><eisbn>076953886X</eisbn><abstract>Electronic warfare and computer network warfare operations are conducted into different action theatres and employ assorted laws of physics, technological assets, communications mediums and even political doctrines. Simulator-defined countermeasure systems concepts and techniques allow the generation of false naval targets for the purpose of security by obscurity in the field of electronic warfare. This paper proposes that the experience and expertise of creating simulator-defined false naval targets is very beneficial to the field of security by obscurity for computer network warfare. The conceptual modelling electronic warfare methodology can be applied to the creation of false Registration Authorities. Moreover Public Key Infrastructure database maintenance actions can be conducted by using modularity and increased complexity techniques acquired again from the electronic warfare simulator duality. Many similar if even identical entities, processes, implementation procedures and maintenance techniques are detected and clearly identified leading to the conclusion that research in one discipline is very beneficial to the other in terms of design time overhead, maintenance time turnover and return on investment.</abstract><pub>IEEE</pub><doi>10.1109/EMS.2009.23</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424453450 |
ispartof | 2009 Third UKSim European Symposium on Computer Modeling and Simulation, 2009, p.130-135 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5358814 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Communication system security Communications technology Computational modeling Computer Network Security Computer networks Computer security Computer simulation Electronic countermeasures Electronic warfare False Computer Host Generator False Registration Authority Physics Public Key Infrastructure Radar countermeasures |
title | Applying Simulator-Defined Radar Countermeasure Systems Techniques to Computer Network Security Issues |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T10%3A00%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Applying%20Simulator-Defined%20Radar%20Countermeasure%20Systems%20Techniques%20to%20Computer%20Network%20Security%20Issues&rft.btitle=2009%20Third%20UKSim%20European%20Symposium%20on%20Computer%20Modeling%20and%20Simulation&rft.au=Kostis,%20T.G.&rft.date=2009-11&rft.spage=130&rft.epage=135&rft.pages=130-135&rft.isbn=9781424453450&rft.isbn_list=1424453453&rft_id=info:doi/10.1109/EMS.2009.23&rft_dat=%3Cieee_6IE%3E5358814%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769538860&rft.eisbn_list=076953886X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5358814&rfr_iscdi=true |