Agent-based simulation approach to information warfare in the SEAS environment

Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same ba...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chaturvedi, A.R., Gupta, M., Mehta, S.R., Yue, W.T.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 10 pp. vol.1
container_title
container_volume
creator Chaturvedi, A.R.
Gupta, M.
Mehta, S.R.
Yue, W.T.
description Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University.
doi_str_mv 10.1109/HICSS.2000.926647
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_6IE</sourceid><recordid>TN_cdi_ieee_primary_926647</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>926647</ieee_id><sourcerecordid>27526455</sourcerecordid><originalsourceid>FETCH-LOGICAL-i188t-7fe15bd2d8964b3bc14327761533a935b90f8527d8c2cbff1391f9649c5398af3</originalsourceid><addsrcrecordid>eNotkEtLw0AYRQdUsNb-AF3Nyl3qvB_LUqotFF1E12GSfGNH8nImVfz3BuLqwuVwuFyE7ihZU0rs4_6wzfM1I4SsLVNK6At0Q7SykgjLySVaUKJIxgWT12iV0ucEEimNsWKBXjYf0I1Z6RLUOIX23Lgx9B12wxB7V53w2OPQ-T62c__joncRpg6PJ8D5bpNj6L5D7Lt2Et2iK--aBKv_XKL3p93bdp8dX58P280xC9SYMdMeqCxrVhurRMnLigrOtFZUcu4sl6Ul3kima1OxqvSeckv9hNpKcmuc50v0MHunlV9nSGPRhlRB07gO-nMqmJZMCSkn8H4GAwAUQwyti7_FfBP_Az9RW4U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>27526455</pqid></control><display><type>conference_proceeding</type><title>Agent-based simulation approach to information warfare in the SEAS environment</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chaturvedi, A.R. ; Gupta, M. ; Mehta, S.R. ; Yue, W.T.</creator><creatorcontrib>Chaturvedi, A.R. ; Gupta, M. ; Mehta, S.R. ; Yue, W.T.</creatorcontrib><description>Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University.</description><identifier>ISSN: 1060-3425</identifier><identifier>ISBN: 0769504930</identifier><identifier>ISBN: 9780769504933</identifier><identifier>DOI: 10.1109/HICSS.2000.926647</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Computational modeling ; Computer hacking ; Government ; Information systems ; Military computing ; Modems ; Protection ; Software tools ; Telephony</subject><ispartof>Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000, p.10 pp. vol.1</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/926647$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,314,776,780,785,786,2052,4036,4037,27901,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/926647$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chaturvedi, A.R.</creatorcontrib><creatorcontrib>Gupta, M.</creatorcontrib><creatorcontrib>Mehta, S.R.</creatorcontrib><creatorcontrib>Yue, W.T.</creatorcontrib><title>Agent-based simulation approach to information warfare in the SEAS environment</title><title>Proceedings of the 33rd Annual Hawaii International Conference on System Sciences</title><addtitle>HICSS</addtitle><description>Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University.</description><subject>Analytical models</subject><subject>Computational modeling</subject><subject>Computer hacking</subject><subject>Government</subject><subject>Information systems</subject><subject>Military computing</subject><subject>Modems</subject><subject>Protection</subject><subject>Software tools</subject><subject>Telephony</subject><issn>1060-3425</issn><isbn>0769504930</isbn><isbn>9780769504933</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2000</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkEtLw0AYRQdUsNb-AF3Nyl3qvB_LUqotFF1E12GSfGNH8nImVfz3BuLqwuVwuFyE7ihZU0rs4_6wzfM1I4SsLVNK6At0Q7SykgjLySVaUKJIxgWT12iV0ucEEimNsWKBXjYf0I1Z6RLUOIX23Lgx9B12wxB7V53w2OPQ-T62c__joncRpg6PJ8D5bpNj6L5D7Lt2Et2iK--aBKv_XKL3p93bdp8dX58P280xC9SYMdMeqCxrVhurRMnLigrOtFZUcu4sl6Ul3kima1OxqvSeckv9hNpKcmuc50v0MHunlV9nSGPRhlRB07gO-nMqmJZMCSkn8H4GAwAUQwyti7_FfBP_Az9RW4U</recordid><startdate>2000</startdate><enddate>2000</enddate><creator>Chaturvedi, A.R.</creator><creator>Gupta, M.</creator><creator>Mehta, S.R.</creator><creator>Yue, W.T.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2000</creationdate><title>Agent-based simulation approach to information warfare in the SEAS environment</title><author>Chaturvedi, A.R. ; Gupta, M. ; Mehta, S.R. ; Yue, W.T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i188t-7fe15bd2d8964b3bc14327761533a935b90f8527d8c2cbff1391f9649c5398af3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2000</creationdate><topic>Analytical models</topic><topic>Computational modeling</topic><topic>Computer hacking</topic><topic>Government</topic><topic>Information systems</topic><topic>Military computing</topic><topic>Modems</topic><topic>Protection</topic><topic>Software tools</topic><topic>Telephony</topic><toplevel>online_resources</toplevel><creatorcontrib>Chaturvedi, A.R.</creatorcontrib><creatorcontrib>Gupta, M.</creatorcontrib><creatorcontrib>Mehta, S.R.</creatorcontrib><creatorcontrib>Yue, W.T.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chaturvedi, A.R.</au><au>Gupta, M.</au><au>Mehta, S.R.</au><au>Yue, W.T.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Agent-based simulation approach to information warfare in the SEAS environment</atitle><btitle>Proceedings of the 33rd Annual Hawaii International Conference on System Sciences</btitle><stitle>HICSS</stitle><date>2000</date><risdate>2000</risdate><spage>10 pp. vol.1</spage><pages>10 pp. vol.1-</pages><issn>1060-3425</issn><isbn>0769504930</isbn><isbn>9780769504933</isbn><abstract>Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University.</abstract><pub>IEEE</pub><doi>10.1109/HICSS.2000.926647</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1060-3425
ispartof Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000, p.10 pp. vol.1
issn 1060-3425
language eng
recordid cdi_ieee_primary_926647
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Analytical models
Computational modeling
Computer hacking
Government
Information systems
Military computing
Modems
Protection
Software tools
Telephony
title Agent-based simulation approach to information warfare in the SEAS environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T14%3A19%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Agent-based%20simulation%20approach%20to%20information%20warfare%20in%20the%20SEAS%20environment&rft.btitle=Proceedings%20of%20the%2033rd%20Annual%20Hawaii%20International%20Conference%20on%20System%20Sciences&rft.au=Chaturvedi,%20A.R.&rft.date=2000&rft.spage=10%20pp.%20vol.1&rft.pages=10%20pp.%20vol.1-&rft.issn=1060-3425&rft.isbn=0769504930&rft.isbn_list=9780769504933&rft_id=info:doi/10.1109/HICSS.2000.926647&rft_dat=%3Cproquest_6IE%3E27526455%3C/proquest_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=27526455&rft_id=info:pmid/&rft_ieee_id=926647&rfr_iscdi=true