Agent-based simulation approach to information warfare in the SEAS environment
Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same ba...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 10 pp. vol.1 |
container_title | |
container_volume | |
creator | Chaturvedi, A.R. Gupta, M. Mehta, S.R. Yue, W.T. |
description | Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University. |
doi_str_mv | 10.1109/HICSS.2000.926647 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_6IE</sourceid><recordid>TN_cdi_ieee_primary_926647</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>926647</ieee_id><sourcerecordid>27526455</sourcerecordid><originalsourceid>FETCH-LOGICAL-i188t-7fe15bd2d8964b3bc14327761533a935b90f8527d8c2cbff1391f9649c5398af3</originalsourceid><addsrcrecordid>eNotkEtLw0AYRQdUsNb-AF3Nyl3qvB_LUqotFF1E12GSfGNH8nImVfz3BuLqwuVwuFyE7ihZU0rs4_6wzfM1I4SsLVNK6At0Q7SykgjLySVaUKJIxgWT12iV0ucEEimNsWKBXjYf0I1Z6RLUOIX23Lgx9B12wxB7V53w2OPQ-T62c__joncRpg6PJ8D5bpNj6L5D7Lt2Et2iK--aBKv_XKL3p93bdp8dX58P280xC9SYMdMeqCxrVhurRMnLigrOtFZUcu4sl6Ul3kima1OxqvSeckv9hNpKcmuc50v0MHunlV9nSGPRhlRB07gO-nMqmJZMCSkn8H4GAwAUQwyti7_FfBP_Az9RW4U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>27526455</pqid></control><display><type>conference_proceeding</type><title>Agent-based simulation approach to information warfare in the SEAS environment</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Chaturvedi, A.R. ; Gupta, M. ; Mehta, S.R. ; Yue, W.T.</creator><creatorcontrib>Chaturvedi, A.R. ; Gupta, M. ; Mehta, S.R. ; Yue, W.T.</creatorcontrib><description>Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University.</description><identifier>ISSN: 1060-3425</identifier><identifier>ISBN: 0769504930</identifier><identifier>ISBN: 9780769504933</identifier><identifier>DOI: 10.1109/HICSS.2000.926647</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Computational modeling ; Computer hacking ; Government ; Information systems ; Military computing ; Modems ; Protection ; Software tools ; Telephony</subject><ispartof>Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000, p.10 pp. vol.1</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/926647$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,314,776,780,785,786,2052,4036,4037,27901,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/926647$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Chaturvedi, A.R.</creatorcontrib><creatorcontrib>Gupta, M.</creatorcontrib><creatorcontrib>Mehta, S.R.</creatorcontrib><creatorcontrib>Yue, W.T.</creatorcontrib><title>Agent-based simulation approach to information warfare in the SEAS environment</title><title>Proceedings of the 33rd Annual Hawaii International Conference on System Sciences</title><addtitle>HICSS</addtitle><description>Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University.</description><subject>Analytical models</subject><subject>Computational modeling</subject><subject>Computer hacking</subject><subject>Government</subject><subject>Information systems</subject><subject>Military computing</subject><subject>Modems</subject><subject>Protection</subject><subject>Software tools</subject><subject>Telephony</subject><issn>1060-3425</issn><isbn>0769504930</isbn><isbn>9780769504933</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2000</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkEtLw0AYRQdUsNb-AF3Nyl3qvB_LUqotFF1E12GSfGNH8nImVfz3BuLqwuVwuFyE7ihZU0rs4_6wzfM1I4SsLVNK6At0Q7SykgjLySVaUKJIxgWT12iV0ucEEimNsWKBXjYf0I1Z6RLUOIX23Lgx9B12wxB7V53w2OPQ-T62c__joncRpg6PJ8D5bpNj6L5D7Lt2Et2iK--aBKv_XKL3p93bdp8dX58P280xC9SYMdMeqCxrVhurRMnLigrOtFZUcu4sl6Ul3kima1OxqvSeckv9hNpKcmuc50v0MHunlV9nSGPRhlRB07gO-nMqmJZMCSkn8H4GAwAUQwyti7_FfBP_Az9RW4U</recordid><startdate>2000</startdate><enddate>2000</enddate><creator>Chaturvedi, A.R.</creator><creator>Gupta, M.</creator><creator>Mehta, S.R.</creator><creator>Yue, W.T.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2000</creationdate><title>Agent-based simulation approach to information warfare in the SEAS environment</title><author>Chaturvedi, A.R. ; Gupta, M. ; Mehta, S.R. ; Yue, W.T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i188t-7fe15bd2d8964b3bc14327761533a935b90f8527d8c2cbff1391f9649c5398af3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2000</creationdate><topic>Analytical models</topic><topic>Computational modeling</topic><topic>Computer hacking</topic><topic>Government</topic><topic>Information systems</topic><topic>Military computing</topic><topic>Modems</topic><topic>Protection</topic><topic>Software tools</topic><topic>Telephony</topic><toplevel>online_resources</toplevel><creatorcontrib>Chaturvedi, A.R.</creatorcontrib><creatorcontrib>Gupta, M.</creatorcontrib><creatorcontrib>Mehta, S.R.</creatorcontrib><creatorcontrib>Yue, W.T.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Chaturvedi, A.R.</au><au>Gupta, M.</au><au>Mehta, S.R.</au><au>Yue, W.T.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Agent-based simulation approach to information warfare in the SEAS environment</atitle><btitle>Proceedings of the 33rd Annual Hawaii International Conference on System Sciences</btitle><stitle>HICSS</stitle><date>2000</date><risdate>2000</risdate><spage>10 pp. vol.1</spage><pages>10 pp. vol.1-</pages><issn>1060-3425</issn><isbn>0769504930</isbn><isbn>9780769504933</isbn><abstract>Information warfare refers to actions taken by an agent to achieve information superiority in support of national military strategy by affecting an adversary's information and information systems while leveraging and protecting its own information and information systems. It employs the same basic tools as used by hackers and criminals: computer, modem, telephone, and software. The paper analyzes the behaviors of the three major types of agents: government, firms and perpetrators in an experimental setting. The experiments were designed and conducted at the Synthetic Environment for Analysis and Simulation (SEAS) Lab at Krannert Graduate School of Management, Purdue University.</abstract><pub>IEEE</pub><doi>10.1109/HICSS.2000.926647</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1060-3425 |
ispartof | Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000, p.10 pp. vol.1 |
issn | 1060-3425 |
language | eng |
recordid | cdi_ieee_primary_926647 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Analytical models Computational modeling Computer hacking Government Information systems Military computing Modems Protection Software tools Telephony |
title | Agent-based simulation approach to information warfare in the SEAS environment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T14%3A19%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Agent-based%20simulation%20approach%20to%20information%20warfare%20in%20the%20SEAS%20environment&rft.btitle=Proceedings%20of%20the%2033rd%20Annual%20Hawaii%20International%20Conference%20on%20System%20Sciences&rft.au=Chaturvedi,%20A.R.&rft.date=2000&rft.spage=10%20pp.%20vol.1&rft.pages=10%20pp.%20vol.1-&rft.issn=1060-3425&rft.isbn=0769504930&rft.isbn_list=9780769504933&rft_id=info:doi/10.1109/HICSS.2000.926647&rft_dat=%3Cproquest_6IE%3E27526455%3C/proquest_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=27526455&rft_id=info:pmid/&rft_ieee_id=926647&rfr_iscdi=true |