Results 21 to 30 of about 4,395 (228)

An empirical analysis of sentencing of “Access to Information” computer crimes

open access: yesJournal of Empirical Legal Studies, Volume 20, Issue 2, Page 434-471, June 2023., 2023
Abstract There is a widespread perception that computer crime sentencing is too harsh. But this criticism has occurred in the absence of comprehensive, multi‐year data on how computer crimes are actually sentenced and how those sentences compare to other, purportedly similar crimes, such as trespass, burglary, or fraud. This article uses an analysis of
James T. Graves, Alessandro Acquisti
wiley   +1 more source

xDEVS: A toolkit for interoperable modeling and simulation of formal discrete event systems

open access: yesSoftware: Practice and Experience, Volume 53, Issue 3, Page 748-789, March 2023., 2023
Abstract Employing Modeling and Simulation (M&S) extensively to analyze and develop complex systems is the norm today. The use of robust M&S formalisms and rigorous methodologies is essential to deal with complexity. Among them, the Discrete Event System Specification (DEVS) provides a solid framework for modeling structural, behavior and information ...
José L. Risco‐Martín   +4 more
wiley   +1 more source

Simulation-Supported Wargaming for Assessing Force Structures

open access: yesScandinavian Journal of Military Studies, 2022
Wargaming is a key activity for gaining deeper insight into the strengths and weaknesses of future force structures in the course of their development and assessment.
Per-Idar Evensen   +3 more
doaj   +1 more source

Artificial Intelligence in the Military: An Overview of the Capabilities, Applications, and Challenges

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
Artificial intelligence (AI) has become a reality in today’s world with the rise of the 4th industrial revolution, especially in the armed forces. Military AI systems can process more data more effectively than traditional systems. Due to its intrinsic computing and decision‐making capabilities, AI also increases combat systems’ self‐control, self ...
Adib Bin Rashid   +4 more
wiley   +1 more source

Wargaming and The Cycle of Research and Learning

open access: yesScandinavian Journal of Military Studies, 2022
Some thirty years ago, I coined the concept of the 'Cycle of Research', which described how wargaming, exercises and analysis, coupled with real-world operations and history, have worked together in concert to help the national-security community to ...
Peter Perla
doaj   +1 more source

[Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique

open access: yesMobile Information Systems, Volume 2022, Issue 1, 2022., 2022
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its applicability as a 21st‐century business tool and its survivability in a security threat‐infested cyber landscape. WLAN security leverages the Wardriving technique deployed within geolocation to scan for WLAN density and explore the associated security ...
Victor Ojong Etta   +5 more
wiley   +1 more source

A Defense Strategy Selection Method Based on the Cyberspace Wargame Model

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Network defenders always face the problem of how to use limited resources to make the most reasonable decision. The network attack‐defense game model is an effective means to solve this problem. However, existing network attack‐defense game models usually assume that defenders will no longer change defense strategies after deploying them.
Yuwen Zhu   +4 more
wiley   +1 more source

Wargames as Data: Addressing the Wargamer's Trilemma

open access: yes, 2023
Policymakers often want the very best data with which to make decisions--particularly when concerned with questions of national and international security. But what happens when this data is not available? In those instances, analysts have come to rely on synthetic data-generating processes--turning to modeling and simulation tools and survey ...
Reddie, Andrew W.   +4 more
openaire   +2 more sources

Developing interest management techniques in distributed interactive simulation using Java [PDF]

open access: yes, 1999
Bandwidth consumption in distributed real time simulation, or networked real time simulation, is a major problem as the number of participants and the sophistication of joint simulation exercises grow in size.
Saville, J, Sudra, R, Taylor, SJE
core   +1 more source

Wargaming as a Form of Historical Simulation

open access: yesВестник Волгоградского государственного университета. Серия 4. История, регионоведение, международные отношения, 2020
Introduction. Wargames are an ancient invention of humankind. A new type of wargames was made in the 19th century. Further it went through the evolution from a military application to historical simulation that can be used as a mathematical model in ...
Artem I. Kharinin, Larisa V. Kharinina
doaj   +1 more source

Home - About - Disclaimer - Privacy