Engineering of software-intensive systems: state of the art and research challenges

M Hölzl, A Rauschmayer, M Wirsing - Software-Intensive Systems and …, 2008 - Springer
Software-intensive systems become more and more important in our everyday lives. But
their increasing complexity makes it difficult to develop and maintain them. This chapter …

Information-theoretic models of deception: Modelling cooperation and diffusion in populations exposed to" fake news"

C Kopp, KB Korb, BI Mills - PloS one, 2018 - journals.plos.org
The modelling of deceptions in game theory and decision theory has not been well studied,
despite the increasing importance of this problem in social media, public discourse, and …

[图书][B] The evolution of cyber war: International norms for emerging-technology weapons

BM Mazanec - 2015 - books.google.com
" In January 2014 Pope Francis called the Internet a" gift from God." Months later former
Secretary of Defense, Leon Panetta, described cyber warfare as" the most serious threat in …

[图书][B] Mikroprozessortechnik: Grundlagen, Architekturen, Schaltungstechnik und Betrieb von Mikroprozessoren und Mikrocontrollern

K Wüst - 2010 - books.google.com
Das Lehrbuch führt von den Grundlagen über einfache Mikroprozessoren bis hin zu
superskalaren Prozessoren, Mikrocontrollern und digitalen Signalprozessoren. Eine …

[图书][B] Mikroprozessortechnik

K Wüst - 2011 - Springer
Die Mikroprozessortechnik in einem Buch von ca. 250 Seiten–geht das? Kann man einen
Bereich der Technik so kompakt darstellen, der sich wie eine Supernova entwickelt und …

[HTML][HTML] Cutting through the tangled web: An information-theoretic perspective on information warfare

L Brumley, C Kopp, KB Korb - Air Power Australia Analyses, 2012 - ausairpower.net
Information Warfare, which is the competitive use of information in survival contests, has
been a pervasive feature of conflicts since the beginnings of recorded history. The advent of …

A NSGA-II, web-enabled, parallel optimization framework for NLP and MINLP

D Powell, J Hollingsworth - Proceedings of the 9th annual conference on …, 2007 - dl.acm.org
Engineering design increasingly uses computer simulation models coupled with
optimization algorithms to find the best design that meets the customer constraints within a …

Misperception and its evolutionary value

L Brumley - 2014 - bridges.monash.edu
Misperception has a detrimental effect on an entity's perception of its environment, which
can affect its decision-making abilities. To those with a perfect perception of an environment …

The Impact of Cyber-Physical Warfare on Global Human Security

BR Payne, EL Mienie - International Journal of Cyber Warfare and …, 2019 - igi-global.com
Cyber is deeply enmeshed and interwoven across national security, as evidenced by its
inclusion in the national security policies of a growing number of OECD countries. But it is …

Fifteen constraints on the capability of high-capacity mobile military networked systems

C Kopp - Journal of Battlefield Technology, 2007 - search.informit.org
The network centric warfare (NCW) model represents one of the defining trends in
information age military technique. Its aim is to improve situational awareness …