A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar - ACM Computing Surveys, 2023 - dl.acm.org
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …

Service oriented architecture (SOA): a literature review on the maintainability, approaches and design process

L Haorongbam, R Nagpal… - 2022 12th International …, 2022 - ieeexplore.ieee.org
The majority of software efficiency is likely to be supplied and absorbed as services in the
future. Undoubtedly, they might be implemented as closely connected technologies …

Knowledge Acquisition, Representation, Processing & Presentation (KARPP)

KJ Hintz, J Llinas, K Sentz - 2024 IEEE Conference on …, 2024 - ieeexplore.ieee.org
Knowledge Acquisition, Representation, Processing, & Presentation (KARPP) is a new
system level approach to the acquisition and aggregation of mission-valued and qualified …

Constrained connectivity in bounded X-width multi-interface networks

A Aloisio, A Navarra - Algorithms, 2020 - mdpi.com
As technology advances and the spreading of wireless devices grows, the establishment of
interconnection networks is becoming crucial. Main activities that involve most of the people …

Distributing energy consumption in multi-interface series-parallel networks

A Aloisio, A Navarra, L Mostarda - Workshops of the International …, 2019 - Springer
Nowadays, communication networks are composed by heterogeneous devices that can
communicate by means of multiple interfaces. By choosing which interfaces to activate …

Energy consumption balancing in multi-interface networks

A Aloisio, A Navarra, L Mostarda - Journal of Ambient Intelligence and …, 2020 - Springer
In heterogeneous networks, devices can communicate by means of multiple interfaces. By
choosing which interfaces to activate (switch-on) at each device, several connections might …

Securing tactical service oriented architectures

V Gkioulos, SD Wolthusen - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Service Oriented Architectures have been increasingly evaluated and applied within military
networks. However, existing implementations tend to overlook the constraints of the tactical …

Distributed composition of highly-collaborative services and sensors in tactical domains

A Perucci, M Autili, M Tivoli, A Aloisio… - Proceedings of 6th …, 2020 - Springer
Software systems are often built by composing services distributed over the network.
Choreographies are a form of decentralized composition that models the external interaction …

Interoperability of security and quality of Service Policies Over Tactical SOA

G Vasileios, SD Wolthusen… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
Tactical networks are constrained networks that may transition between ad-hoc and mesh
configurations and are characterised by frequent disruptions, changes in connectivity, and …

Coverage subject to a budget on multi-interface networks with bounded carving-width

A Aloisio - Workshops of the International Conference on …, 2020 - Springer
This paper studies a new variant of the so-called Coverage problem relative to the Multi-
Interface networks model. Multi-Interface models have been extensively studied in the last …