Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
نویسندگان
چکیده
منابع مشابه
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics, and science undergraduates. The competition included a cryptography problem, for which a workshop was run during the conference. This paper describes the competition, focusing on the cryptography problem and the workshop. Notes from the workshop and code for th...
متن کاملHacker Wars: E-Collaboration by Vandals and Warriors
This chapter develops an analytical framework for new forms of information warfare that may threaten commercial and government computing systems by using e-collaboration in new ways. The framework covers (1) strategic model, (2) strategic arena, (3) e-collaboration, and (4) ethics and law. The framework then is used to compare two recorded instances of major hacker wars that erupted in the shad...
متن کاملBrilliANT: An Entry for the GECCO’2007 Ant Wars Contest
One of our first observations concerning Ant Wars was that ant’s field of view (FOV) is rather small (24 fields when excluding the actual ant’s position). If one considers food locations only and takes into account rotational invariance and symmetry, there are 2/4/2 = 2 = 2097152 unique FOV states (when ignoring the constraint placed on the amount of food and the existence of opponent). As FOV ...
متن کاملSystems Engineering of Air and Missile Defenses
n the Air Defense Systems Department, systems engineering is a way of thinking. More than a “process,” the systems perspective drives our approach to solving emerging air and missile defense problems as the threat becomes more advanced and the tactical environment more complex. This perspective and the requisite tools have evolved with the increasing complexity of those systems. In this article...
متن کاملCryptography during the French and American Wars in Vietnam
After Vietnam’s Declaration of Independence on 2 September 1945, the country had to suffer through two long, brutal wars, first against the French and then against the Americans, before finally in 1975 becoming a unified country free of colonial domination. Our purpose is to examine the role of cryptography in those two wars. Despite the far greater technological resources of their opponents, t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptologia
سال: 2006
ISSN: 0161-1194,1558-1586
DOI: 10.1080/01611190500401144