Replication Does Survive Information Warfare Attacks

نویسنده

  • John P. McDermott
چکیده

Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Orientation step of the OODA loop and Information Warfare

This paper develops a theoretical model of the internal processes of the Orientation step of Boyd's OODA loop model. The Orientation step is important from an Information Warfare perspective as it is where the decision-maker combines their existing knowledge with new information. Any new information is a potential target for manipulation by Information Warfare attacks. The operation of the two ...

متن کامل

Designing Cyber Warfare Information Infrastructure Resilience

Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...

متن کامل

B IRTH ORDER IN PROGENIES OF CHEM ICAL WARFARE-INTOXICATED IRANIAN PEOPLE

In the present work we studied the birth order in progenies of lranian survivors of Iraqi chemical attacks during a period from 1984 to 1989. Then we compared the results with the birth order of the control group. Despite a slight difference between the birth order in the two groups of progenies, this was not statistically significant. This does not mean, however, that there are no genetic ...

متن کامل

Resilient Image Fusion

The paper describes a distributed spectral-screening PCT algorithm for fusing hyper-spectral images in remote sensing applications. The algorithm provides intrusion tolerance from information warfare attacks using the notion of computational resiliency. This concept uses replication to achieve fault tolerance, but goes further to dynamically regenerate replication in response to an attack or fa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997