Cart (Loading....) | Create Account
Close category search window
 

Modeling of information dominance in complex systems: a system partitioning and hybrid control framework

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
James, J.R. ; Dept. of Electr. Eng., United States Mil. Acad., West Point, NY, USA

This paper provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of earlier efforts to base analysis of information assurance for complex systems on system partitioning into a system of systems. The approach discussed rests upon the notion that the system at hand is intended to achieve some useful purpose and that a system of systems approach provides a feasible methodology for composing the system functionality (behaviors) as an aggregation of sub-systems functionality. Many subsystem processes have continuous process models while higher system models are usually discrete. Composition of components requires consideration of interaction of subsystems, especially when feedback loops are present. A model of information assurance (IA) processes consistent with this hybrid system model of complex processes is described. Information dominance is defined as superior situation understanding and superior support for making decisions under uncertainty. The information dominance model is then presented as an extension of the AI model. The paper concludes with a conjecture that more effective intrusion detection can be achieved by using the known purpose of an information system (e.g. achieving information dominance in support of an operation) to guide allocation of intrusion detection resources.

Published in:

System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on

Date of Conference:

6-9 Jan. 2003

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.