File:Using expert systems to conduct vulnerability assessments (IA usingexpertsyste1094532258).pdf
Original file (1,275 × 1,650 pixels, file size: 4.78 MB, MIME type: application/pdf, 112 pages)
Captions
Summary
[edit]Using expert systems to conduct vulnerability assessments ( ) | ||
---|---|---|
Author |
Lankhorst, Debra A. |
|
Title |
Using expert systems to conduct vulnerability assessments |
|
Publisher |
Monterey, California. Naval Postgraduate School |
|
Description |
An Information Warrior faces a complex and dynamic operating environment. To conduct an accurate Vulnerability Assessment and Risk Analysis of the enemy force (or a friendly force), a multitude of cause and effect relationships must be examined. Many times the person at the battle scene conducting the assessment may lack experience and/or knowledge, precluding a time-sensitive and effective assessment The author proposes a framework for a global network of expert systems and decision support systems to conduct the Vulnerability Assessments and maintain Information Warfare readiness through realistic training. The author also presents a Vulnerability Assessment and Risk Analysis heuristic with the objective of expanding the knowledge base and decision speed at the on-scene commander level. In achieving and implementing this global network, numerous benefits can be realized, including increased speed and efficiency in the receipt of intelligence information, thereby allowing for improved decision making capabilities. Since the technology and know-bow are already available, this vision of the global network is attainable and can be successfully implemented and operated. Subjects: |
|
Language | English | |
Publication date |
September 1996 publication_date QS:P577,+1996-09-00T00:00:00Z/10 |
|
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
|
Accession number |
usingexpertsyste1094532258 |
|
Source | ||
Permission (Reusing this file) |
Approved for public release; distribution unlimited. |
Licensing
[edit]Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 19:53, 25 July 2020 | 1,275 × 1,650, 112 pages (4.78 MB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection usingexpertsyste1094532258 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #31639) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | Using expert systems to conduct vulnerability assessments |
---|---|
Author | Lankhorst, Debra A. |
Software used | Lankhorst, Debra A. |
Conversion program | Adobe Acrobat 10.1.6 Paper Capture Plug-in |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |