2015
DOI: 10.1177/1548512915592517
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the agility of adaptive command and control networks from a cyber complex adaptive systems perspective

Abstract: Command and control (C2) networks are critical components of modern military systems, enabling information sharing and communications between systems. These systems operate in complex environments characterized by uncertain and evolving threats, creating a need for agile C2 networks. This paper presents a Cyber Complex Adaptive Systems approach for assessing the agility of adaptive C2 networks. Agent-based modeling is used to simulate the performance of a C2 network connecting unmanned aerial vehicles for a co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 51 publications
1
6
0
Order By: Relevance
“…Our results and findings support the gaps identified in Haghnevis's work by generally extending their mathematical modeling approach for engineered CASs to an agent‐based modeling and simulation approach 59 . Other agent‐based modeling and simulation research reported similar success in establishing a framework for evaluating CASs against different criteria, and this paper extends that research by including a structure within our framework to acquire goals from all stakeholders using KAOS in addition to only mission‐oriented stakeholders 60 . Lastly, this research contributes to the CAS body of knowledge for strengthening processes and means for realizing general and theoretical assertions 61 …”
Section: Discussionsupporting
confidence: 79%
“…Our results and findings support the gaps identified in Haghnevis's work by generally extending their mathematical modeling approach for engineered CASs to an agent‐based modeling and simulation approach 59 . Other agent‐based modeling and simulation research reported similar success in establishing a framework for evaluating CASs against different criteria, and this paper extends that research by including a structure within our framework to acquire goals from all stakeholders using KAOS in addition to only mission‐oriented stakeholders 60 . Lastly, this research contributes to the CAS body of knowledge for strengthening processes and means for realizing general and theoretical assertions 61 …”
Section: Discussionsupporting
confidence: 79%
“…The N = 20 case denotes undamaged UAVs, and y(t) hovers around the theoretical value 1570, aligning with the actual scenario. Thus, the simulation results depicted in Figure 11 validate our proposed model and performance metric are suitable for surveillance tasks compared with reference [3,4,9,33,39]. In Figure 11, the N = 18 case is relatively closer to the undisturbed event (N = 20).…”
Section: Experiments Resultsmentioning
confidence: 58%
“…During the mission, each UAV collaborates with other UAVs through multihop wireless communication, continuously sharing information to successfully accomplish the surveillance mission. It also considers the possibility of the UAVs being attacked by the enemy with a probability [39]. To establish the initial topology of the swarm system, a scale-free network with a preferential attachment algorithm is utilized [9,33], with m 0 = 2 and m = 2.…”
Section: Experiments Descriptionmentioning
confidence: 99%
“…25, No. 4, 2023 manner [30], prioritizing the rewiring of drones with a higher number of neighbors. In this paper, we adopt the initial swarm topology with scale-free networks used in [28,29].…”
Section: Mission Background and Experiments Settingsmentioning
confidence: 99%