Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Author(s): 

,

Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2023
  • Volume: 

    6
  • Issue: 

    4
  • Pages: 

    10-22
Measures: 
  • Citations: 

    0
  • Views: 

    23
  • Downloads: 

    0
Abstract: 

The purpose of this paper is to develop a comprehensive maturity model for Command and Control. For this purpose, the inductive research method has been used to design the maturity model. Thus, firstly, the most prominent maturity models in Command and Control, including the conceptual maturity model, the headquarters maturity model, the NATO model, and the maturity model of integrated Command and Control centers (ICCCs) were analyzed. Among the studied models, the NATO model is more comprehencive, so we chose it as a basis for developing our model. Then, the stages and variables of maturity were analyzed using the focus group method. The findings of the research show that some important characteristics of the Command and Control maturity  have been neglected in the basic model. Therefore, the innovation of this research is to add new features to achieve a more comprehensive model. The result is a model containing 5 levels and 20 variables. Validation of the model has been done through comparative study and focus group method, which should be further strengthened by case studies and survey researches.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 23

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    4
  • Issue: 

    14
  • Pages: 

    61-86
Measures: 
  • Citations: 

    0
  • Views: 

    1804
  • Downloads: 

    0
Abstract: 

The Command and Control system contribute to the creation of variety of networks, the centralized and the decentralized, in armies throughout the world so that they could manage and Command them in sync at the time of either war or peace. This system is designated to procure efficient cooperation, fellowship and concordance among defense and attack armed forces with the current capacity and capabilities. The researchers delve into explanations of Command patterns and air Control in future wars with the help of applied and developing studies (decision making research and value creation) and with mixed methods in population of 50 people, it aims at addressing the question of what factors involved in Command patterns and air Control. The findings, Command and Control, monitoring, computers and communication, electronic and recognition information, are extracted with 31 sub-components in response to the Command patterns and air Control in future wars.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1804

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

ABDI FEREYDUN

Issue Info: 
  • Year: 

    2011
  • Volume: 

    11
  • Issue: 

    42
  • Pages: 

    43-69
Measures: 
  • Citations: 

    0
  • Views: 

    6779
  • Downloads: 

    0
Abstract: 

Nowadays nature of war has changed into information war in which information superiority plays a vital role. As a result, the main aim of military Commanders and planners is to exercise superiority of Command and Control in information systems and computer and communication networks, which is called C4I. What makes C4I effective is the “cohesion” among its components in the light of “unity of efforts” which has resulted in a new system called C5I2. In a bid to offer a comprehensive concept of C5I2, this article addresses the role of computer, its necessities and also threats emanating from its application. As an applied and descriptive study, this article was developed employing library, internet and professional URLs. It could then be concluded that “all communication systems, automatic information and the equipment contributing to Commander in planning, guiding and Controlling forces in line with unity of efforts” are called C5I2. Any successful Command and Control efforts lie in their connection to computer systems capable of mass data processing as quickly and accurately as possible. That is why in major wars such as the Persian Gulf one Control and Command system played the major role. Application of IT specially computers in C5I2 infiltrates into the information systems of the enemy, which justifies further attention to the issues like security and customization in C5I2 and proposes a comprehensive customized architecture for the army of the I.R. of Iran.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 6779

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 4
Author(s): 

Bakhtiari Iraj

Issue Info: 
  • Year: 

    2024
  • Volume: 

    22
  • Issue: 

    95
  • Pages: 

    189-210
Measures: 
  • Citations: 

    0
  • Views: 

    14
  • Downloads: 

    0
Abstract: 

One of the threat areas from the point of view of passive defense; cyber threats and among them cyber resilience; It is the actions and predictions that must be done in a system to be prepared to face and deal with cyber attacks and intrusions and tolerate and adapt to the conditions of continuous occurrence and quick recovery and rehabilitation after the interruptions. Therefore, a system is resilient when it has the ability to resist cyber attacks or incidents. The main goal of this research is to present the cyber resilience model of Command and Control systems and its sub-goals are to explain cyber threats, cyber vulnerabilities, dimensions and components of cyber resilience of Command and Control systems. This research is of an applied type and in terms of a descriptive method with a mixed approach, the researcher first uses the analysis and categorization of the proposed methods and solutions to explore the appropriate pattern, and in order to check the meaningful relationship between the dimensions and components using the factor analysis method, from the software It uses Smart PLS. factor load coefficients calculated for the three dimensions of Command and leadership, Control and supervision, and process and operation, respectively; It is 0.926, 0.917 and 0.920, which shows the high importance of these factors in increasing the cyber resilience of systems. The cyber resilience model of Command and Control systems is presented in three dimensions of Command and Control with four components, Control and monitoring dimension with four components, process and operation dimension with three components,against six threats and seven vulnerabilities (weaknesses).

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 14

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2021
  • Volume: 

    5
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    87
  • Downloads: 

    0
Abstract: 

The diverse applications and widespread effects of cyberspace in most military and civilian applications have led to the rapid growth of data, information, knowledge, technology, methods, tools, and cyber systems. One of the important and strategic requirements in the cyber Command and Control cycle is the capability to extract, process, fusion and analyze data and information from various sources to achieve the desired situational awareness of the cyberspace and cyber operations environment. Considering the various aspects of this issue, the use of soft data, ie data and information from human resources, along with hard data, ie data and information of machine resources, can help in achieving more accurate and reliable recognition and decision. One of the main research topics in this area is designing a conceptual model and appropriate processing framework for analysis and inference based on data and information with the ability of linking various information from different sources with each other and modeling different types of uncertainty in hard and soft data and fusing them. This paper presents an ontology-based approach to the processing and fusion of hard and soft data in cyber Command and Control, in which various aspects of the issue has been addressed including ontology-based architecture and processing framework of information inference and fusion, the method of representation of uncertainty and reliability in hard and soft data and fusing these data, conversion of beliefs into probabilities to be able to make decisions on the hypotheses under consideration, designing an appropriate ontology model for cyber Command and Control purposes, and design and implementation of ontology-based logic of inference and fusion. The results of applying the proposed model in a typical scenario of cyber Command and Control show that it is operational in fusion of hard and soft cyber data. In addition to the ability of inference and fusion, one of the notable features of the proposed approach is its scalability and adaptability to new extensions in the tools and requirements of cyber Command and Control.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 87

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

NAGHAVI MAHDI

Issue Info: 
  • Year: 

    2021
  • Volume: 

    8
  • Issue: 

    2 (29)
  • Pages: 

    57-65
Measures: 
  • Citations: 

    0
  • Views: 

    534
  • Downloads: 

    0
Abstract: 

Today, due to the expansion of computer systems and networks in all areas of infrastructure, communication, and information with the existence of some properties such as unlimited geographical boundaries and pervasive use, easy and fast services using up-to-date technology and information have come true. On the other hand, in line with this fast progress, the crime has been appearing from the real environment to cyberspace. The spread of crime, cyber-attacks, and destructive activities are observed in this space every day. Observing the traces of these cases using all tools causes the collection of detection equipment, operational and passive countermeasures, cyber operations, electronic warfare, and etc. in the ground, sea, and air base way to be integrated in a basic structure for specific purposes. These purposes are diverse and in addition to speed and acceleration and freedom of action in space, land, and sea, they also have their own tricks and deceptions in cyberspace, social networks, and psychological operations. Commanding and Controlling soft power in the armed forces in the form of a unique and extensive network are able to achieve these purposes only through unity, effort, coordination, common language, the establishment of interactions, and exchanges of information and operations with other states and military organizations. Comprehensive, united and unified network in a coherent structure is one of the characteristics of this network. Its distinctive feature is the collection of information and news, its processing and coordination, adaptation and integration of information, as well as the dissemination of the news and information to all Command centers and soft power Control required in terms of authorized access to the information. In this research, a new model of soft power Commanding and Controling for the armed forces is provided.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 534

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    221-250
Measures: 
  • Citations: 

    0
  • Views: 

    17
  • Downloads: 

    0
Abstract: 

The Army of the Islamic Republic of Iran consists of four forces (ground, defense, air and naval) with a separate specialized nature and different operational space. Requiring the presence of various weapons, equipment and forces with different specializations and organizational culture to respond to the various actions of the enemy, requires an integrated and network-based Command and Control system that by developing secure, independent and stable communication infrastructure and creating unity, leads to synergy. Continuous planning, implementation, Control, monitoring and evaluation of joint operations of AJA forces. The main purpose of this research is to enumerate the role-playing environmental factors and to formulate synergistic strategies of AJA Command and Control system in joint operations. Sample population of 74 people, field data collection method and library, findings were analyzed using SPSS software. Based on the research results, 19 factors (7 strengths, 3 weaknesses, 7 opportunities and 2 threats) have been enumerated. From the combination of the above factors, 12 desirability and 17 challenges have been obtained. According to the calculations of the characteristics of the strategic area in the offensive position is focused on strength, accordingly, 7 strategies have been developed to synergize the Command and Control component of AJA in joint operations. In order to implement the strategies, the four requirements of knowledge - resources - structure and rules and regulations are presented.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 17

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Kanani Akbar | Yavari Alireza

Issue Info: 
  • Year: 

    2022
  • Volume: 

    17
  • Issue: 

    2
  • Pages: 

    65-91
Measures: 
  • Citations: 

    0
  • Views: 

    238
  • Downloads: 

    138
Abstract: 

Background and aim: One of the issues that have always focused the minds of Commanders in the implementation of law enforcement missions is the issue of planning, Controlling operations and making decisions in the changing, unstable and ambiguous conditions of the future operations scene, considering the emergence of new technologies and threats, methods and the new titles are criminal. The quickening of the operational acceleration and the increase in the power of action, reaction and counteraction, which has taken place as a result of the development of technologies, makes the importance of decision-making in difficult situations based on an advanced and intelligent system of police Command and Control more visible and necessary. Therefore, the purpose of this research is to design a smart police Command and Control model.Method: This research is of an applied type and from a methodological point of view, it is a qualitative research. The statistical community of the research was experts and activists in the field of Command and Control and senior police managers who were interviewed with fourteen experts who are currently serving as the deputy operations or the head of the Command and Control center in the general police Command or the provinces. Purposive sampling was used until theoretical saturation was reached to Control the number of participants.Results: In this research, 148 sub-categories, 38 main categories and 5 components (diagnosis, analysis, planning, promotion and influence) were extracted.Conclusion: the detection stage of the Command and Control pattern is based on communication infrastructures, news systems and video surveillance, the analysis stage is based on information analysis, timely forecasting and timely decision-making, the planning stage is based on holding crisis management meetings, operational planning and operation management is, the promotion stage is based on sharing information, creating mobility and situational awareness in specialized police, and the impact stage is based on continuous improvement of the performance of each of the previous stages.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 238

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 138 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2020
  • Volume: 

    3
  • Issue: 

    4
  • Pages: 

    1-18
Measures: 
  • Citations: 

    0
  • Views: 

    1185
  • Downloads: 

    0
Abstract: 

War game as an analytical method and tool has enabled Commanders and managers to get optimal decisions. Therefore, the role of the war in the various fields of "military, economic, political, social and cultural, etc. " is to choose the best of its own course of action against threats or, in other words, good decision-making. War game is a process with clear rules and steps that attempt to visualize the flow of the mission on the part of its own forces, and this process identifies and takes notice the capabilities, strengths and weaknesses and capabilities and possible course of action of friendly and enemy forces in a sequence of action, reaction, and counteraction. The war game is the most valuable step in exploring and analyzing the way in operational estimation. The war game process tests a solution or modifies a formed course of action. The purpose of this paper is to present a process model of the war game in Command and Control and to develop a standardized approach to the unity of practice in doing so. Undoubtedly, decision-making and planning, which are critical steps in Command and Control, will be effective once you have used the war game. The research method used in this paper was library and documentary study and utilization of credible scientific resources, expertise point of view throughout deep interview. Ultimately, the process model of the war game is designed in Command and Control.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1185

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    7
  • Issue: 

    4
  • Pages: 

    1-15
Measures: 
  • Citations: 

    0
  • Views: 

    457
  • Downloads: 

    0
Abstract: 

Nowadays, botnets have become an inconsistency in the process of exchanging information and tampering network resources. Botnet detection methods have always faced challenges and have been investigated and promoted as subjects of research. The main characteristics of botnets is the Command and Control (C&C) channel through which a botmaster sends malicious Commands to the victim's system. By detecting the C&C channel of a botnet, the botnet is not essentially able to communicate with the botmaster and loses its efficiency. For this reason, botmasters try to evade detection by using a variety of methods. Covert Command and Control channel is a concept that the new generation of botnets use to hide their communications. In this paper, a Botnet is proposed, in which botmaster’ s Commands are sent by using Inter Packet Delays (IPDs) and their sequences. The Commands are sent via a timing-based covert Command and Control channel. In the following, a detection method is proposed by applying the concept of group activity of bots. A three-layer architecture is proposed which consists of traffic data collection and processing, pattern processing, and two-step detection methods. Using the two-step detection method including similarity matrix and entropy, hosts infected with the bot are detected. To evaluate the method, five covert timing channels are simulated and each of them is used to send botmaster Commands. The results of the experiments showed the effectiveness of the detection method with the minimum number of two bots in the network.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 457

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button