Parameters Differentiating the Characteristics and Security of Military Information Systems
- Published: 04 Oct 2016
[1] Banks, S.B., Stytz, M. R., 1996. Software Security Requirements for Military Computer Generated Forces System Architectures. Simulation Industry Association of Australia DOI= http://www.siaa.asn.au/get/2396672378.pdf.
[2] Ceruti, M. G. 2003. Data Management Challenges and Development for Military Information Systems. IEEE Transactions on Knowledge and Data Engineering, September/October 2003. [OpenAIRE]
[3] Crawford, G. A. 1997. Information Warfare: New Roles for Information Systems in Military Operations. Technical Report Department of the Airforce, Washington DC. 1997.
[4] Beamount, P. 2010. US Appoints First Cyber Warfare General. News Report, The Observer, May 2010.
[5] Schell, R. R., Downey, P. J., Popek, G. J. 1973. Preliminary Notes on the Design of Secure Military Computer Systems. National Institute of Standards and Technology, US.
[6] Day, D. A. 2009. Ike's gambit: The KH-8 reconnaissance satellite. The Space Review, January 2009.
[7] Science News. 2009. World's Highest-Resolution Commercial Satellite.. Science Daily 2009
[8] Leyden, J. 2005. CIA Plays Cyber Wargame. News Report, The Register, May 2005.
[9] Bryant, J. H., Todd, M. A. 1965. The Design and Implementation of Automated Military Information Systems. IEEE Transactions on Military Electronics. Volume 9, Issue 2. 1965. 148-152.
[10] Farrell, N., 2007. Seagate hard drives turn into spy machines”, The Inquirer, November 2007.
[11] Prevelakis, V., Spinellis, D. 2007. The Athens Affair. IEEE Spectrum, July 2007. [OpenAIRE]