TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| A2/D2 | |
| adhoc teams | |
| Agile C2 | |
| agile C2 system | |
| agile operating mechanism | |
| agility | |
| AI | |
| aircraft | |
| AIS | |
| algorithms | |
| analysis | |
| Analytics | |
| anomalies | |
| Architecture | |
| artificial intelligence | |
| artificial intelligence (AI) | |
| Assessment | |
| Asset Management | |
| Attribute-based Encryption | |
| Automation | |
| Autonomous systems | |
| Autonomous technologies | |
| Autonomy | |
| B | |
| Basic Research | |
| big data | |
| C | |
| C2 | |
| C2 Agility | |
| C2 Agility Multi Domain Operations | |
| C2 and Intelligence | |
| C2 approach | |
| C2 capabilities | |
| C2 command environment requirements | |
| C2 concept | |
| C2 functions | |
| C2 Harmonization | |
| C2-agility | |
| C2-enabling | |
| C2OTM | |
| C2Sim Interoperability | |
| C4IS | |
| civil-military | |
| clash | |
| co-occurrence | |
| coalition | |
| Coalition Interoperability | |
| Cognitive | |
| Cognitive models | |
| cognitive network | |
| cognitive radar | |
| cognitive radio | |
| cognitive sensor-to-effector loop (CStEL) | |
| cognitive sensor-to-shooter loop(CStSL) | |
| combat identification | |
| Command | |
| Command & control | |
| Command and Control | |
| command and control to simulation | |
| Command and control(C2)system | |
| command control communications computers intelligence surveillance and reconnaissance (C4ISR) | |
| Common Operating Picture | |
| Common Operational Picture | |
| Communications | |
| complex | |
| Concept development | |
| concept development & experimentation | |
| conceptual model | |
| containerisation | |
| contested environments | |
| contested urban environment (CUE) | |
| Context Awareness | |
| Continuous Integration | |
| Control | |
| cooperative behavior | |
| Coordination | |
| critical infrastructure | |
| Cross-Domain | |
| Cyber Defense | |
| Cyber Security | |
| cyber-active | |
| Cybernetics | |
| cybersecurity-specific | |
| Cyberspace Operations | |
| cyberwarfare | |
| cyberweapons | |
| D | |
| data centric | |
| data-centric | |
| decentralization | |
| decision making | |
| Decision Support | |
| Decouple | |
| deductive reasoning | |
| Design criteria | |
| Design logic | |
| DevOps | |
| directed energy weapon | |
| disseminate | |
| Distributional Semantics | |
| dynamic dissemination | |
| E | |
| edge | |
| effector | |
| efficiency | |
| Effort measures | |
| Emergency Communication | |
| Emerging technologies | |
| emerging technology | |
| Endeavour Space | |
| EOD maneuver | |
| execution | |
| Exercise | |
| Experimentation | |
| experiments | |
| exploit | |
| Eye Tracking | |
| F | |
| feature selection | |
| feature space | |
| Feedback | |
| fifth generation of cellular technologies (5G) | |
| First responders | |
| Fog Computing | |
| Formal Concept Lattice | |
| Framework | |
| functional design | |
| G | |
| Global Network of Navies | |
| GOTS | |
| Government off the Shelf | |
| group | |
| group theory | |
| H | |
| HAMMER | |
| Headquarters | |
| Human | |
| Human Information Interaction | |
| Human Knowledge | |
| Human-Autonomy teaming | |
| human-computer interaction | |
| Human-in-the-Loop | |
| human-machine collaboration | |
| Human-machine teams | |
| hybrid C2 | |
| Hybrid operations | |
| I | |
| IA | |
| Incident | |
| Incident filtering | |
| incubation through integration | |
| Informatics | |
| Information Analysis and Exploitation | |
| information extraction | |
| information filtering | |
| information management | |
| information prioritization | |
| information provision | |
| Information Technology | |
| InSAnE Framework | |
| intelligence | |
| Intelligent Autonomous Units | |
| intercept | |
| Internet of Battlefield Things | |
| Internet of Battlefield Things (IoBT) | |
| internet of battlespace things (IoBT) | |
| internet of intelligent things (IoIT) | |
| internet of military things (IoMT) | |
| Internet of Things | |
| Internet of Things (IoT) | |
| interoperability | |
| Intrusion detection | |
| IoT | |
| IoT Middleware | |
| ISR | |
| J | |
| jamming | |
| Joint systems | |
| K | |
| Knowledge Bases | |
| Knowledge Graphs | |
| Knowledge Representation | |
| L | |
| Latent Dirichlet Allocation | |
| learning environment | |
| Lessons Learned | |
| low probability of detection (LPD) | |
| low probability of intercept (LPI) | |
| M | |
| Machine Learning | |
| Man-Machine Teaming | |
| MAPaaS | |
| Measure groupings | |
| Measures | |
| Message Broker | |
| micro services | |
| Military Decision Making | |
| military training | |
| MIP | |
| missile | |
| Mission command | |
| mission partners | |
| Mission planning | |
| Mission Success | |
| Mobile Tactical Forces | |
| Mobility | |
| Model | |
| Model Based Systems Engineering | |
| MQTT | |
| Multi domain | |
| multi domain battle space management | |
| Multi Domain C2 | |
| Multi Domain Operations | |
| multi-attribute utility | |
| Multi-domain C2 | |
| multi-domain communications | |
| multiagent systems | |
| MxR | |
| N | |
| Natural Language Processing | |
| netforce organization | |
| network | |
| Network Defense | |
| Network Intrusion Detection | |
| Network security | |
| networked architecture requirements | |
| networks | |
| Newsfeed | |
| O | |
| obfuscation | |
| OODA-loop | |
| OpenAPI | |
| operational context | |
| Organisation | |
| organizations | |
| overlays | |
| P | |
| patterns | |
| PED | |
| persistence | |
| planning | |
| positions | |
| positively disruptive | |
| predator-prey pursuit | |
| process | |
| Property Norms | |
| Publish/subscribe | |
| Pulse of the Population | |
| Q | |
| Question Answering | |
| R | |
| ranking | |
| reading | |
| reconnaissance | |
| Requirements | |
| Resource management | |
| Results measures | |
| reuse | |
| RMF | |
| robotics | |
| S | |
| Scenario | |
| Search | |
| security | |
| security control sets | |
| security debt | |
| self-synchronization | |
| Semi-Autonomous | |
| sensor | |
| SensorML | |
| Service Oriented Architectures | |
| Service-Oriented Architecture (SOA) | |
| Shared augmented reality | |
| ships | |
| simulation | |
| Situational Awareness | |
| Smart devices | |
| social computing | |
| social dynamics | |
| Social Sense | |
| social sensing | |
| social terrain | |
| Software Agents | |
| software lifecycle | |
| software robustness | |
| Standards | |
| stealth | |
| Structure | |
| surveillance | |
| Sustainment | |
| System | |
| System 1 | |
| System 2 | |
| Systems | |
| Systems engineering | |
| T | |
| tactical edge | |
| tactical networks | |
| team coordination | |
| Teaming | |
| teams and coalitions | |
| Text Analytics | |
| text annotation | |
| threat analysis | |
| threat vectors | |
| Topic Modeling | |
| track data | |
| Transactive Memory system | |
| tribes | |
| U | |
| UAV | |
| Unmanned Force Protection | |
| Unmanned Systems | |
| Unmanned Vehicles | |
| usability | |
| USV | |
| UUV | |
| UxV | |
| V | |
| Value of Information | |
| Visual Analytics | |
| visual search | |
| vulnerability | |
| W | |
| Warfare Concepts | |
| wearables | |
| workload | |
| WS-Notification | |