TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
A2/D2 | |
adhoc teams | |
Agile C2 | |
agile C2 system | |
agile operating mechanism | |
agility | |
AI | |
aircraft | |
AIS | |
algorithms | |
analysis | |
Analytics | |
anomalies | |
Architecture | |
artificial intelligence | |
artificial intelligence (AI) | |
Assessment | |
Asset Management | |
Attribute-based Encryption | |
Automation | |
Autonomous systems | |
Autonomous technologies | |
Autonomy | |
B | |
Basic Research | |
big data | |
C | |
C2 | |
C2 Agility | |
C2 Agility Multi Domain Operations | |
C2 and Intelligence | |
C2 approach | |
C2 capabilities | |
C2 command environment requirements | |
C2 concept | |
C2 functions | |
C2 Harmonization | |
C2-agility | |
C2-enabling | |
C2OTM | |
C2Sim Interoperability | |
C4IS | |
civil-military | |
clash | |
co-occurrence | |
coalition | |
Coalition Interoperability | |
Cognitive | |
Cognitive models | |
cognitive network | |
cognitive radar | |
cognitive radio | |
cognitive sensor-to-effector loop (CStEL) | |
cognitive sensor-to-shooter loop(CStSL) | |
combat identification | |
Command | |
Command & control | |
Command and Control | |
command and control to simulation | |
Command and control(C2)system | |
command control communications computers intelligence surveillance and reconnaissance (C4ISR) | |
Common Operating Picture | |
Common Operational Picture | |
Communications | |
complex | |
Concept development | |
concept development & experimentation | |
conceptual model | |
containerisation | |
contested environments | |
contested urban environment (CUE) | |
Context Awareness | |
Continuous Integration | |
Control | |
cooperative behavior | |
Coordination | |
critical infrastructure | |
Cross-Domain | |
Cyber Defense | |
Cyber Security | |
cyber-active | |
Cybernetics | |
cybersecurity-specific | |
Cyberspace Operations | |
cyberwarfare | |
cyberweapons | |
D | |
data centric | |
data-centric | |
decentralization | |
decision making | |
Decision Support | |
Decouple | |
deductive reasoning | |
Design criteria | |
Design logic | |
DevOps | |
directed energy weapon | |
disseminate | |
Distributional Semantics | |
dynamic dissemination | |
E | |
edge | |
effector | |
efficiency | |
Effort measures | |
Emergency Communication | |
Emerging technologies | |
emerging technology | |
Endeavour Space | |
EOD maneuver | |
execution | |
Exercise | |
Experimentation | |
experiments | |
exploit | |
Eye Tracking | |
F | |
feature selection | |
feature space | |
Feedback | |
fifth generation of cellular technologies (5G) | |
First responders | |
Fog Computing | |
Formal Concept Lattice | |
Framework | |
functional design | |
G | |
Global Network of Navies | |
GOTS | |
Government off the Shelf | |
group | |
group theory | |
H | |
HAMMER | |
Headquarters | |
Human | |
Human Information Interaction | |
Human Knowledge | |
Human-Autonomy teaming | |
human-computer interaction | |
Human-in-the-Loop | |
human-machine collaboration | |
Human-machine teams | |
hybrid C2 | |
Hybrid operations | |
I | |
IA | |
Incident | |
Incident filtering | |
incubation through integration | |
Informatics | |
Information Analysis and Exploitation | |
information extraction | |
information filtering | |
information management | |
information prioritization | |
information provision | |
Information Technology | |
InSAnE Framework | |
intelligence | |
Intelligent Autonomous Units | |
intercept | |
Internet of Battlefield Things | |
Internet of Battlefield Things (IoBT) | |
internet of battlespace things (IoBT) | |
internet of intelligent things (IoIT) | |
internet of military things (IoMT) | |
Internet of Things | |
Internet of Things (IoT) | |
interoperability | |
Intrusion detection | |
IoT | |
IoT Middleware | |
ISR | |
J | |
jamming | |
Joint systems | |
K | |
Knowledge Bases | |
Knowledge Graphs | |
Knowledge Representation | |
L | |
Latent Dirichlet Allocation | |
learning environment | |
Lessons Learned | |
low probability of detection (LPD) | |
low probability of intercept (LPI) | |
M | |
Machine Learning | |
Man-Machine Teaming | |
MAPaaS | |
Measure groupings | |
Measures | |
Message Broker | |
micro services | |
Military Decision Making | |
military training | |
MIP | |
missile | |
Mission command | |
mission partners | |
Mission planning | |
Mission Success | |
Mobile Tactical Forces | |
Mobility | |
Model | |
Model Based Systems Engineering | |
MQTT | |
Multi domain | |
multi domain battle space management | |
Multi Domain C2 | |
Multi Domain Operations | |
multi-attribute utility | |
Multi-domain C2 | |
multi-domain communications | |
multiagent systems | |
MxR | |
N | |
Natural Language Processing | |
netforce organization | |
network | |
Network Defense | |
Network Intrusion Detection | |
Network security | |
networked architecture requirements | |
networks | |
Newsfeed | |
O | |
obfuscation | |
OODA-loop | |
OpenAPI | |
operational context | |
Organisation | |
organizations | |
overlays | |
P | |
patterns | |
PED | |
persistence | |
planning | |
positions | |
positively disruptive | |
predator-prey pursuit | |
process | |
Property Norms | |
Publish/subscribe | |
Pulse of the Population | |
Q | |
Question Answering | |
R | |
ranking | |
reading | |
reconnaissance | |
Requirements | |
Resource management | |
Results measures | |
reuse | |
RMF | |
robotics | |
S | |
Scenario | |
Search | |
security | |
security control sets | |
security debt | |
self-synchronization | |
Semi-Autonomous | |
sensor | |
SensorML | |
Service Oriented Architectures | |
Service-Oriented Architecture (SOA) | |
Shared augmented reality | |
ships | |
simulation | |
Situational Awareness | |
Smart devices | |
social computing | |
social dynamics | |
Social Sense | |
social sensing | |
social terrain | |
Software Agents | |
software lifecycle | |
software robustness | |
Standards | |
stealth | |
Structure | |
surveillance | |
Sustainment | |
System | |
System 1 | |
System 2 | |
Systems | |
Systems engineering | |
T | |
tactical edge | |
tactical networks | |
team coordination | |
Teaming | |
teams and coalitions | |
Text Analytics | |
text annotation | |
threat analysis | |
threat vectors | |
Topic Modeling | |
track data | |
Transactive Memory system | |
tribes | |
U | |
UAV | |
Unmanned Force Protection | |
Unmanned Systems | |
Unmanned Vehicles | |
usability | |
USV | |
UUV | |
UxV | |
V | |
Value of Information | |
Visual Analytics | |
visual search | |
vulnerability | |
W | |
Warfare Concepts | |
wearables | |
workload | |
WS-Notification |