23RD ICCRTS: 23RD INTERNATIONAL COMMAND AND CONTROL RESEARCH AND TECHNOLOGY SYMPOSIUM
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
A2/D2
adhoc teams
Agile C2
agile C2 system
agile operating mechanism
agility
AI
aircraft
AIS
algorithms
analysis
Analytics
anomalies
Architecture
artificial intelligence
artificial intelligence (AI)
Assessment
Asset Management
Attribute-based Encryption
Automation
Autonomous systems
Autonomous technologies
Autonomy
B
Basic Research
big data
C
C2
C2 Agility
C2 Agility Multi Domain Operations
C2 and Intelligence
C2 approach
C2 capabilities
C2 command environment requirements
C2 concept
C2 functions
C2 Harmonization
C2-agility
C2-enabling
C2OTM
C2Sim Interoperability
C4IS
civil-military
clash
co-occurrence
coalition
Coalition Interoperability
Cognitive
Cognitive models
cognitive network
cognitive radar
cognitive radio
cognitive sensor-to-effector loop (CStEL)
cognitive sensor-to-shooter loop(CStSL)
combat identification
Command
Command & control
Command and Control
command and control to simulation
Command and control(C2)system
command control communications computers intelligence surveillance and reconnaissance (C4ISR)
Common Operating Picture
Common Operational Picture
Communications
complex
Concept development
concept development & experimentation
conceptual model
containerisation
contested environments
contested urban environment (CUE)
Context Awareness
Continuous Integration
Control
cooperative behavior
Coordination
critical infrastructure
Cross-Domain
Cyber Defense
Cyber Security
cyber-active
Cybernetics
cybersecurity-specific
Cyberspace Operations
cyberwarfare
cyberweapons
D
data centric
data-centric
decentralization
decision making
Decision Support
Decouple
deductive reasoning
Design criteria
Design logic
DevOps
directed energy weapon
disseminate
Distributional Semantics
dynamic dissemination
E
edge
effector
efficiency
Effort measures
Emergency Communication
Emerging technologies
emerging technology
Endeavour Space
EOD maneuver
execution
Exercise
Experimentation
experiments
exploit
Eye Tracking
F
feature selection
feature space
Feedback
fifth generation of cellular technologies (5G)
First responders
Fog Computing
Formal Concept Lattice
Framework
functional design
G
Global Network of Navies
GOTS
Government off the Shelf
group
group theory
H
HAMMER
Headquarters
Human
Human Information Interaction
Human Knowledge
Human-Autonomy teaming
human-computer interaction
Human-in-the-Loop
human-machine collaboration
Human-machine teams
hybrid C2
Hybrid operations
I
IA
Incident
Incident filtering
incubation through integration
Informatics
Information Analysis and Exploitation
information extraction
information filtering
information management
information prioritization
information provision
Information Technology
InSAnE Framework
intelligence
Intelligent Autonomous Units
intercept
Internet of Battlefield Things
Internet of Battlefield Things (IoBT)
internet of battlespace things (IoBT)
internet of intelligent things (IoIT)
internet of military things (IoMT)
Internet of Things
Internet of Things (IoT)
interoperability
Intrusion detection
IoT
IoT Middleware
ISR
J
jamming
Joint systems
K
Knowledge Bases
Knowledge Graphs
Knowledge Representation
L
Latent Dirichlet Allocation
learning environment
Lessons Learned
low probability of detection (LPD)
low probability of intercept (LPI)
M
Machine Learning
Man-Machine Teaming
MAPaaS
Measure groupings
Measures
Message Broker
micro services
Military Decision Making
military training
MIP
missile
Mission command
mission partners
Mission planning
Mission Success
Mobile Tactical Forces
Mobility
Model
Model Based Systems Engineering
MQTT
Multi domain
multi domain battle space management
Multi Domain C2
Multi Domain Operations
multi-attribute utility
Multi-domain C2
multi-domain communications
multiagent systems
MxR
N
Natural Language Processing
netforce organization
network
Network Defense
Network Intrusion Detection
Network security
networked architecture requirements
networks
Newsfeed
O
obfuscation
OODA-loop
OpenAPI
operational context
Organisation
organizations
overlays
P
patterns
PED
persistence
planning
positions
positively disruptive
predator-prey pursuit
process
Property Norms
Publish/subscribe
Pulse of the Population
Q
Question Answering
R
ranking
reading
reconnaissance
Requirements
Resource management
Results measures
reuse
RMF
robotics
S
Scenario
Search
security
security control sets
security debt
self-synchronization
Semi-Autonomous
sensor
SensorML
Service Oriented Architectures
Service-Oriented Architecture (SOA)
Shared augmented reality
ships
simulation
Situational Awareness
Smart devices
social computing
social dynamics
Social Sense
social sensing
social terrain
Software Agents
software lifecycle
software robustness
Standards
stealth
Structure
surveillance
Sustainment
System
System 1
System 2
Systems
Systems engineering
T
tactical edge
tactical networks
team coordination
Teaming
teams and coalitions
Text Analytics
text annotation
threat analysis
threat vectors
Topic Modeling
track data
Transactive Memory system
tribes
U
UAV
Unmanned Force Protection
Unmanned Systems
Unmanned Vehicles
usability
USV
UUV
UxV
V
Value of Information
Visual Analytics
visual search
vulnerability
W
Warfare Concepts
wearables
workload
WS-Notification