Search results for "OODA loop"

showing 3 items of 3 documents

Evolution of OO Methods: the unified case

1997

This paper takes an evaluative look into OO methods and especially the evolution of the new snified method from its ancestors, OMT and OODA. The paper ries to classify the components of the earlier ethods and identify the parts that have been taken into the Unified ethod. The research applies the method metrics approach. For the sake of compactness we limit ourselves to the class diagram technique of all methods. We make observations about the number of concepts in each variation and show how the metrics can be used to analyse the changes in the techniques.

Information Systems and ManagementComputer sciencemethodologyVariation (game tree)Information technologyQA75.5-76.95T58.5-58.64Human-Computer InteractionmetricsCompact spaceElectronic computers. Computer scienceOODA loopBusiness Management and Accounting (miscellaneous)Object-orientationClass diagramLimit (mathematics)Algorithmobject orientationInformation SystemsAustralasian Journal of Information Systems
researchProduct

Cyber Situational Awareness in Critical Infrastructure Protection

2020

The European Union promotes collaboration between authorities and the private sector, and the providers of the most critical services to society face security related obligations. In this paper, critical infrastructure is seen as a system of systems that can be subject to cyber-attacks and other disturbances. Situational awareness (SA) enhances preparations for and decision-making during assessed and unforeseen disruptive incidents, and promoting Cyber effective situational awareness (CSA) requires information sharing between the different interest groups. This research is constructive in nature, where innovative constructions developed as solutions for domain-specific real world problem…

System of systemsSituation awarenessbusiness.industryInternet privacyCritical infrastructure protectionOcean EngineeringCritical infrastructureOODA loopmedia_common.cataloged_instanceBusinessEuropean unionSituational ethicsResilience (network)media_commonAnnals of Disaster Risk Sciences
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct