Network Topology in Command and Control: Organization, Operation, and Evolution

Network Topology in Command and Control: Organization, Operation, and Evolution

Indexed In: SCOPUS View 1 More Indices
Release Date: May, 2014|Copyright: © 2014 |Pages: 320
DOI: 10.4018/978-1-4666-6058-8
ISBN13: 9781466660588|ISBN10: 1466660589|EISBN13: 9781466660595
Hardcover:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$260.00
TOTAL SAVINGS: $260.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$260.00
TOTAL SAVINGS: $260.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory.

Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modeling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • C2 System Design
  • Command and control
  • De-conflicting the Activities of Coalition Partners
  • Integrating Cyberspace into Land, Sea, Air, and Space Domains
  • Modeling C2 Systems as Networks
  • Network Science
  • Networked Organizations
  • Situation Awareness in Networks of Sensors and Actors
  • Viewing C2 systems as Multi-layered Networks
Reviews & Statements

Researchers in computer science and engineering, mathematics, the physical sciences, and other fields explore the intersection between network science and command and control in a way they intend to be accessible to readers in each field. The topics include shaping comprehensive emergency response networks, modeling command and control in networks, formalized ontology for representing command and control systems as layered networks, improving command and control effectiveness based on robust connectivity, complex adaptive information networks for defence, and cyber security in tactical network infrastructure for command and control.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
T. J. Grant is retired but an active scientific researcher in the fields of network-enabled Command & Control (C2) systems, offensive cyber operations, sense-making in novel and unexpected situations, and agent-based simulation. He has a Bachelor of Science in Aeronautical Engineering (Bristol University, UK), a Masters-level Defence Fellowship (Brunel University, UK), and a PhD in Artificial Intelligence (Maastricht University, NL). Tim’s working career covered 20 years as a military officer in the (British) Royal Air Force, 17 years consultancy experience in Atos (a global IT services supplier), and 10 years experience in academia (including a visiting professorship at the University of Pretoria, South Africa). His last appointment was as the Professor of Operational ICT & Communications within the Faculty of Military Sciences at the Netherlands Defence Academy (NLDA), where he led a team of five lecturers. He become a Professor Emeritus on 1 July 2012, when he founded Retired But Active Researchers (R-BAR) . He collaborates with other researchers and subject matter experts worldwide, and currently supervises two PhD students working on coalition and civil-military information sharing. More details about Tim’s career can be found at http://www.linkedin.com/pub/tim-grant/7/605/3a3.
R. H. P. Janssen is an Assistant Professor of Mathematics and Operations Research within the Faculty of Military Sciences at the Netherlands Defence Academy (NLDA) and member of the Board of the Expertise Centre Military Operations Research. In this Expertise Centre he coaches officers facing operational and logistic problems that may benefit from a quantitative or Operations Research approach. His work concentrates on modeling and simulation of networks within the military domain with a focus on uncertainty and complexity. Dr.ir. Janssen teaches courses such as stochastic processes, optimization (with a focus on meta-heuristics), and simulation.
H. Monsuur is an Associate Professor of Mathematics and Operations Research (OR) at the Netherlands Defence Academy (NLDA), and is responsible for research and education on Military OR. He is also Head of the Expertise Centre Military Operations Research and member of the board of the Dutch OR Society (NGB). His research focuses on network science and C2, decision and planning tools, game-theoretic risk analysis of security threats, and quantitative operational logistics. Results of this research show the advantage of applying an analytic approach to (military) operational problems.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.