You are here

Net Warrior D10 Technology Report: Airborne Early Warning and Control (AEW&C) and Data Link Nodes

This report discusses the Air Operations Division contribution to the Net Warrior demonstration event NW-D10. NW-D10 was held in September 2010 and demonstrated information interoperability of middleware technologies in dynamic environments with real mission systems. An overview of the NW-D10 event is provided along with a discussion of the technologies demonstrated. The outcomes of NW-D10 are presented and future Net Warrior events and enabling research are outlined.

A Formal Integrity Framework with Application to a Secure Information ATM (SIATM)

The paper identifies research challenges in addressing data integrity and, critically, proposes a new model that captures and supports a broader range of integrity dimensions and briefly discusses a use case for the model involving an actual implementation of a security device (Secure Information ATM or SIATM).

Challenges and Opportunities in Information Security

The biennial Infosec Challenges report provides information to the Defence Signals Directorate (DSD) on a range of current and emerging areas in information security. In our 2012 report, areas have been selected to reflect potential information security interests across a broad range of ICT scenarios in the Australian Government. In each of these areas, we consider the current state-of-the-art, in research and/or practice, and identify existing challenges and opportunities.

Proceedings of the 2012 Model-Based Systems Engineering Symposium, 27 - 28 November 2012, DSTO Edinburgh, South Australia

The 2012 MBSE Symposium explored the innovative application of Model-Based Systems Engineering (MBSE) methodologies to Concept Engineering, the application of systems engineering principles, processes, methods, techniques and tools to the identification and analysis of the needs of capability users and other stakeholders.

Using Mobile Platforms for Sensitive Government Business

A review of existing practices for the use of mobile devices with sensitive information, in both governmental and business contexts, and emerging technologies for improving security.

KGRAPH – Interactive Plotting and Analysis

A user guide for the Windows based interactive graphics plotting and analysis program called KGRAPH.

Threat Modelling Adobe PDF

In this paper we analyse current PDF exploits and the future trends and the potential threat they pose.

A Spoken Dialogue System for Command and Control

DSTO has designed a modular, scalable, flexible, and robust spoken natural language (SNL) -aware system. It is designed to be increasingly sophisticated and responsive to users, and adaptable to relevant developments in language technologies and software development.

Army Sustainability Modelling Analysis and Reporting Tool (A-SMART) Prototype: Model Description and Algorithms

This report describes the modelling approach, the software architecture, data design and the algorithms that are employed in the model software code of the Army Sustainability Modelling Analysis and Reporting Tool (A-SMART) prototype.

Reliability Engineering for Service Oriented Architecture

This report looks at how Service Oriented Architecture (SOA) based systems differ from other types of Defence software systems and discusses the important issue of Software Reliability Engineering (SRE) for SOAs.

Pages