In terms of threats to our computer systems, we think of individual hackers working to breach firewalls and steal data. The term 'advanced persistent threat'…
Abstract— Today, large and complex geospatial reference files are required on Defence networks of different classifications. This paper proposes a secure mechanism for allowing the…
Abstract— When classified files are moved around, from one network to another, often over unclassified networks such as the Internet, they may be protected by…
Abstract— Australian Defence is an example of an enterprise that is managing complex simulation requirements. Typically these are grouped as a named exercise, such as…