This research examines the proliferation of multiple local area network (LAN) and information technologies aboard United States Navy Submarines and the evolution of Congressional Defense Acquisition Reforms which mandate the use of Commercial Off The Shelf (COTS), Non-developmental items (NDI), and commercial items. The impact of these policies on the submarine force as it relates to burdens imposed in regard to training of personnel, technology refresh and insertion, obsolescence, and logistics will be addressed. This study will propose the implementation of a submarine ship-wide, mission critical, tactical network, based upon open systems architecture to provide the ability to process classified, unclassified, and administrative data, as ...
The United States Navy has been the dominate force of the sea in the last half century, but advancem...
Navy ships can utilize light fidelity networking technology to improve throughput and security. Curr...
Abstract – The purpose of this paper is to present results of applying structured systems engineerin...
This paper describes some of the US Navy's New Attack Submarine C3I system - an open system wit...
Twenty years ago, the Navy began expanding the use of commercial industry information technology (IT...
Twenty years ago, the Navy began expanding the use of commercial industry information technology (IT...
This research produced tools that can model, simulate, visualize, analyze, and evaluate security mea...
The US Navy is quickly reaching the point at which its current, hardware-centric approach to warfare...
Navy Warfare Development Command has established Web-Enabled Doctrine (WED) in an effort to enable t...
This thesis examines the planned implementation of the DMS and its impact on the Department of Defen...
This thesis examines design criteria related to development of local and wide area networks for comm...
This capstone report examines the concept of combining mobile and stationary underwater sensors into...
U.S. Navy ships need to have regular software updates to ensure their cyber security posture is soun...
This addresses the current configuration of surface naval vessels for employment in the information ...
Organizations incorporate changes in technological capabilities and patterns of work slowly and with...
The United States Navy has been the dominate force of the sea in the last half century, but advancem...
Navy ships can utilize light fidelity networking technology to improve throughput and security. Curr...
Abstract – The purpose of this paper is to present results of applying structured systems engineerin...
This paper describes some of the US Navy's New Attack Submarine C3I system - an open system wit...
Twenty years ago, the Navy began expanding the use of commercial industry information technology (IT...
Twenty years ago, the Navy began expanding the use of commercial industry information technology (IT...
This research produced tools that can model, simulate, visualize, analyze, and evaluate security mea...
The US Navy is quickly reaching the point at which its current, hardware-centric approach to warfare...
Navy Warfare Development Command has established Web-Enabled Doctrine (WED) in an effort to enable t...
This thesis examines the planned implementation of the DMS and its impact on the Department of Defen...
This thesis examines design criteria related to development of local and wide area networks for comm...
This capstone report examines the concept of combining mobile and stationary underwater sensors into...
U.S. Navy ships need to have regular software updates to ensure their cyber security posture is soun...
This addresses the current configuration of surface naval vessels for employment in the information ...
Organizations incorporate changes in technological capabilities and patterns of work slowly and with...
The United States Navy has been the dominate force of the sea in the last half century, but advancem...
Navy ships can utilize light fidelity networking technology to improve throughput and security. Curr...
Abstract – The purpose of this paper is to present results of applying structured systems engineerin...