Advanced search Help
Publisher is Naval Postgraduate School (U.S.)
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
DE-CERTS: A Decision Support System For a Comparative Evaluation Method For Risk Management Methodologies and Tools
"A new approach was recently proposed to effectively and objectively evaluate risk management methodologies and tools for their suitability to a given organizational situation. The proposed approach, known as CERTS, is based on defining suitability in terms of criteria which in turn are described in terms of attributes and metrics. Using the Analytic Hierarchy Process, this thesis develops the CERTS approach into a Decision Support System [DSS], that could be used easily and effectively by organizations for selecting a risk management methodology or tool. The thesis also applies the developed DSS to three case studies to gain insights on the applicability of the DSS."
Naval Postgraduate School (U.S.)
Crump, Leonard A.; Pound, James G.
1991-09
-
Security Considerations in Distributed Systems
"This thesis investigates computer security considerations in distributed systems. In particular, it concentrates on assisting managers to gain an appreciation for what distributed systems are, and what are the inherent security issues in these systems. A survey of the literature on computer security was conducted to identify those issues unique to distributed systems. Although many controls are discussed, management must design and support a comprehensive security plan tailored to their unique organization."
Naval Postgraduate School (U.S.)
Rhead, Donovan R.
1991-09
-
Signature Verification for Access Control
"Access control to sensitive information is a vital concern for Department of Defense agencies. Current methods employed to control access are vulnerable to unauthorized users and frequently inadequate. The use of biometric access control devices, such as signature verification systems, may represent a solution to the access control problem. This thesis looked at two dynamic signature verification systems and compared their performance in general as well as under the different operating conditions of lined and unlined paper and morning and afternoon use. The two signature verification systems were the CIC [Communication Intelligence Corporation] system and the Sign/On system. Additionally, the thesis compared the CIC system under both sets of operating conditions using an inking stylus pen and a non-inking stylus pen. The experimental results indicated there was no significant difference between the CIC system using an inking stylus pen and the Sign/On system and that both systems had Type I error rates of less than 3% and Type II error rates of less than 1%. The results also indicated that the operating conditions test did not favor either system."
Naval Postgraduate School (U.S.)
Geshan, Susan Carol
1991-09
-
America's New National Security Strategy: New Scenario for Military Operations Research
This report "[p]rovides an analysis of President Bush's new national security strategy first unveiled in Aspen, Colorado on August 2, 1990, and General Colin Powell's 'base' force. If implemented, the new strategy and force structure would return a significant amount of U.S. ground and air forces to CONUS [Continental United States] where most would be demobilized. In the event of a major crisis, the U.S. would rely on active and reserve forces for a contingency response. The new national security strategy is based upon a revised Soviet threat and new international security environment which allows us to assume two years warning of a major ground war in Europe. During this two year period, the U.S. would reconstitute additional military capability. Outline of new strategy and 'base' force structure, transportation requirements, and whether or not the U.S. will retain a unilateral capability for overseas intervention. Discussion of parallel NATO [North Atlantic Treaty Organization] initiatives. Discussion of major issues, including: defining new goals and objectives in both programming and war planning, the effect of Operations DESERT SHIELD and DESERT STORM, new requirements for intelligence, requirements for decision-making, investment strategy and industrial conversion, reconstitution, and impact on military operations research and analysis."
Naval Postgraduate School (U.S.)
Tritten, James John
1991-06-11
-
U.S. Maritime Strategy in the North Atlantic and the Norwegian Sea: An Evolving Strategy in Need of Reassessment
"This thesis examines the evolution, and theoretical basis of the United States' maritime strategy in the North Atlantic and what is referred to as 'NATO's [North Atlantic Treaty Organization] Northern Flank.' The strategy associated with past Secretary of the Navy, John Lehman, is no longer considered applicable in the context of today's East-West relationship and is in need of reassessment. The paper then assesses the current, post Cold War situation and looks at future security interests the United States may have in the region. Additionally, the security and defense capabilities of our allies in the region are examined. Given the United States will remain closely linked with European security issues, by examining the successes and failures of past strategies and the strengths and weaknesses of our allies, one will be better able to develop a new strategy."
Naval Postgraduate School (U.S.)
Woodard, Jimmy C.
1991-06
-
United States and Brazil: A Naval Partnership for the Twenty-First Century?
"This thesis explores the prospects for a U.S./Brazilian naval partnership for the twenty-first century. It examines the viability of existing multilateral agreements between the United States and Latin American countries for maritime defense of the South Atlantic. It argues that the existing agreements are outdated and ineffective, primarily due to a reduction in cold war threat. With a naval capability ranked among the highest in the third world, and historical naval ties to the United States from both World Wars, the Brazilian navy offers the possibility to assume a greater role in western defense. As a possible means to cultivate this beneficial relationship, a shift in emphasis from the current posture of U.S./Latin American multilateral hemispheric defense, to a focused bilateral U.S./Brazilian naval partnership is suggested. The thesis also suggests that national security threats to the hemisphere have changed to terrorism, narco-trafficking, the spread of high technology weapons, and the rise of ethnic tensions. These threats affect both the United States and Brazil, and could lead to closer cooperation in U.S./Brazilian naval relations."
Naval Postgraduate School (U.S.)
Collins, Harold H.
1991-03
-
NATO Burden-Sharing: Redefinition for a Changing European Threat
From the thesis abstract: "This thesis develops a model of burden-sharing that includes both operational and non-operational contributions to the common defense. Based on the 'Atlanticist' perspective of recognizing contribution, the model includes categories for standing forces, reserve forces, defense industrial capacity, reserve defense industrial capacity, and related defense factors that historically have not been recognized. This work addresses the availability of information suitable for the comparative evaluation of defense share within the model framework and identifies deficiencies in current data bases relative to the defense industrial capacities of participating nations. Recommendations for providing defense industrial base information center around tailoring OECD [Organisation for Economic Co-operation and Development] capacity utilization equations to defense industry parameters and reporting capacity and reserve capacity via the NATO [North Atlantic Treaty Organization] Defense Planning Questionnaire."
Naval Postgraduate School (U.S.)
Martello, Charles P.
1990-12
-
Strategy and Logistics for the New World Order
"An interdisciplinary analysis of the post-Cold War world to determine the optimal strategy to attain the national interests of the United States, and the requisite logistic structure to support that strategy. The optimal solution is found to be a strategy based on multinational defense centered on a permanent force of United Nations garrison port complexes. This multilateral force would be augmented by as small a national defense force as necessary to ensure national security. The thesis endeavors to reconnect the cultural and philosophical past of the United States with its immediate future. National interests are identified through examination of American Pragmatism and the philosophies of John Locke and Jean-Jacques Rousseau. To determine the current status of common defense, based upon the Foreign Military Sales system, an analysis of current data is accomplished. Future threats to the United States are examined with special emphasis on nuclear terrorism. The ability of Islamic nations in North Africa and the Middle East to produce significant quantities of uranium is demonstrated. The grave political as well as ongoing environmental consequences of this recent capability are discussed in detail."
Naval Postgraduate School (U.S.)
Gildersleeve, Cory W.
1990-12
-
NATO's Out-of-Area Dilemma
"NATO has a legitimate right to project force beyond the geographical boundaries of the NATO alliance. That NATO has been unwilling or unable to do so since 1949 results from a combination of factors relating to disagreements between the members over the geographical scope of the alliance, shifts in allied foreign policies and inter-allied tensions brought on by the Cold War. Iraq's invasion of Kuwait moved NATO's out-of-area problem from a subordinate position to the primarily threat facing the alliance. Historically, the Alliance felt that responses to out-of-area security threats should be dealt with on a unilateral basis, even when the Alliance has agreed that their collective vital interests are threatened. The dilemma for NATO is the lack of a unified approach to the out-of-area problem. NATO's boundaries are boundaries of obligation and not boundaries of confinement. Through a review of the language of the treaty and problems inherent in alliance relationships, this thesis will explore the differing perceptions of alliance members regarding the scope of the alliance and why NATO has survived for 40 years yet been unable to deal with the out-of-area problem."
Naval Postgraduate School (U.S.)
Theodorelos, Susan Lynn
1990-12
-
Potential Threats to Spanish Security: Implications for the United States and NATO
"Thirteen years ago, Spain held its first democratic elections since 1936. Prior to those elections, held in June 1977, Spain spent almost forty years under the dictatorship of Generalissimo Francisco Franco, who established an authoritarian regime in Spain following the Spanish Civil War (1936- 1939). Upon Franco's death in November 1975, Prince Juan Carlos de Borbon was crowned as King of Spain in accordance with Franco's 1957 announcement that the monarchy (abolished in 1931) would be restored after his death. Amidst problems ranging from inflation and unemployment to internal friction and, often, opposition from rightist elements, King Juan Carlos eased the Spanish nation-state through the transition into a democracy and, undaunted by an attempted coup by military rightists in 1981, supported what might then have been considered a fragile democracy. Now, nine years later, the entire region of Eastern Europe is in a state of transition, not totally unlike the transition Spain undertook over a decade ago. Thus, it seems particularly appropriate to examine the Spanish experience. The purpose of this study is to examine the security aspects of that experience. As such, it will address both internal security issues such as separatist movements, especially the Basque terrorist organization (ETA), and external security issues such as those posed by Gibraltar, Ceuta, Melilla, and, in spite of the tendency to dismiss it as irrelevant to Spanish security, the Soviet Union. In addition, as the title suggests, this study will address how Spain's security posture can be expected to affect the United States and NATO [North Atlantic Treaty Organization], particularly as Spain finds a place within the context of a rapidly changing New Europe."
Naval Postgraduate School (U.S.)
Adams, Tamara K.
1990-12
-
Identifying Security Problems and Devising Control Solutions in a Local Area Network: A Case Study Approach
"This thesis investigates the requirements for establishing security criteria in designing and developing a local area network (LAN) for an aviation squadron. In particular, it concentrates on the security problems and control issues in the design of a LAN. A survey of the security literature on computer security was conducted to develop a model for identifying security problems in a local area network and devise control solutions. A case study was written based on the literature review and previous experience in the aviation community. Although many controls solutions are discussed, adequate planning, common sense and proper user training all play an integral part in developing an atmosphere of security awareness in networks."
Naval Postgraduate School (U.S.)
Evans, Gary John
1990-09
-
Sheltering the Genie: The LIC Threat to Nuclear Systems
"The decreasing tension between the United States and the Soviet Union obscures a harsh reality, in a world where the probability of a nuclear exchange between the two superpowers is at its lowest point since the early 1950s, [American nuclear] weapons are more [vulnerable] than ever to 'low intensity' threats. Some terrorist organizations have become sophisticated enough to actually steal or destroy a warhead, while the Special Purpose Forces of the Soviet Union retain the [ability] to curtail the reliability of American strategic systems from within the United States or Europe. These two very real threats are derived from the same factors - the openness of American society, and the enormous difficulty of providing security for these weapons. Because it is difficult to separate terrorism issues, the analysis of possible outcomes goes beyond the weapons themselves to include nuclear materials and power plants."
Naval Postgraduate School (U.S.)
Shemella, Paul
1990-08
-
Comparison of Password Techniques for Multilevel Authentication Mechanisms
"Various mechanisms for authenticating users of computer-based information systems have been proposed. These include traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative passwords. While the mechanisms employed in primary passwords are determined by the operating systems' manufacturers, system designers can select any password mechanism for secondary passwords, to further protect sensitive applications and data files. This paper reports on the results of an empirically based study of passwords characteristics. It provides a comparative evaluation on the memorability and users' subjective preferences of the various passwords mechanisms, and suggest that cognitive passwords and associative passwords seem the most appropriate for secondary passwords."
Naval Postgraduate School (U.S.)
Zviran, Moshe; Haga, William James
1990-06
-
Passwords Security: An Exploratory Study
"One of the most common control mechanisms for authenticating users of computer-based information systems is the use of passwords. However, despite the widespread use of passwords, only little attention has been given to the characteristics of their actual use. This paper addresses the gap in evaluating the characteristics of real-life passwords and presents the results of an empirical study on passwords usage. It investigates the core characteristics of user-generated passwords in a DoD [Department of Defense] environment and associations between those variables."
Naval Postgraduate School (U.S.)
Zviran, Moshe; Haga, William James
1990-05
-
Comparison of Password Techniques
From the thesis abstract: "A widely used access control mechanism is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence of numbers such as a birthdate. Any person attempting to gain unauthorized access to a system might need only to look at a personnel record or associate with the person holding the desired password in order to discover the password. Therefore, there is a compromise between user memorability and security of a system. Exploration into other methods of user authentication and access control is desired to discover a better alternative to the traditional password system. The alternatives are system-generated passwords, pronounceable passwords, passphrases, cognitive passwords and authentication by word association. These methods are discussed and examined. The results from this study show that cognitive passwords and authentication by word association are superior to other methods in access control."
Naval Postgraduate School (U.S.)
Beedenbender, Mark G.
1990-03
-
From Forward Deployment to Forward Presence: A New National Strategy for the Pacific
From the thesis abstract: "This thesis analyzes the changing strategic environment in East Asia and the Pacific. Despite sweeping foreign policy initiatives, the Soviets maintain a significant military capability. Even as the likelihood of the Soviet threat diminishes, low-intensity type conflict threaten U.S. regional interests. Additionally, changing regional perceptions are undermining traditional U.S. security arrangements. Rising Asian nationalism questions the need for forward deployment of U.S. forces within regional states. A policy of forward presence via maritime assets is the solution. U.S. naval assets would allow for a reasonable power projection capability in time of crisis, yet would meet fiscal constraints during peacetime through a scaling down of deployed assets. Other U. S. forces will maintain their ability to meet regional responsibilities through training exercises with regional forces and a build-up of the U.S. sealift capability. Now is the time to encourage regional states to assume greater responsibilities for their own defense. A regional maritime organization must be developed to maintain open trade routes. With a focused mandate, such an organization would not threaten individual national sovereignties and would promote regional cooperation and stability. An expansion of the U.S. Navy's peacetime mission will certainly serve the national interest. Increased port visits to economically less developed regions should be coordinated to support on-going or planned U.S. assistance programs"
Naval Postgraduate School (U.S.)
Smith, Michael Edward
1990-03
-
CERTS: A Comparative Evaluation Method for Risk Management Methodologies and Tools
"This thesis develops a comparative evaluation method for computer security risk management methodologies and tools. The subjective biases inherent to current comparison practices are reduced by measuring unique characteristics of computer security risk management methodologies. Standardized criteria are established and described by attributes which in turn are defined by metrics that measure the characteristics. The suitability of a method or tool to a particular organizational situation can then be analyzed objectively. Additionally, our evaluation method facilitates the comparison of methodologies and tools to each other. As a demonstration of its effectiveness, our method is applied to four distinct risk management methodologies and four risk management tools. Alternative models for utilizing the evaluation method are presented as well as possible directions for their application. Without an adequate means of comparing and evaluating risk management decision-making methodologies, the metadecision (the selection of a risk management method or tool) becomes arbitrary and capricious, thereby making an inappropriate selection more likely. Selection of an inappropriate method or tool could lead to excessive costs, misdirected efforts, and the loss of assets. The systematic and standard comparison method developed in this thesis resolves that problem."
Naval Postgraduate School (U.S.)
Garrabrants, William M.; Ellis, Alfred W., III
1990-03
-
Characteristics of User-Generated Passwords
"Access control based on the verification of a person's identity is commonly used in information system/computer installations. The most widely used mechanism for access control to information systems is passwords. Passwords can be machine-generated using a list of words stored in a memory bank, machine-generated using a sophisticated algorithm to create a pseudo-random combination of characters or they can be user-generated. User-generated passwords typically take on the characteristics of some type of meaningful detail that is simple in structure and easy to remember Memorability and security pose a difficult trade-off in password generation. On one hand a system security administrator wants passwords that are unpredictable, frequently changed and provide the greatest degree of system security achievable. Users, on the other hand, want passwords that are simple and easy to remember. If passwords are chosen to make them difficult to guess, they may become difficult to remember. When they become difficult to remember they are likely to be written down. Once written down a compromise to security occurs because users tend to store them in insecure places. This thesis looks at user-generated password characteristics. Of particular interest is how password selection, memorability and predictability are affected by the number of characters in a password, the importance and sensitivity of a users data. a users work location, how a password was chosen, the frequency of changing a password and the frequency of logging on to a system with a password."
Naval Postgraduate School (U.S.)
Sawyer, Darren Antwon
1990-03
-
Role of Strategic Planning in the Evolution of Command and Control Systems
"This thesis examines the role that strategic planning plays in the evolution of Command and Control (C2) systems by defining both C2 and strategic planning and showing the, interfaces between them. It goes on to show how the View of the threat in the years to come influence the implementation of C2 systems. Furthermore, the author challenges the traditional strategic thought on threat assessment which views the threat primarily as a massive Warsaw Pact attack on Central Europe or an all-out Soviet nuclear attack. The future threat, projected ten to twenty years out is examined and expanded to include more likely scenarios the U.S. military may face including: drug trafficking, low intensity conflict in the Persian Gulf, and ballistic missile proliferation. From these emerging threats, the author recommends what C2 system technology the Department of Defense DOD) should pursue."
Naval Postgraduate School (U.S.)
Mallick, Richard Lee
1990-03
-
United States-Japanese National Interests in Asia: Security in the 1990s
From the thesis abstract: "Perceptions of the bilateral security relationship between the United States and Japan are beginning to depart the post-war norm. Japan's economic competition is beginning to be seen by some in the United States as a greater threat to U. S. national security than the traditional threat of Soviet expansionism. A difference in fundamental values between the United States and Japan may exacerbate these diverging views during a period of dramatic East-West change. This thesis proposes that the U.S. and Japan re-examine their bilateral security relationship and replace it with a formal, rational division of burden and decision sharing by allocating primary areas of security responsibility in Asia within the alliance. It proposes that Japanese naval forces assume primary responsibility of stability and peace in Northeast Asia while the United States continues primary responsibility of stability and peace in the vital sea lanes of communication in the Indian Ocean and South China Seas. The flexibility of this strategy would permit coping with the uncertainty of United States-U.S.S.R. relations until the success or failure of Soviet reforms can be ascertained. Also, a revised security arrangement between the United States and Japan would diminish the prospects of an independent Japanese military posture in Asia."
Naval Postgraduate School (U.S.)
Staples, Mark T.
1989-12
-
Personal Computer Local Area Network Security in an Academic Environment
"This thesis explores the unique security requirements of the Local Area Networks (LAN)s within the Administrative Sciences Department Instructional Laboratories at the Naval Postgraduate School, Monterey, California. Current operating procedures, direction from the Department of Defense and Navy sources, views of computer professionals and case studies of microcomputer labs at other educational institutions, are examined to identify areas where security improvements can be made. Security topics covered include; physical security, equipment tamper-proofing, software protection and damage caused maliciously or unintentionally by users. The threat imposed on the various LANs by users, viruses, and the operating environment are evaluated to determine a suggested security response."
Naval Postgraduate School (U.S.)
1989-12
-
Combatting Terrorism through Study of the Genetic Psychology of Terrorist Leader--the Early Development of the Terrorist Mind
"The purpose of this thesis is to demonstrate the necessity for law enforcement, intelligence, and other organizations responsible for collecting information on 'proponents of terror,' to include in target dossiers, data regarding genetic inheritance and childhood environmental influences. The author argues that without this type of information, agencies are hindered in really knowing the 'proponent of terror,' and thus limited in the possibilities for neutralizing the subject. The study analyzes genetic inheritance and childhood environment and presents case studies on Adolf Hitler, Benito Mussolini, and Ilich Ramirez Sanchez ('Carlos'). The study concludes that genetic and childhood environmental data should be included in target dossiers of terrorists. Collection categories in genetic inheritance and environment are recommended and include, for example, material on terrorists' biological grandparents, parents, and as appropriate, on their brothers and sisters, and children."
Naval Postgraduate School (U.S.)
Martinez, Peter, Jr.
1989-12
-
Implementation of a Parallel Multilevel Secure Process
From the thesis abstract: "This thesis demonstrates an implementation of a parallel multilevel secure process. This is done within the framework of an electronic mail system. Security is implemented by GEMSOS [Gemini Standard Operating Systems], the operating system of the Gemini Trusted Computer Base. A brief history of computer secrecy is followed by a discussion of security kernels. Eventcounts and sequences are used to provide concurrency control and are covered in detail. The specifications for the system are based upon the requirements for a Headquarters of a hypothetical Marine Battalion in garrison."
Naval Postgraduate School (U.S.)
Pratt, David R.
1988-06
-
Government Actions to Control Terrorist Violence; A Case Study on Northern Ireland
From the thesis abstract: "Using the historical method, this study of terrorism in Northern Ireland examines the variables of conflict, the existing violence and government endeavors to eradicate the violence. This study does so within the framework of the United States' interests. Irish terrorism has been a problem for the British government for centuries. The current round since 1969 has produced , vast improvements in the security forces and enforcement techniques, yet the I.R.A. [Irish Republican Army] and its political wing, Sinn Fein, survive. Government actions must include measures aimed at the root causes of terrorist movements. The relative degradation of the Catholic community within Northern Ireland has received international attention and has been the focus of much of the British government's efforts to legislate improvements in Northern Ireland. It appears that only through this process can peace and reconciliation in Northern Ireland take place."
Naval Postgraduate School (U.S.)
Naughton, Maura Katherine
1988-03
-
Chemical Warfare Module for the Airland Advanced Research Model (ALARM)
"This thesis incorporates an explicit depiction of chemical warfare (CW) in the AirLand Advanced Research Mode1 (ALARM), being developed at the Naval Postgraduate School based on the Amy's AirLand Battle doctrine. The CW module centers on a planning algorithm using the generalized value system (GVS) for future state decision making. The planning algorithm comprises the Commander's Estimate of the Situation. The GVS quantifies capabilities and importance of all battlefield entities. The CW module represents key chemical staff functions. The algorithm's decision rule is extended, adding aspects of utility theory. The basic concepts of the module are demonstrated in an application computer program running a combat scenario. The program generalizes previous development work on the GVS and the planning algorithm producing a plan consisting of the courses."
Naval Postgraduate School (U.S.)
Van Arsdale, Layne A.
1987-12
-
Strategic Planning for Counterforce Options
"The first objective of this report is to explore the disparity between United States declaratory policy and actual force capabilities. This report will secondarily pose questions and purpose decision making criteria which are essential to ensure successful future nuclear strategic force employment and planning. This report is primarily concerned with the gap in U.S. declaratory and operational (or action) policy as it applies to current counterforce targeting problems. It is important to distinguish between declaratory policy and actual operational policies to appreciate the complexities of the debate and to resolve questions concerning future force planning."
Naval Postgraduate School (U.S.)
Palumbo, Nancy R.
1987-11-04
-
Combating Terrorism: A Guide for U.S. Naval Forces Afloat
From the thesis abstract: "The United States Navy's forces afloat do not have a single source document that addresses anti-terrorism and counterterrorism. The increase in terrorism world-wide has stimulated the concern that vulnerable maritime vessels will become terrorist targets. U. S. Navy ships in a restricted maneuvering situation, at anchor in a harbor, or moored pier side may offer an attractive target to a terrorist group. To deal with this potential terrorist threat, personnel manning U. S. Navy ships must be educated in the fundamentals of terrorism; the ships' security program must be evaluated and modified accordingly; various watches, sentries, and teams must be trained in new anti- and counterterrorist procedures; and contingency plans must be developed to deal with potential terrorist incidents. This study provides a guide for the development of effective anti-terrorist and counterterrorist programs for any ship type in the U. S. Navy."
Naval Postgraduate School (U.S.)
Broughton, Hubert L.
1985-12
-
Moro Problem: An Historical Perspective
"For over 400 years the Muslim people of the southern Philippines have been at war. They have resisted the Spanish occupation of their ancestral homelands, the American colonial presence, and the current Christian government. To understand what motivates the Moro people to such conflict, it is necessary to study their history, religion, and the ethnic fabric which makes up their various regional groups. The fundamentals of their religion require a homogenous [sic] Islamic government. In the Philippines this would require separation, or at least total autonomy for the Muslim areas. This has never been allowed by the Christian government which has perpetuated the cause of the Moro insurgency. Conflict will surely continue as long as Christian authority is imposed upon the Moro people."
Naval Postgraduate School (U.S.)
Fowler, Dennis B.
1985-06
-
Quantitative and Qualitative Effectiveness Dimensions of the U.S. Coast Guard Recruiting Program
"The United States Coast Guard's increasing employment of advanced technology aboard its cutters, aircraft and shore commands has introduced an evolving demand for the consideration of a quality dimension in manpower planning. During recent years, this demand for quality personnel has out-distanced input. Recognizing the requirement for a long term organizational change to reverse this trend, this thesis identifies the recruiting program as the most effective agent for that change."
Naval Postgraduate School (U.S.)
Johnson, Harvey E.
1983-06
-
Lanchester-Type Models of Warfare, Volume II
This monograph is a comprehensive treatise on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide an introduction to and current- state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the modeling of force-on-force attrition over the complete spectrum of combat operations, from combat between platoon-sized units through theater-level air-ground combat. This material should be of interest primarily to individuals concerned with defense planning, quantitative aspects of military analysis, military OR, war gaming, or combat modeling, although it may also be of interest to the reader concerned with the modeling and analysis of other dynamic systems. It should also be of interest to the concerned citizen who is interested in the foundations for defense analysis and has the appropriate technical background.
Naval Postgraduate School (U.S.)
Taylor, James G.
1980-10