Volker Eiseler

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In the area of military simulations, a multitude of different approaches is available. ”Close Combat Tactical Trainer”, ”Joint Tactical Combat Training System”, ”Battle Force Tactical Training” or ”Warfighter's Simulation 2000” are just some examples within the history of the large DoD Development(More)
Military operations heavily rely on tactical data links to exchange command and control data allowing participants to gain an understanding of the operational situation. Since today most operations involve multiple nations cooperating on a mission these tactical data links are standardised e.g. as a NATO STANAG. However these standards are very complex and(More)
Throughout the last couple of years network forensics has gained higher importance due to the ever-growing quantity and quality of attacks. In contrast to conventional network forensics which relies on a central approach, both legal as well as technical guidelines nowadays favor a decentralized approach since aspects like privacy, limited data manipulation(More)
  • 1