Article details

Title: Applications of Expert Systems for Protecting Information in Military Information Systems
Author(s): Catalin Cioaca   Elena Corina Boscoianu   Bogdan-Alexandru Belega            

Abstract: Integrating the results of technological progress (hardware and software) in the military field is already an essential element in providing operational advantages. In these circumstances, to ensure the availability, integrity and confidentiality is a must. One of the solutions provided by the expert systems in the field of evaluating the level of information protection in military systems is presented in this paper. The result is an easy to use system, modern, modular and scalable, which provides support in decision-making for vulnerabilities, setting the security level information and anticipating solutions for limiting the consequences of possible IT security incidents.

Keywords: cyber security, expert system, military information systems, IT risk assessment.


[1] M. MURE?AN - Mainframes. Complexity, Structuralism and Functionality of Military System, Military Writers Society, Bucharest, Romania, 2004 (in Romanian)
[2] N. FALESSI, R. GAVRILA, R. KLEJNSTRUP, K. MOULINOS National Cyber Security Strategies. Practical Guide on Development and Execution,European Network and Information Security Agency, ENISA, Dec. 2012
[3] D. CHANDLER Technological or Media Determinism, 2000,
[4]*** Government Decision (GD) no. 271/2013 for the approval of Romania Cyber Security Strategy and National Action Plan for the Implementation of the National Cybersecurity System, Part I, No. 296, 23.05.2013
[5] *** National Defence Strategy for 2015-2019, A Strong Romania within Europe and the World, (SNAT), Bucharest, 2015
[6] C. CIOAC?, M. BO?COIANU Information Resources Management under Uncertainty, Henri Coand? Air Force Academy Publisher, 2015 (in Romanian)
[7] C. CIOAC? Extreme Security Risk Management in Aeronautical Systems, Henri Coanda Air Force Academy Publisher, Bra?ov, 2014 (in Romanian)
[8] N.G. LEVESON Engineering a Safer World: Systems Thinking Applied to Safety, MIT Press, 2011
[9] P. CICHONSKI, T. MILLAR, T. GRANCE, K. SCARFONE Computer Security Incident Handling Guide, National Institute of Standards and Technology, Revision 2, 2012, SpecialPublications/NIST.SP.800-61r2.pdf
[10] S.M. BRIDGES, R.B. VAUGHN Intrusion Detection via Fuzzy Data Mining, Proc. of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, Ottawa, Canada, Jun. 19-23, 2000
[11]*** Law No. 182 of 12 April 2002 Regarding the Protection of Classified Information, The Parliament of Romania, Bucharest, Romania, 2016
[12] S. HOLBAN Decision Support Systems. Distance Learning Course, ?tefan cel Mare University of Suceava, Suceava, Romania, 2014 (in Romanian)
[13] M. URS?CESCU Information Systems, Economic Publishing House, Bucharest, Romania, 2002 (in Romanian)
[14] I. ANDONE, A. TUGUI Intelligent Systems in Management, Accounting, Finance and Banking and Marketing, Economic Publishing House, Bucharest, Romania, 1999 (in Romanian)2011
[15] *** Protection of Classified Information. Practical Guide, Romanian Intelligence Service (SRI), Aug. 2016 (in Romanian)
[16] R. SHANMUGAVADIVU, N. NAGARAJAN Network Intrusion Detection System Using Fuzzy Logic, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 2, No. 1, pp. 101-111, 2011