CAPD: A Context-Aware, Policy-Driven Framework for
Secure and Resilient IoBT Operations
Sai Sree Laya Chukkapallia , Anupam Joshia , Tim Finina , and Robert F. Erbacherb
a
University of Maryland, Baltimore County, Baltimore, MD 21250
b
United States Army Research Laboratory, Adelphi, MD 20783
ABSTRACT
The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However,
this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate,
securely share information, and be resilient to adversary attacks in contested multi-domain operations. CAPD
addresses this problem by providing a context-aware, policy-driven framework supporting data and knowledge
exchange among autonomous entities in a battlespace. We propose an IoBT ontology that facilitates controlled
information sharing to enable semantic interoperability between systems. Its key contributions include providing
a knowledge graph with a shared semantic schema, integration with background knowledge, efficient mechanisms
for enforcing data consistency and drawing inferences, and supporting attribute-based access control. The sensors
in the IoBT provide data that create populated knowledge graphs based on the ontology.
This paper describes using CAPD to detect and mitigate adversary actions. CAPD enables situational
awareness using reasoning over the sensed data and SPARQL queries. For example, adversaries can cause sensor
failure or hijacking and disrupt the tactical networks to degrade video surveillance. In such instances, CAPD
uses an ontology-based reasoner to see how alternative approaches can still support the mission. Depending
on bandwidth availability, the reasoner initiates the creation of a reduced frame rate grayscale video by active
transcoding or transmits only still images. This ability to reason over the mission sensed environment, and attack
context permits the autonomous IoBT system to exhibit resilience in contested conditions.
Keywords: Situation Awareness, Context Awareness, Ontology, Knowledge Graph, Internet of Battlefield
Things, IoBT, Multi-Domain Operations, Artificial Intelligence
1. INTRODUCTION
Rapid advancements in Internet of Things (IoT) applications have seen this technology used in several domains
ranging from homes to industries, vehicles, and hospitals. These advances have also led the military towards
the adoption of IoT based autonomous systems for the battlespace Ref. 1. This concept, described as the
Internet of Battlefield Things Ref. 2,3, integrates a network of on device & wearable sensors, actuators, and both
ground and aerial semi autonomous vehicles to enhance information exchange across infantry units. However,
sensors deployed in the battlespace are susceptible to a broad spectrum of attacks and often experience harsh
environmental conditions leading to failure or disruption of services. These cyberattacks can cause massive
damage to the battle plans as an adversary can control or disrupt the sensors to mislead the commanders or the
AI controlling the autonomous units. So we need to design solutions to identify attacks, defend their targets,
mitigate their risks, and exhibit resilience and graceful degradation.
We have developed a context-aware, policy-driven framework designed to support attribute-based access control and incorporating resilience strategies through reasoning over sensed data to tackle attacks by the adversary.
The contextual information for drawing inferences is gathered by collecting and continuously monitoring device
data. When an adversary attacks sensors, they fail to send data or provide incorrect data. To overcome this
drawback, defining context-aware policies to reason over information generated by the sensors identifies the type
of attack on the sensor and further mitigates the risk by running defensive techniques. We view the elements
of the battlefield IoBT system for multi domain operations (MDO) as autonomous agents that interact with
one another to obtain the overall situational picture Ref. 4, collaborating under constraints identified by policies
Ref. 5. These approaches build on our prior work that detected attacks in mobile ad-hoc networks Ref. 6. In
addition, the policy engine can also help infer alternative strategies for information exchange among the assets
under adversarial attacks.
The key contributions in this paper are:
• We create a high level ontology for IoBT and MDO by creating new ontologies and building on existing
ones to capture assets, people, access control attributes, mission context and situational awareness.
• We populate a knowledge graph located in the policy engine by linking knowledge generated by sources
with the IoBT ontology. The policy engine queries the knowledge graph to detect attacks and come up
with mitigation strategies to ensure mission objectives.
• We demonstrate our approach using a small testbed that mimics a real life scenario for a scouting platoon.
The rest of the paper is organized as follows: Section 2 contains related work. Section 3 explains the components of context-aware policy-driven framework, while Section 4 describes a use case scenario to demonstrate
resilience under attack. Finally, we conclude and discuss the ongoing work in Section 5.
2. RELATED WORK
The advantages of incorporating policies grounded in access control models as explained in Ref. 7 to secure and
preserve the privacy of the user’s data across multiple sectors are well known. Such techniques play a huge role
in controlling access or information exchange between devices deployed in an IoT environment. Access control
models such as Discretionary Access Control (DAC) Ref. 8, Mandatory Access Control (MAC) Ref. 7, and RoleBased Access Control (RBAC) Ref. 9 models have been developed and used in the past. In DAC, the owner
determines the user’s access to information based on their identity. However, this model is limited as copying the
information between objects cannot be controlled and it is also susceptible to exploitation through unauthorized
access to sensitive information. The MAC model overcomes these limitations by providing a stricter control. This
was essentially achieved by assigning security labels to both users and objects. RBAC is comparatively a more
flexible and administrative-friendly access control model than DAC and MAC based on fixed and predetermined
policies. The downside of the RBAC model is the role-permission explosion problem, where too many permissions
assigned to roles make it hard to keep track.
More recently, the Attribute-Based Access Control (ABAC) model proposed by Jin et al. in Ref. 10 has
gained momentum as it addresses the limitations presented by the above models. This model employs user and
object attributes (or characteristics) to authorize decisions for operations by a subject (e.g., users and processes)
on the objects (like databases or files) in a system. Moreover, access control models, when combined with Web
Ontology Language (OWL) Ref. 11 provide flexibility in writing fine-grained context-aware policies. In previous
work Ref. 12 we showed how OWL could be used to implement and extend the standard RBAC model, providing
a more expressive way to describe policies.
This contributes to the flexibility of access control decisions by reasoning in distributed multi-agent environments. Work done by Li et al. Ref. 13 on securing and preserving the privacy of patients’ health records
exploited fine-grained access control policies for preventing multiple users from accessing sensitive information.
Similarly, Joshi et al. Ref. 14 show us how to attribute-based access control policies help in providing access
to critical documents in an organization stored in the cloud platform. Multiple sectors such as smart homes
Ref. 15, smart farms Ref. 16, 17, smart fisheries Ref. 18, healthcare Ref. 19 have also developed and applied
ontology-based ABAC framework for securing their ecosystems. In this paper, we aim to secure the constrained
battlefield environment by supporting operations across a network of sensors and military units. In addition, we
define context-aware access control policies and reason over them to detect and mitigate adversaries’ attacks.
3. CONTEXT-AWARE, POLICY-DRIVEN FRAMEWORK
The Internet of Battlefield Things enables a range of heterogeneous automated army assets to exchange information across infantry units to support real-time operations in a battlefield. However, since they operate in
contested environments, IoBT systems should expect to be attacked. In order to surmount such attacks it is
necessary for the IoBT to exhibit resilience. Our approach to support resilience in battlefield involves integration
of data from IoBT systems and sensors with the ontologies to create knowledge graphs. These are used to make
decisions about how to respond when a system is attacked by reasoning over these knowledge graphs and background information such as mission objectives. We describe below the three main components of our framework
such as context gathering, internet of battlefield things ontology and knowledge graph population and reasoning
component.
3.1 Context Gathering
The goal of the CAPD framework is to gather information from assets present on the battlefield to exhibit
resilience in an attack. To achieve this, we create an IoBT testbed having a range of heterogeneous automated
army assets that mimic the battlefield environment in real-time. These automated army assets provide contextual information about their surroundings, such as the device’s location, operations performed, network-level
bandwidth, IP address, time, etc.
For example, drones send a continuous video feed to the commander in control in the battlespace. The video
feed provides details about assets spotted at a particular time, location, and ongoing activities. These facts
generated are shared with permitted assets to derive more contextual facts. All the information gathered is
stored in the knowledge base and utilized by the policy engine for making a decision.
3.2 Internet of Battlefield Things Ontology
We developed a semantically rich ontology for securing autonomous networks and systems including unmanned
air and ground vehicles to enhance situational awareness in the battlefield. Our ontology promotes knowledge
exchange between agents in contested environments by re-using multiple classes and properties from other commonly used ontologies. Figure 1 depicts various components of our ontology that capture attack-related scenarios
from the Unified Cybersecurity Ontology (UCO) Ref. 20 and attribute-based access control (ABAC) concepts
Ref. 21. We also add concepts representing kinds of resilience to the ontology and leverage the existing W3C
Sensor IoT-Lite Ref. 22 and Geospatial Ref. 23 ontologies to represent interactions on the battlefield.
Using RDF-based knowledge graphs enables the use a variety of open-source tools developed by the community
as well as commercial tools. For example, SHACL (Shapes Constraint Language) Ref. 24 is a W3C standard
that is used to declare constraints on the content, structure and meaning of a knowledge graph that can be
automatically checked to identify incorrect or missing data. There are many reasoning tools, both open-source
and commercial, that can be used to infer and add new nodes and relations to the graph based on its initial
structure.
Since the IoBT is a very dynamic environment some information that was once true, such as the location of
a vehicle, will become false and must be changed. Data must also be removed or changed, if we determine that
it reported by an edge device that we’ve determined to be unreliable or compromised. We plan to modify one of
the open-source SWRL reasoning tools Ref. 25 to add a truth-maintenance capability based on our earlier work
Ref. 26. This will automatically remove inferred changes to the knowledge graph that are no longer supported
as nodes or relations are removed. It can also be used to generate explanations for inferred relations based on
the asserted facts and rules used to infer them.
An ontology for RDF-based knowledge graphs includes a collection of classes for concepts that are organized
into a taxonomy via subClassOf relations and a collection of properties forming a taxonomy using the subPropertyOf relation. Properties typically have constraints on their domain and range, i.e., the classes or data types
they can connect. The classes and properties are used to define instances of one or more classes with a set of
properties and values. The OWL language provides a very rich set of additional constraints that can be expressed
about classes and properties.
Our current IOBT ontology can be viewed via its permanent url Ref. 27. Some of the important classes and
properties of our ontology are explained below.
Figure 1. Internet of Battlefield Things ontology.
3.2.1 Classes
Here, we define the fundamental concepts for the battlefield in the form of classes. For instance, the Sensor class
characterizes all kinds of sensors present on the battlefield.
• Asset class: This class represents the assets owned by the military to perform various operations on the
battlefield. It has two subclasses such as MovableAsset and ImmovableAsset. The MovableAsset class
represents the movable sensors such as drones, unmanned ground vehicle (UGV), unmanned aerial vehicle
(UAV), etc. and ImmovableAsset class indicates a fixed sensor like unattended ground sensors (UGS).
• Attack class: This class represents types of attacks that happen in the battlefield. It has two subclasses
named Kinetic and CyberAttack.
• Observation class: This class provides us with data points recorded by the sensors that belong to the Asset
class.
• BandwidthObservation class: This class represents the network bandwidth of automated army assets present
on the battlefield.
• TemporalEntity class: This class represents the temporal information of the recorded observations generated
by the sensors.
• Result class: This class provides us with the data points generated by the assets present on the battlefield.
• BandwidthAttack class: This class is a subclass of CyberAttack. It provides information about the attempts
of an adversary to cripple the communication channels’ bandwidth and thus prevent information exchange.
• CourseOfAction class: This class characterizes the measures taken to defend an attack from happening or
reduce the impact of an attack.
• MitigationPlan class: This class provides us with a wide variety of mitigation techniques based on the type
of an attack to circumvent the threats caused by adversaries across all connected units.
• ProtectionProgram class: Every mitigation plan involves a series of steps to reduce risk caused by an
adversary. This class describes the methods for each of the mitigation techniques.
3.2.2 Relations
Relations establish a link between classes. We describe below how our classes relate to each other.
• hasBandwidth: Represents the link between Observation class and BandwidthObservation class. This
property aids in identifying network bandwidth levels for each of the sensors that belong to the Assetclass.
Domain: Observation
Range: BandwidthObservation
• phenomenonTime: This relation establishes a link between Observation class and TemporalEntity class
indicating time at which network bandwidth is recorded.
Domain: Observation
Range: TemporalEntity
• hasResult: This relation determines the value recorded by various individual assets at a particular timestamp.
Domain: Observation
Range: Result
• mitigates: Represents link between CourseOfAction class and Attack class. It provides information on
action to be taken when attacked by an adversary.
Domain: CourseOfAction
Range: Attack
• listedPlan: This relation between CourseOfAction class and MitigationPlan class determines mitigation
technique to be considered based on the detected attack found exploiting the army assets.
Domain: CourseOfAction
Range: MitigationPlan
• hasProtectionProgram: Relationship where the subject entity belongs to the MitigationPlan class and
object entity belongs to the ProtectionProgram class indicates protection program code designed for each
mitigation technique.
Domain: MitigationPlan
Range: ProtectionProgram
3.3 Knowledge Graph Population and Reasoning
Knowledge graphs play a vital role in encapsulating the domain knowledge from an ontology linked with data
generated from sensors. They aid in a more profound understanding of the contextual information to make
decisions. In our work, we use semantic web technologies such as Resource Descriptions Framework (RDF)
Ref. 28 and SPARQL Protocol and RDF Query Language Ref. 29 to populate and query a knowledge graph.
Here the entities and their relationships as described in Section 3.2 serve as a schema for the knowledge graph.
We incorporate a policy engine that populates and queries the knowledge graph to support reasoning over
contextual information integrated with the semantic schema of the battlefield. The populated knowledge graph
in RDF format is present in the policy engine, where the asset information is in a structured format suitable for
reasoning and drawing inferences. Further, the policy engine queries the knowledge graph utilizing SPARQL to
infer a protection program for mitigating the adversaries’ impact caused by an attack.
4. USE CASE SCENARIOS
Our CAPD framework identifies attacks on the battlefield and uses context-driven policies to defend against
them. To demonstrate the capabilities of our framework, we build an upper-level ontology to describe the
“battlefield” and link with other underlying ontologies for sensors, cybersecurity, and access control as described
in Section 3.2. First, we added military assets and their communication and interactions to the semantic schema.
We also included resilience concepts related to the mission. In our setup, we utilize low power edge devices like
the NVIDIA Jetson Nano platform Ref. 30 to implement our mission and show how our ontology can be utilized
to create populated knowledge graphs from sensed data and reason over them in response to attack scenarios.
Use Case 1: Consider a scenario in the battlefield where an adversary attacks to significantly reduce network
bandwidth of a military asset named Asset A (Camera) that is continuously transferring video feed to another
asset named Asset B (Lieutenant’s handheld device). In this case, we monitor the network bandwidth level
between Asset A and Asset B associated with BandwidthObservation class and identify whether the observed
value falls under low, medium, or high bandwidth categories based on ranges determined for each category. The
intuition is that an adversary may try to jam or degrade the connection.
Based on the category of network bandwidth, the reasoner infers a protection program to facilitate information
exchange in the contested environment. An example of a SPARQL query for the above scenario is presented
below:
PREFIX bf:<http://purl.org/ArtIAMAS/battlefield#>
PREFIX sosa: <http://www.w3.org/ns/sosa/phenomenonTime#>
PREFIX stix: <http://purl.org/cyber/stix/mitigates#>
SELECT (?TS as ?Time) (?BA as ?BandwidthStage) (?code AS ?Mitigation_Program)
WHERE {
?BA a bf:BandwidthAttack;
bf:lowRange ?l;
bf:highRange ?h .
?BO a bf:BandwidthObservation;
sosa:phenomenonTime ?TS;
bf:hasResult ?Res .
?Res bf:value ?val .
FILTER (?val >= ?l && ?val <= ?h).
?BAM stix:mitigates ?BA;
bf:listedPlan ?MitigationPlan.
?MitigationPlan stix:hasProtectionProgram ?PP .
?PP bf:code ?code .
}
ORDER BY ?TS
The above query looks for the range of network bandwidth availability in order to decide whether to communicate
the regular resolution color video, gray-scale video or still pictures. If the network bandwidth is high, color video
is transferred. For medium level bandwidth gray scale video is transferred and pictures for lower bandwidth. If
the network bandwidth is very low, we run an image detection algorithm locally on Asset A to compute only
the number of tanks spotted and transfer the information to the commander in control.
Use Case 2: The adversary jams network connection between assets to prevent the exchange of information.
For example, Asset A utilizes a fourth-generation (4G) connection by default to support the data exchange over
a range upstream. However, the CAPD framework identifies the link as jammed by the adversary and switches
the network connection from 4G technology to Long Range Wide Area Network (LoRaWAN). Since LoRaWAN
consumes less power while covering a wide area with a lower data transmission rate, we also need to make changes
in the content transmitted similar to use case 1.
Use Case 3: An adversary completely subverts the operations of camera, by physical covering it, or causing
smoke/dust etc. In this case, our policy framework automatically switches to gathering information from the
microphone and shares the information with the lieutenant. For example, instead of sending the video of
advancing armor, we could listen to the sound to estimate whether the enemy armor was in the region.
Use Case 4: The adversary orchestrates an attack on assets at a particular location. In this situation, our
CAPD framework identifies movable assets (drones) in the nearby area and transmits a command for repositioning
their video focus. As a result, the commander in control receives information to understand the neighboring
plot’s situation better. Similarly, we can utilize our framework to investigate new attacks and create policies to
capture adaptation under attacks.
5. CONCLUSION
Resilience on the battlefield is imperative to accommodate failures of sensors or disruption of services caused by
an adversary. We have developed the context-aware, policy-driven (CAPD) framework to facilitate information
exchange and demonstrate resilience under attacks. We use information generated by military assets and our
Internet of Battlefield Things (IoBT) ontology to populate a knowledge graph. Further, policy engine queries
populated knowledge graphs to infer knowledge that supports secure operations on the battlefield. We also
demonstrated the ability of our CAPD framework to reason over the context in contested environment with
the help of a use case scenario. In our ongoing work, we plan to extend our framework by investigating how
adversaries may poison sensor data and identifying corresponding resilience strategies.
ACKNOWLEDGMENTS
This research was supported by U.S. Army Grant No. W911NF2120076. The authors would like to thank Dr.
Roberto Yus for the suggestions provided during the development of our ontology.
REFERENCES
[1] Peranzo, P., “8 Sectors That Can Benefit the Most from IoT Development in 2022.” https://imaginovation.net/blog/8-sectors-benefit-from-iot-development-in-2021/ (2021).
[2] Russell, S. and Abdelzaher, T., “The internet of battlefield things: The next generation of command,
control, communications and intelligence (c3i) decision-making,” in [Military Communications Conference
(MILCOM) ], 737–742, IEEE (2018).
[3] Cameron, L., “Internet of things meets the military and battlefield.” https://www.computer.org/publications/tech-news/research/internet-of-military-battlefield-things-iomt-iobt (2019). IEEE Tech News.
[4] Finin, T. and Joshi, A., “Agents, trust, and information access on the semantic web,” ACM SIGMOD
Record 31(4), 30–35 (2002).
[5] Patwardhan, A., Korolev, V., Kagal, L., and Joshi, A., “Enforcing policies in pervasive environments,” in
[Int. Conf. on Mobile and Ubiquitous Systems: Networking and Services ], 299–308, IEEE (2004).
[6] Parker, J., Undercoffer, J., Pinkston, J., and Joshi, A., “On intrusion detection and response for mobile ad
hoc networks,” in [Int. Conf. on Performance, Computing, and Communications ], 747–752, IEEE (2004).
[7] Sandhu, R. S. and Samarati, P., “Access control: principle and practice,” IEEE communications magazine 32(9), 40–48 (1994).
[8] Mudarri, T., Al-Rabeei, S., and Abdo, S., “Security fundamentals: access control models,” Interdisciplinarity
in theory and practice 8 (2015).
[9] Sandhu, R., “Role-based access control,” in [Advances in computers ], Zelkowitz, M. V., ed., 46, 237–286,
Elsevier (1998).
[10] Jin, X., Krishnan, R., and Sandhu, R., “A unified attribute-based access control model covering dac, mac
and rbac,” in [IFIP Annual Conference on Data and Applications Security and Privacy ], 41–55, Springer
(2012).
[11] McGuinness, D. L., Van Harmelen, F., et al., “Owl web ontology language overview,” w3c recommendation,
World Wide Web Consortium (2004).
[12] Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W. H., and Thuraisingham, B., “ROWLBAC - Representing Role Based Access Control in OWL,” in [13th Symposium on Access control Models
and Technologies ], ACM Press (2008).
[13] Li, M., Yu, S., Ren, K., and Lou, W., “Securing personal health records in cloud computing: Patient-centric
and fine-grained data access control in multi-owner settings,” in [International conference on security and
privacy in communication systems ], 89–106, Springer (2010).
[14] Joshi, M., Mittal, S., Joshi, K. P., and Finin, T., “Semantically rich, oblivious access control using ABAC
for secure cloud storage,” in [International conference on edge computing], 142–149, IEEE (2017).
[15] Dutta, S., Chukkapalli, S. S. L., Sulgekar, M., Krithivasan, S., Das, P. K., and Joshi, A., “Context sensitive
access control in smart home environments,” in [Int. Conferences on Big Data Security on Cloud, High
Performance and Smart Computing, and Intelligent Data and Security ], 35–41, IEEE (2020).
[16] Chukkapalli, S. S. L., Piplai, A., Mittal, S., Gupta, M., and Joshi, A., “A smart-farming ontology for
attribute based access control,” in [2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl
Conference on Intelligent Data and Security (IDS) ], 29–34, IEEE (2020).
[17] Chukkapalli, S. S. L., Mittal, S., Gupta, M., Abdelsalam, M., Joshi, A., Sandhu, R., and Joshi, K., “Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem,” IEEE Access 8,
164045–164064 (2020).
[18] Chukkapalli, S. S. L., Aziz, S. B., Alotaibi, N., Mittal, S., Gupta, M., and Abdelsalam, M., “Ontology
driven ai and access control systems for smart fisheries,” in [Proceedings of the 2021 ACM Workshop on
Secure and Trustworthy Cyber-Physical Systems ], 59–68 (2021).
[19] Barhoun, R., Ed-Daibouni, M., and Namir, A., “An extended attribute-based access control (abac) model
for distributed collaborative healthcare system,” International Journal of Service Science, Management,
Engineering, and Technology (IJSSMET) 10(4), 81–94 (2019).
[20] Syed, Z., Padia, A., Finin, T., Mathews, L., and Joshi, A., “Uco: A unified cybersecurity ontology,” in
[Workshops at the thirtieth AAAI conference on artificial intelligence], (2016).
[21] Sharma, N. K. and Joshi, A., “Representing attribute based access control policies in owl,” in [2016 IEEE
Tenth International Conference on Semantic Computing (ICSC) ], 333–336, IEEE (2016).
[22] Bermudez-Edo, M., Elsaleh, T., Barnaghi, P., and Taylor, K., “Iot-lite: a lightweight semantic model for the
internet of things,” in [Conferences on ubiquitous intelligence & computing, advanced and trusted computing,
scalable computing and communications, cloud and big data computing, internet of people, and smart world
congress ], 90–97, IEEE (2016).
[23] Budak Arpinar, I., Sheth, A., Ramakrishnan, C., Lynn Usery, E., Azami, M., and Kwan, M.-P., “Geospatial
ontology development and semantic analytics,” Transactions in GIS 10(4), 551–575 (2006).
[24] Knublauch, H. and Kontokostas, D., “Shapes constraint language (shacl),” w3c recommendation, World
Wide Web Consortium (2017). https://www.w3.org/TR/shacl/.
[25] Horrocks, I., Patel-Schneider, P. F., Boley, H., Tabet, S., Grosof, B., and Dean, M., “Swrl: A semantic web
rule language combining owl and ruleml,” w3c member submission, World Wide Web Consortium (2004).
https://www.w3.org/Submission/SWRL/.
[26] Finin, T., Fritzson, R., and Matuszek, D., “Adding forward chaining and truth maintenance to prolog,” in
[5th Conference on Artificial Intelligence Applications ], 123–130, IEEE Computer Society (1989).
[27] Chukkapalli, S. S. L., “Internet of battlefield things ontology.” http://bit.ly/ArtIAMAS iobt (2022).
[28] Manola, F., Miller, E., and McBride, B., “RDF primer,” w3c recommendation, World Wide Web Consortium
(2004). https://www.w3.org/TR/rdf-primer/.
[29] Harris, S., Seaborne, A., and Prud’hommeaux, E., “Sparql 1.1 query language. w3c recommendation.”
https://www.w3.org/TR/sparql11-query/ (March 2013).
[30] Cass, S., “NVIDIA makes it easy to embed AI: The Jetson nano packs a lot of machine-learning power into
diy projects,” IEEE Spectrum 57(7), 14–16 (2020).