Results 1 to 10 of about 34,930 (170)
Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse ...
Dragan D. Mladenović +2 more
doaj +3 more sources
Unconventional cyber warfare: cyber opportunities in unconventional warfare [PDF]
Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S.
Eidman, Christopher R. +1 more
core +2 more sources
Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia +5 more
doaj +1 more source
Today's the advancements of technology have an impact on many aspects of life, including health, education, transportation, business, information communication, and government administration. Nonetheless, given the strong relationship between technology
Andyta Sekar Pratiwi +2 more
doaj +1 more source
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj +1 more source
Sidelobe Suppression Techniques for Near-Field Multistatic SAR
Multirotor Unmanned Air Systems (UAS) represent a significant improvement in capability for Synthetic Aperture Radar (SAR) imaging when compared to traditional, fixed-wing, platforms.
George A. J. Price +3 more
doaj +1 more source
Technological, military and social causes for the application of cyber warfare [PDF]
Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare.
Dragan D. Mladenović +2 more
doaj +1 more source
PhantomFS: File-Based Deception Technology for Thwarting Malicious Users
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works have
Junghee Lee +4 more
doaj +1 more source
Statistical analysis of in‐flight drone signatures
Drone‐monitoring radars typically integrate many pulses in order to improve signal to noise ratio and enable high detection performance. Over the course of this coherent processing interval (CPI), many components of the drone signature change and the ...
John Markow +2 more
doaj +1 more source
Millimeter-wave (W-band) radar measurements were taken for two maritime targets instrumented with attitude and heading reference systems (AHRSs) in a littoral environment with the aim of developing a multiaspect classifier.
Tomasz Jasinski +2 more
doaj +1 more source

