Results 1 to 10 of about 34,930 (170)

Defining cyber warfare [PDF]

open access: yesVojnotehnički Glasnik, 2012
Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse ...
Dragan D. Mladenović   +2 more
doaj   +3 more sources

Unconventional cyber warfare: cyber opportunities in unconventional warfare [PDF]

open access: yes, 2014
Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S.
Eidman, Christopher R.   +1 more
core   +2 more sources

Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]

open access: yesJournal of Defense Analytics and Logistics, 2021
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia   +5 more
doaj   +1 more source

Penggunaan Cyber Warfare dalam Konflik Bersenjata Internasional Antara Rusia-Ukraina Menurut Hukum Humaniter Internasional

open access: yesLareh Law Review, 2023
Today's the advancements of technology have an impact on many aspects of life, including health, education, transportation, business, information communication, and government administration. Nonetheless, given the strong relationship between technology
Andyta Sekar Pratiwi   +2 more
doaj   +1 more source

Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj   +1 more source

Sidelobe Suppression Techniques for Near-Field Multistatic SAR

open access: yesSensors, 2023
Multirotor Unmanned Air Systems (UAS) represent a significant improvement in capability for Synthetic Aperture Radar (SAR) imaging when compared to traditional, fixed-wing, platforms.
George A. J. Price   +3 more
doaj   +1 more source

Technological, military and social causes for the application of cyber warfare [PDF]

open access: yesVojnotehnički Glasnik, 2012
Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare.
Dragan D. Mladenović   +2 more
doaj   +1 more source

PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

open access: yesIEEE Access, 2020
File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works have
Junghee Lee   +4 more
doaj   +1 more source

Statistical analysis of in‐flight drone signatures

open access: yesIET Radar, Sonar & Navigation, 2022
Drone‐monitoring radars typically integrate many pulses in order to improve signal to noise ratio and enable high detection performance. Over the course of this coherent processing interval (CPI), many components of the drone signature change and the ...
John Markow   +2 more
doaj   +1 more source

W-Band Multi-Aspect High Resolution Range Profile Radar Target Classification Using Support Vector Machines

open access: yesSensors, 2021
Millimeter-wave (W-band) radar measurements were taken for two maritime targets instrumented with attitude and heading reference systems (AHRSs) in a littoral environment with the aim of developing a multiaspect classifier.
Tomasz Jasinski   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy