Results 121 to 130 of about 291,363 (254)

The Law and the Human Target in Information Warfare: Cautions and Opportunities [PDF]

open access: yes, 2000
This bachelor thesis will explore how two traffic shaping mechanisms can help preserve battery power while retaining a certain Quality of Service (QoS) in an Android based application developed for crisis management. The implemented user-space mechanisms
Hall, Henning, Luckey, Christian
core   +1 more source

Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]

open access: yes, 2019
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H.   +2 more
core   +1 more source

Perspectives for Cyber Strategists on Law for Cyberwar [PDF]

open access: yes, 2011
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core   +1 more source

State opinio juris and international humanitarian law pluralism [PDF]

open access: yes, 2015
International humanitarian law has developed through a pluralistic process. Its history reveals a pattern of rough proportionality between State opinio juris and non-State expressions of law.
Schmitt, Michael N., Watts, Sean
core   +1 more source

“On target”: precision and balance in the contemporary law of targeting [PDF]

open access: yes, 2014
The law of targeting lies at the heart of international humanitarian law (IHL). As such it is the fulcrum around which discussion of combat operations revolves.
Schmitt, Michael N., Widmar, Eric
core  

Laboratory multistatic 3D SAR with polarimetry and sparse aperture sampling

open access: yesIET Radar, Sonar & Navigation
With the advent of constellations of SAR satellites, and the possibility of swarms of SAR UAV's, there is increased interest in multistatic SAR image formation.
Richard Welsh, Daniel Andre, Mark Finnis
doaj   +1 more source

Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]

open access: yes
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core  

Polarimetry for Sparse Multistatic 3D SAR

open access: yesIET Radar, Sonar & Navigation
There is significant interest in multistatic SAR image formation, due to the increased development of satellite constellations and UAV swarms for remote sensing applications. The exploitation of the finer resolution and wider coverage of these geometries
Richard Welsh, Daniel Andre, Mark Finnis
doaj   +1 more source

Combined intensity and coherent change detection with four classes for laboratory multistatic polarimetric synthetic aperture radar

open access: yesIET Radar, Sonar & Navigation
Satellites and drone swarms can be used to collect multistatic Synthetic Aperture Radar (SAR) images. Synthetic Aperture Radar images can be used for Intelligence Surveillance and Reconnaissance.
Alexander Hagelberg   +2 more
doaj   +1 more source

Editorial: Ethical challenges in AI-enhanced military operations. [PDF]

open access: yesFront Big Data, 2023
Helkala KM, Lucas G, Barrett E, Syse H.
europepmc   +1 more source

Home - About - Disclaimer - Privacy