Results 21 to 30 of about 34,930 (170)

Laboratory bistatic synthetic aperture radar coherent change detection investigation

open access: yesElectronics Letters, 2023
Synthetic Aperture Radar (SAR) Coherent Change Detection (CCD) allows for the detection of very small scene changes. This is particularly useful for reconnaissance and surveillance as small changes such as vehicle tracks can be identified.
Alexander Hagelberg   +2 more
doaj   +1 more source

Cyber Operations Between Russia and Ukraine During Ukrainian Conflict

open access: yesObrana a Strategie, 2016
When the Ukraine crisis started in 2013, discussions about possible cyber warfare appeared. Debates about the usage of cyber tools in war conflicts have already been considered for the last few years and conflicts where actors possess these capacities ...
Miroslava Pavlíková
doaj   +1 more source

INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS

open access: yesJurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity, 2021
The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age.
Ahmad Candra   +2 more
doaj   +1 more source

A discourse in conflict : resolving the definitional uncertainty of cyber war : a thesis presented in partial fulfilment for the requirements for the degree of Master of Arts in Defence and Security Studies at Massey University, Albany, New Zealand [PDF]

open access: yes, 2017
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved.
Hughes, Dan
core  

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

Military objectives in cyber warfare [PDF]

open access: yes, 2017
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers   +21 more
core   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks [PDF]

open access: yes, 2016
This paper discusses ways in which utilising methods from typically non-cyber disciplines, business and criminology, can successfully be applied to the cyber domain to aid the fight against and the prevention of cyber-attacks, including those used in ...
Hallaq, Bilal, Somer, Tiia, Watson, Tim
core  

Effects of chemical and biological warfare agent decontaminants on trace survival: Impact on fingermarks deposited on paper

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant   +3 more
wiley   +1 more source

Possibility of applying the rules of international humanitarian law to cyber warfare

open access: yesPravo
Cyber warfare represents a new form of conflict in today’s world. Unlike earlier traditional armed conflicts, cyber warfare is different in terms of means, methods, techniques, and actors.
Sanela Veljković
doaj   +1 more source

Home - About - Disclaimer - Privacy