Laboratory bistatic synthetic aperture radar coherent change detection investigation
Synthetic Aperture Radar (SAR) Coherent Change Detection (CCD) allows for the detection of very small scene changes. This is particularly useful for reconnaissance and surveillance as small changes such as vehicle tracks can be identified.
Alexander Hagelberg +2 more
doaj +1 more source
Cyber Operations Between Russia and Ukraine During Ukrainian Conflict
When the Ukraine crisis started in 2013, discussions about possible cyber warfare appeared. Debates about the usage of cyber tools in war conflicts have already been considered for the last few years and conflicts where actors possess these capacities ...
Miroslava Pavlíková
doaj +1 more source
INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS
The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age.
Ahmad Candra +2 more
doaj +1 more source
A discourse in conflict : resolving the definitional uncertainty of cyber war : a thesis presented in partial fulfilment for the requirements for the degree of Master of Arts in Defence and Security Studies at Massey University, Albany, New Zealand [PDF]
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved.
Hughes, Dan
core
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
Military objectives in cyber warfare [PDF]
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers +21 more
core +1 more source
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks [PDF]
This paper discusses ways in which utilising methods from typically non-cyber disciplines, business and criminology, can successfully be applied to the cyber domain to aid the fight against and the prevention of cyber-attacks, including those used in ...
Hallaq, Bilal, Somer, Tiia, Watson, Tim
core
Abstract Chemical and biological events present a challenging environment for forensic scientists to perform their work. This research is the follow‐up of the previous article that investigated the impact of decontaminants on fingermarks deposited on glass.
Isabelle Radgen‐Morvant +3 more
wiley +1 more source
Possibility of applying the rules of international humanitarian law to cyber warfare
Cyber warfare represents a new form of conflict in today’s world. Unlike earlier traditional armed conflicts, cyber warfare is different in terms of means, methods, techniques, and actors.
Sanela Veljković
doaj +1 more source

