Results 201 to 210 of about 2,457,982 (249)
Some of the next articles are maybe not open access.

Security Threats, Countermeasures, and Challenges of Digital Supply Chains

ACM Computing Surveys, 2023
The rapid growth of Information Communication Technologies (ICT) has impacted many fields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into ...
B. Hammi, S. Zeadally, J. Nebhen
semanticscholar   +1 more source

Hybrid Phased-MIMO Radar: A Novel Approach With Optimal Performance Under Electronic Countermeasures

IEEE Communications Letters, 2018
This letter presents a novel technique for optimizing the performance of a phased-multi-in multi-out (MIMO) radar in the presence of strong jamming effects.
Faran Awais Butt, I. Naqvi, U. Riaz
semanticscholar   +1 more source

An Effective Composite Jamming Method for Synthetic Aperture Radar in Practical Electronic Countermeasures

2024 IEEE International Conference on Acoustics, Speech, and Signal Processing Workshops (ICASSPW)
The interference technology of synthetic aperture radar (SAR) is become a hot issue in the contemporary electronic countermeasures. However, the existing kinds of single interferences possess some defects.
Xinrui Li, Baixiao Chen
semanticscholar   +1 more source

Cyber-Attacks Related to Intelligent Electronic Devices and Their Countermeasures: A Review

International Universities Power Engineering Conference, 2018
Intelligent electronic devices (IEDs) are deployed in power systems to facilitate advanced automation for controlling critical equipment. Once an IED is compromised, attackers can seize the control of the physical entities in substations.
Jingyu Wang, Dongyuan Shi
semanticscholar   +1 more source

Electronic Countermeasure and Electronic Counter-Countermeasure

2020
The evolution of electronic warfare has been driven by the competition between electronic countermeasures (ECM) and electronic counter-countermeasures (ECCM). Electronic warfare involves not only harnessing the electromagnetic spectrum but defending against enemy use of the spectrum, and, if possible, denying their ability to use it in the first place.
openaire   +1 more source

Application Advantages and Security Countermeasures of Computer Electronic Information Engineering Technology

Electronic Engineering and Applications
the same time the influence is great, but to ensure the safety of the network and information also need to consider and discuss the safety and advantages of ECET application.
Chang Liu
semanticscholar   +1 more source

Trends in electronic counter-countermeasures

NTC '91 - National Telesystems Conference Proceedings, 2002
The authors define some terminology and give a brief overview of the types of ECM (electronic countermeasures) and their effects on radar. The fundamental principles that the designer can exploit in the design of new ECCM (electronic counter-countermeasure) techniques are examined.
G.V. Morris, T.A. Kastle
openaire   +1 more source

Multiplexed synchronization: an electronic warfare countermeasure

IEEE Transactions on Communications, 1991
The authors present a method for transporting data through very noisy channels such as those encountered in electronic warfare. This method is based on two very important concepts. One of these is multiplexing via Boolean functions and the other is code combining. This technique spreads synchronization information throughout the message.
J.E. Hershey, A.D. Michaelis
openaire   +1 more source

Waveform optimization for electronic countermeasure technique generation

2008 IEEE Radar Conference, 2008
Recent work on electronic countermeasure (ECM) technique generation employed genetic algorithm optimization methods to define simple range-gate pull-off waveforms against a generic range-tracking radar simulation. This automated approach has potential to greatly reduce technique development time which is traditionally prolonged by manual ...
James Townsend   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy