The Evolution of Regime Change and Information Warfare in the 21st Century
Although information is nothing new to war or conflict, the speed at which it reaches a much wider target audience, and thus its potential impact and consequences, is changing due to the rapid development of information and communications technology ...
G. Simons
doaj +1 more source
Issues of Resilience to Cyber-Enabled Psychological and Information Operations
This article discusses the transformation of the information environment, which allows an adversary to exploit cyber-enabled psychological and information operations.
Petra Mlejnková
doaj +1 more source
CNA Tactics and Techniques: A Structure Proposal
Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation ...
Antonio Villalón-Huerta +2 more
doaj +1 more source
Designing multi period-multi level Supply Chain for Fixed Lifetime Perishable Products under Uncertainty [PDF]
The current research has considered the design of the four-level supply chain of perishable goods, including manufacturing factories, distribution centers, wholesalers, and retailers, in conditions of uncertainty in important parameters.
Ahmad Ebrahimi +3 more
doaj +1 more source
Information operations of Western Intelligence Services in Serbia in October 2000 [PDF]
The so-called 'colour revolutions' or 'democratic national revolutions' represent the planned coups, which are, instead of the armed forces, executed for such purpose by mobilized and manipulated by information operations civilian population.
Miljković Milan, Tadić Darko
doaj +1 more source
Legal aspects of information operations in Poland
Information is, was and will be one of most valuable resources of any organization and nation. It is not a surprise, that information is a subject of systematic protection and on the other hand, information is the target of various attacks. Thanks to the
Кшиштоф Чоховскі
doaj +1 more source
Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces [PDF]
The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare.
Peter PINDJÁK
doaj +1 more source
Cyber Conflicts as a New Global Threat
In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict.
Alexander Kosenkov
doaj +1 more source
Quantum arithmetic operations based on quantum Fourier transform on signed integers [PDF]
The quantum Fourier transform (QFT) brings efficiency in many respects, especially usage of resource, for most operations on quantum computers. In this study, the existing QFT-based and non-QFT-based quantum arithmetic operations are examined.
Şahin, Engin
core +2 more sources
Evaluating the Resilience of COVID-19 Vaccine Supply Chain using Bayesian Networks [PDF]
The COVID-19 pandemic has posed a significant challenge to the COVID-19 vaccine supply chain that need to be resolved for a successful exit from the pandemic. It is essential to identify and evaluate the risks associated with the vaccine supply chain. We
Samaneh Peyghami +3 more
doaj +1 more source

