Results 1 to 10 of about 3,457,821 (295)

The Evolution of Regime Change and Information Warfare in the 21st Century

open access: yesМеждународная аналитика, 2021
Although information is nothing new to war or conflict, the speed at which it reaches a much wider target audience, and thus its potential impact and consequences, is changing due to the rapid development of information and communications technology ...
G. Simons
doaj   +1 more source

Issues of Resilience to Cyber-Enabled Psychological and Information Operations

open access: yesVojenské rozhledy, 2022
This article discusses the transformation of the information environment, which allows an adversary to exploit cyber-enabled psychological and information operations.
Petra Mlejnková
doaj   +1 more source

CNA Tactics and Techniques: A Structure Proposal

open access: yesJournal of Sensor and Actuator Networks, 2021
Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation ...
Antonio Villalón-Huerta   +2 more
doaj   +1 more source

Designing multi period-multi level Supply Chain for Fixed Lifetime Perishable Products under Uncertainty [PDF]

open access: yesMuṭāli̒āt-i Mudīriyyat-i Ṣan̒atī, 2023
The current research has considered the design of the four-level supply chain of perishable goods, including manufacturing factories, distribution centers, wholesalers, and retailers, in conditions of uncertainty in important parameters.
Ahmad Ebrahimi   +3 more
doaj   +1 more source

Information operations of Western Intelligence Services in Serbia in October 2000 [PDF]

open access: yesВојно дело, 2017
The so-called 'colour revolutions' or 'democratic national revolutions' represent the planned coups, which are, instead of the armed forces, executed for such purpose by mobilized and manipulated by information operations civilian population.
Miljković Milan, Tadić Darko
doaj   +1 more source

Legal aspects of information operations in Poland

open access: yesSocial Development & Security, 2022
Information is, was and will be one of most valuable resources of any organization and nation. It is not a surprise, that information is a subject of systematic protection and on the other hand, information is the target of various attacks. Thanks to the
Кшиштоф Чоховскі
doaj   +1 more source

Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces [PDF]

open access: yesINCAS Bulletin, 2015
The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare.
Peter PINDJÁK
doaj   +1 more source

Cyber Conflicts as a New Global Threat

open access: yesFuture Internet, 2016
In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict.
Alexander Kosenkov
doaj   +1 more source

Quantum arithmetic operations based on quantum Fourier transform on signed integers [PDF]

open access: yes, 2020
The quantum Fourier transform (QFT) brings efficiency in many respects, especially usage of resource, for most operations on quantum computers. In this study, the existing QFT-based and non-QFT-based quantum arithmetic operations are examined.
Şahin, Engin
core   +2 more sources

Evaluating the Resilience of COVID-19 Vaccine Supply Chain using Bayesian Networks [PDF]

open access: yesچشم‌انداز مدیریت صنعتی, 2023
The COVID-19 pandemic has posed a significant challenge to the COVID-19 vaccine supply chain that need to be resolved for a successful exit from the pandemic. It is essential to identify and evaluate the risks associated with the vaccine supply chain. We
Samaneh Peyghami   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy