Academic literature on the topic 'Electronic counter-countermeasures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic counter-countermeasures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic counter-countermeasures"

1

SEMENENKO, Oleh M., Uzef B. DOBROVOLSKYI, Maryna O. SLIUSARENKO, Svitlana S. ZVARYCH, and Anatolii O. ZVARYCH. "Methodical approach to evaluating the effectiveness of electronic counter-countermeasures to airborne interference stations in aerial combat." INCAS BULLETIN 12, S (2020): 149–57. http://dx.doi.org/10.13111/2066-8201.2020.12.s.14.

Full text
Abstract:
Modern active jamming stations reduce the chance of aircraft getting hit by missiles with active and semi-active homing heads during aerial combat by 40-60%. The active development of airborne electronic countermeasures equipment forces to look for ways and means to not only protect against them, but also to actively counter these means, the so-called electronic counter-countermeasures. Nowadays, there are several methods of electronic counter-countermeasures to the enemy airborne active jamming stations, but the sequence and conditions of their application are not defined. Therefore, the paper proposes to determine the features of the application of three methods of electronic counter-countermeasures and to develop an algorithm for electronic counter-countermeasures against the enemy airborne active jamming stations in the conditions of creating polarization jamming of various kinds. The development of the algorithm allows to evaluate the efficiency of the application of electronic counter-countermeasures based on performance indicators of the functioning of an airborne targeting radar.
APA, Harvard, Vancouver, ISO, and other styles
2

Semenenko, O., O. Kablukov, O. Shkurpit, O. Sechenev, and V. Mironenko. "AN ALGORITHM FOR CONTRADIO-ELECTRONIC COUNTERING BY ON-BOARD STATION OF AN OPPONENT'S ACTIVE INTERFERENCE UNDER CONDITIONS OF CREATION OF ITS POLARIZATION INTERFERENCE AND A GENERAL APPROACH TO ASSESSING ITS PERFORMANCE IN AIR." Collection of scientific works of Odesa Military Academy 2, no. 12 (2019): 92–101. http://dx.doi.org/10.37129/2313-7509.2019.12.2.92-101.

Full text
Abstract:
The combat capabilities of modern means of warfare in the air, largely depend on the reliable functioning of electronic weapons and electronic weapon control systems. Therefore, during air operations, each of the belligerents will strive to disorganize the operation of radio-electronic means and radio-electronic systems for controlling forces and weapons in order to ensure the stable operation of their means. Modern stations of active interference of individual protection reduce aircraft damage by missiles with active and semi-active homing during air combat by 40-60%. The active development of airborne electronic countermeasures forces us to look for ways and means not only to protect against them, but also to actively counter these means, the so-called counter-radioelectronic countermeasures. Today, there are some methods of counter-radioelectronic counteraction to the airborne stations of active interference of the individual defense of the enemy, but the sequence and conditions of their application are not defined. Therefore, the article proposes to determine the features of the application of three methods of counter-radioelectronic counteraction and to develop an algorithm for counter-radioelectronic counteraction to on-board stations of active enemy interference in the conditions of the creation of various types of polarization interference by it. The development of the algorithm makes it possible to evaluate the effectiveness of the application of counter-radioelectronic countermeasures based on performance indicators of the operation of an on-board radar weapon control station.
APA, Harvard, Vancouver, ISO, and other styles
3

George, Jomon, P. Sinchu, K. Ajith Kumar, and T. Santhana Krishnan. "Towed Acoustic Countermeasures for Defending Acoustic Homing Torpedoes." Defence Science Journal 69, no. 6 (2019): 607–12. http://dx.doi.org/10.14429/dsj.69.13337.

Full text
Abstract:
The growing torpedo threat to ships and submarines demands effective countermeasures for defence. Detection, classification and localisation of an attacking torpedo is the first step towards launching effective countermeasures. Studies are on the rise to use the existing sonar systems to detect torpedoes and subsequently use countermeasures. The use of towed array sonar systems for torpedo detection and acoustic counter measures are the most recent and not reported much in open literature. This paper presents a modular acoustic counter measure approach using towed decoy against acoustic homing torpedoes. Describes the technologies and algorithms required for different modes of towed decoy, which is effective against both active and passive acoustic homing torpedoes. Towed decoy signal generation schemes and their realisation using digital signal processing hardware are outlined in this paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Hyun-Ki, Sung-Hyun Han, Gyoung-Pyo Hong, Surng-Gabb Jahng, and Jong-Soo Choi. "IR Model of 3D Aircraft for Simulation of Reticle Seekers." Journal of Circuits, Systems and Computers 07, no. 04 (1997): 333–44. http://dx.doi.org/10.1142/s0218126697000243.

Full text
Abstract:
This paper presents an efficient simulation method that generates thermal images and also gives tracking results of infra-red (IR) reticle seekers. First, we make an IR model of the object with the internal heat source, and generate thermal images by the optical system of the reticle seeker and the atmospheric turbulence. Using the obtained thermal images, we can simulate IR reticle seekers in various scenarios including countermeasures (CM) such as flares. Simulation results show that we can generate more accurate images by using the proposed method, which is applicable to the study of the development of counter-countermeasures (CCMs).
APA, Harvard, Vancouver, ISO, and other styles
5

Lu Xiao, 卢晓, 梁晓庚 Liang Xiaogeng та 贾晓洪 Jia Xiaohong. "红外成像空空导弹智能化抗干扰研究". Infrared and Laser Engineering 50, № 4 (2021): 20200240. http://dx.doi.org/10.3788/irla20200240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Kee-Woong, and Woo-Kyung Lee. "Waveform diversity for SAR ECCM based on random phase and code rate transition." International Journal of Microwave and Wireless Technologies 9, no. 6 (2017): 1345–54. http://dx.doi.org/10.1017/s1759078717000678.

Full text
Abstract:
In this paper, we propose an effective waveform diversity scheme that can be applicable to synthetic aperture radar (SAR) operations affected by interfering signals. A novel approach is taken to achieve fully adaptive SAR waveform diversity that generates sufficient number of orthogonal signals with modest performance trade-off. To this purpose, multiple phased-code waveforms are arbitrarily generated with mutually low cross-correlations. They exhibit a highly flexible characteristic as their code lengths are not limited and Doppler tolerance is well preserved throughout SAR imaging. Various SAR jamming simulations are carried out to demonstrate that the proposed waveform diversity has a good potential for electronic counter-countermeasures applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Hong, Yong Bin, Cheng Fa Xu, Mei Guo Gao, and Li Zhi Zhao. "A High-Performance Signal Processing System for Monopulse Tracking Radar." Advanced Materials Research 383-390 (November 2011): 471–75. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.471.

Full text
Abstract:
A radar signal processing system characterizing high instantaneous dynamic range and low system latency is designed based on a specifically developed signal processing platform. Instantaneous dynamic range loss is a critical problem when digital signal processing is performed on fixed-point FPGAs. In this paper, the problem is well resolved by increasing the wordlength according to signal-to-noise ratio (SNR) gain of the algorithms through the data path. The distinctive software structure featuring parallel pipelined processing and “data flow drive” reduces the system latency to one coherent processing interval (CPI), which significantly improves the maximum tracking angular velocity of the monopulse tracking radar. Additionally, some important electronic counter-countermeasures (ECCM) are incorporated into this signal processing system.
APA, Harvard, Vancouver, ISO, and other styles
8

Waghorn, Neil J. "Watching the watchmen: resisting drones and the "protester panopticon"." Geographica Helvetica 71, no. 2 (2016): 99–108. http://dx.doi.org/10.5194/gh-71-99-2016.

Full text
Abstract:
Abstract. The skies as sites of protest are opening up. Protester-operated drones are beginning to appear in the skies above protests: watching the watchmen, installing an additional layer of surveillance, increasing accountability and self-discipline amongst the police. In this way protester drones could be seen as establishing a "protester panopticon", with the police as subjects. This article explores the potential panoptic effect of the gaze upon the police, drawing on sousveillance theory, before using counter-surveillance as a way to explore potential options for police resistance to the gaze of the protester drone. These resistive efforts are broken down into four categories, legislation and regulation, obscuring the gaze, electronic countermeasures and kinetic and physical force.
APA, Harvard, Vancouver, ISO, and other styles
9

Gong, Yanping, Fengyu Qian, and Lei Wang. "Masked FPGA Bitstream Encryption via Partial Reconfiguration." International Journal of High Speed Electronics and Systems 28, no. 03n04 (2019): 1940022. http://dx.doi.org/10.1142/s0129156419400226.

Full text
Abstract:
Field Programmable Gate Arrays (FPGA), as one of the popular circuit implementation platforms, provide the flexible and powerful way for different applications. IC designs are configured to FPGA through bitstream files. However, the configuration process can be hacked by side channel attacks (SCA) to acquire the critical design information, even under the protection of encryptions. Reports have shown many successful attacks against the FPGA cryptographic systems during the bitstream loading process to acquire the entire design. Current countermeasures, mostly random masking methods, are effective but also introduce large hardware complexity. They are not suitable for resource-constrained scenarios such as Internet of Things (IoT) applications. In this paper, we propose a new secure FPGA masking scheme to counter the SCA. By utilizing the FPGA partial reconfiguration feature, the proposed technique provides a light-weight and flexible solution for the FPGA decryption masking.
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Zhao, Zhu, Lu, and Shi. "Research on In-Vehicle Key Management System under Upcoming Vehicle Network Architecture." Electronics 8, no. 9 (2019): 1026. http://dx.doi.org/10.3390/electronics8091026.

Full text
Abstract:
The intelligentization and connectedness of vehicles make vehicle cybersecurity an important research topic. In-vehicle key management is a critical function in vehicle cybersecurity countermeasures. After describing previous research on vehicle key management and the development trend of vehicle network architecture, a key management scheme for in-vehicle multi-layer electronic control units (ECUs) is proposed. The scheme is based on authenticated key exchange protocol 2 (AKEP2) and on-the-air (OTA) technology. Then, the key storage and trusted key usage based on secure hardware are analyzed and studied. Moreover, the AES Counter with CBC-MAC (AES-CCM) algorithm, which uses fewer keys, is introduced to in-vehicle secure communication. The simulation analysis for the proposed OTA-based key update protocol verifies the protocol’s security. The validity of the hardware-based trusted key usage environment and the feasibility of the AES-CCM algorithm for the CAN FD bus are proven with corresponding experiments.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic counter-countermeasures"

1

Katsoulis, George T. Electronic counter-counter measures potential of a noncoherent FH/MFSK communications system under conditions of worst case hostile electronic counter measures and fading channels. Naval Postgraduate School, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang luo lei da dui kang xi tong dao lun. Guo fang gong ye chu ban she, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Antenna-based signal processing techniques for radar systems. Artech House, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Xixiang. Xin ti zhi lei da dui kang dao lun. Beijing li gong da xue chu ban she, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scott, R. E. Air-to-air radar flight testing. AGARD, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

North Atlantic Treaty Organization. Advisory Group for Aerospace Research and Development. Electronic counter-counter measures for avionics sensors and communication systems. AGARD, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

North Atlantic Treaty Organization. Advisory Group for Aerospace Research and Development. Electronic counter-counter measures for avionics sensors and communication systems. AGARD, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1923-, Johnston Stephen L., ed. Radar electronic counter-countermeasures. R.E. Krieger, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Reverse deception: Organized cyber threat counter-exploitation. McGraw-Hill Education, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

FBI Personnel Security Polygraph Program. U.S. Justice, Federal Bureau of Investigation, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Electronic counter-countermeasures"

1

"Electronic Countermeasures and Counter-Countermeasures." In Bistatic Radar. Institution of Engineering and Technology, 2004. http://dx.doi.org/10.1049/sbra003e_ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Electronic Counter Countermeasures (ECCM)." In Introduction to Airborne Radar. Institution of Engineering and Technology, 1998. http://dx.doi.org/10.1049/sbra101e_ch35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pitoglou, Stavros, Dimitra Giannouli, Vassilia Costarides, Thelma Androutsou, and Athanasios Anastasiou. "Cybercrime and Private Health Data." In Encyclopedia of Criminal Activities and the Deep Web. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9715-5.ch052.

Full text
Abstract:
As the adoption of electronic health records has reached unprecedented levels and continues to rise rapidly, the issue of criminal activity related with unauthorized patient data acquisition, black market distribution, and illegal exploitation/use becomes increasingly important. This article will provide a historical review of recorded data breaches that resulted in extensive patient data leaks as well as subsequent efforts of monetization via black market structures that utilize the anonymity and counter-tracking environment that the dark/deep web and cryptocurrency provide. It will also focus on the methods and tools used by the villains, the types of vulnerabilities that can result in a successful attack, as well as latest developments and future trends in the field of scientific, technical, and legal/regulatory countermeasures that can be employed in order to prevent sensitive health data from falling into the wrong hands.
APA, Harvard, Vancouver, ISO, and other styles
4

Phan, Raphael C. W., and Bok-Min Goi. "Subtle Interactions." In Web Services Security and E-Business. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-168-1.ch014.

Full text
Abstract:
In this chapter, we show how security protocols can be attacked by exploiting the underlying block cipher modes of operation. We first present a comprehensive treatment of the properties and weaknesses of standard modes of operation. We then show why all modes of operation should not be used with public-key ciphers in public-key security protocols. This includes the cipher block chaining (CBC) mode when there is no integrity protection of the initialisation vector (IV). In particular, we show that it is possible in such instances to replace a block at the beginning, middle, or end of a CBC-encrypted message. We further demonstrate that the security of single-block encryptions can be reduced to the security of the electronic codebook (ECB) mode, and show that in the absence of integrity, one could exploit this to aid in known- and chosen- IV attacks. Finally, we present chosen-IV slide attacks on counter (CTR) and output feedback (OFB) modes of operation. Our results show that protocol implementers should carefully select modes of operation, be aware of the pitfalls in each of these modes, and incorporate countermeasures in their protocols to overcome them. It is also important to realize that modes of operation only provide confidentiality, and that when used in the context of security protocols, these modes should be combined with authentication and integrity protection techniques.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic counter-countermeasures"

1

KING, T., and C. CARTER. "Electronic Counter Countermeasures/Advanced Radar Test Bed (ECCM/ARTB)." In 6th AIAA Biennial Flight Test Conference. American Institute of Aeronautics and Astronautics, 1992. http://dx.doi.org/10.2514/6.1992-4098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!