Academic literature on the topic 'Information warfare. Systems engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information warfare. Systems engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information warfare. Systems engineering"
Parlin, Karel, Taneli Riihonen, Vincent Le Nir, Mark Bowyer, Thomas Ranstrom, Erik Axell, Borje Asp, Robert Ulman, Matthias Tschauner, and Marc Adrat. "Full-Duplex Tactical Information and Electronic Warfare Systems." IEEE Communications Magazine 59, no. 8 (August 2021): 73–79. http://dx.doi.org/10.1109/mcom.001.2001139.
Full textOverill, R. E. "Information warfare: battles in cyberspace." Computing & Control Engineering Journal 12, no. 3 (June 1, 2001): 125–28. http://dx.doi.org/10.1049/cce:20010304.
Full textPathak, A. K., Zafar Husain, and R. D. Pathak. "Technology-based information warfare: developing world perspective." International Journal of Computer Applications in Technology 16, no. 1 (2003): 47. http://dx.doi.org/10.1504/ijcat.2003.000310.
Full textMoore, Carl, Seung Baek, Jay Liebowitz, LTC Robert Kilmer, and Robert Minehart. "Intelligent agent‐based information warfare advisor (“Bob‐in‐a‐box”)." Kybernetes 27, no. 1 (February 1998): 38–53. http://dx.doi.org/10.1108/03684929810200521.
Full textDuddu, Vasisht. "A Survey of Adversarial Machine Learning in Cyber Warfare." Defence Science Journal 68, no. 4 (June 26, 2018): 356. http://dx.doi.org/10.14429/dsj.68.12371.
Full textMakarenko, S. I., and A. S. Mamonchikova. "Dynamic plurilateral information conflict model with different participant strategies." Radio industry (Russia) 31, no. 2 (July 7, 2021): 35–48. http://dx.doi.org/10.21778/2413-9599-2021-31-2-35-48.
Full textDong, Jie, Guowei Wu, Tingting Yang, and Yangyang Li. "The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs." Sensors 18, no. 10 (October 12, 2018): 3430. http://dx.doi.org/10.3390/s18103430.
Full textSayer, Kylie. "Denying the Technology: Middle Management Resistance in Business Process Re-Engineering." Journal of Information Technology 13, no. 4 (December 1998): 247–57. http://dx.doi.org/10.1177/026839629801300404.
Full textAng Yang, H. A. Abbass, and R. Sarker. "Characterizing warfare in red teaming." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 36, no. 2 (April 2006): 268–85. http://dx.doi.org/10.1109/tsmcb.2005.855569.
Full textZachary, Wayne W., Monica C. Zubritzky, and Floyd A. Glenn. "The Development of the Air Anti-Submarine Warfare MissionTestbed as a Tool for the Development of Operator Models." Proceedings of the Human Factors Society Annual Meeting 32, no. 16 (October 1988): 1073–77. http://dx.doi.org/10.1177/154193128803201617.
Full textDissertations / Theses on the topic "Information warfare. Systems engineering"
Smith, Chad M. "Optimizing Navy information warfare a systems engineering approach." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FSmith_Chad.pdf.
Full textThesis Advisor(s): Elliot, Raymond A. "September 2008." Description based on title screen as viewed on November 4, 2008. Includes bibliographical references (p. 61-63). Also available in print.
Rios, Cesar G. "Return on investment analysis of information warfare systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FRios.pdf.
Full textMcNabb, Marcus E. "Optimizing the routher configurations within a nominal Air Force base." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMcNabb.pdf.
Full textThesis Advisor(s): Elliott, Ray ; Rasmussen, Craig. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Network Architecture; Graph Theory; Spanning Tree; Network Security Includes bibliographical references (p. 45). Also available in print.
Kucukozyigit, Ali Can. "Electronic Warfare (EW) historical perspectives and its relationship to Information Operations (IO)-considerations for Turkey." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10154.
Full textPetersson, Björn. "Modeling of a Retrodirective Channel With Active Antenna Arrays for Cross-Eye Jamming." Licentiate thesis, KTH, Elektroteknisk teori och konstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217232.
Full textCross-eye (CE) är en störprincip som har potential att inducera vinkelmätfel i radar. Dess möjlighet att störa monopulsradar, en vanligt förekommande typ av radar som är motståndskraftig mot många störformer, har skapat ett intresse för metoden hos tillverkare av system för elektronisk krigföring (EW-system). Användning av CE störning i ett EW-system skulle kunna öka möjligheten till självskydd vid attack från en monopulsradarstyrd robot. Avhandlingen analyserar en modell av en retrodirektiv CE störare som är avsedd för integration i ett multifunktionellt EW-system. Fokus i analysen är på de aktiva gruppantennerna (AESA) som används i systemet. En elektrisk modell av systemet används, vilken inkluderar variationer i parametrar hos AESA samt tre olika systemkorrektionsmetoder. En simuleringsprocedur som ger möjlighet att uppskatta reciprocitetsfel och känslighet för parametervariationer i AESA är definierad. Vidare undersöks inverkan av karaktäriserings och kalibreringsbrus. Modellens användningsområden visas i olika typer av prestandasimulering där effekter av de olika systemkorrektionsmetoderna tydliggörs. Simuleringsresultat för enkelfrekvens (CW) signaler visar en relativt hög nivå av reciprocitet om brus och olinjäriteter ignoreras. Det förväntade resultatet, att elektriska skillnader mellan mottagar- och sändargrenarna orsakar en försämring i reciprocitet, bekräftas. Inverkan av karaktäriserings och kalibreringsbrus verkar vara en dominerande faktor i det totala reciprocitetsfelet då rimliga brusnivåer används. En signifikant höjning av reciprocitetsfelet kan sannolikt förväntas då signaler med en viss bandbredd används och då rimliga nivåer av brus samt olinjäriteter inkluderas.
QC 20171102
Johnson, Allen P., Bryan Breeden, Willard Earl Duff, Paul F. Fishcer, Nathan Hornback, David C. Leiker, Parker Carlisle, et al. "Ship Anti Ballistic Missile Response (SABR)." Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/7268.
Full textBased on public law and Presidential mandate, ballistic missile defense development is a front-burner issue for homeland defense and the defense of U.S. and coalition forces abroad. Spearheaded by the Missile Defense Agency, an integrated ballistic missile defense system was initiated to create a layered defense composed of land-, air-, sea-, and space-based assets. The Ship Anti-Ballistic Response (SABR) Project is a systems engineering approach that suggests a conceptualized system solution to meet the needs of the sea portion of ballistic missile defense in the 2025-2030 timeframe. The system is a unique solution to the sea-based ballistic missile defense issue, combining the use of a railgun interceptor and a conformable aperture skin-of-the-ship radar system.
Wang, Kenny NMN. "Information warfare targeting : people and processes /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FWang.pdf.
Full textThesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.
Tan, Peihao Raymond. "Applying systems thinking towards countering hybrid warfare." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121799.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 121-124).
Carl von Clausewitz, a famous Prussian general and military theorist asserted that war's nature of being violent, interactive, and fundamentally political, does not change - only its character does. According to Clausewitz, the character of war is a dynamic phenomenon that manifests differently with the "spirit" of each age. In our current digital age, technology has heavily influenced interactions, including warfare. In addition to boosting traditional military means, technology has enabled rapid and widespread weaponization of social, information and infrastructural instruments for political coercion. A rising trend of combining national instruments of power to wage war simultaneously across the political, military, economic, social, information and infrastructural domains is a rapidly emerging threat, characteristic of modem "hybrid wars" being fought today. Traditional military-centric defense policies and strategies are ill-prepared to address such threats that deliberately operate in the "grey zone", playing on ambiguity and tailoring coercion to remain just below detection and response thresholds. In this research, a combination of literature review, descriptive study, inductive approach, normative research, case study and systems thinking are applied to analyze the hybrid warfare threat and then construct a suitable response framework, treating it as system with interrelated constituent parts, synergistically working together over time, within the wider international context, to deliver an emergent counter hybrid warfare capability.
by Peihao Raymond Tan.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
Oliveria, Tristan V., James W. Beaver, Pedro R. Mercado, Andrew D. Bucher, Jennifer M. Free, and Richard W. Byers. "Systems analysis of alternative architectures for Riverine Warfare in 2010." Thesis, Monterey, California, 2006. http://hdl.handle.net/10945/2361.
Full textIncludes supplementary material.
This thesis analyzed the Navy's proposed Riverine Force (RF) structure and capabilities of 2006. Systems Engineering and Analysis cohort 10 (SEA10) developed a cost-effective system of systems which increased battlespace awareness and situational responsiveness for 2010. Riverine missions were decomposed into their functional, physical, and operational architectures using the detect-to-engage sequence. This analysis determined critical RF functions. Critical functions detect and engage were then physically represented by feasible force package alternatives that augmented the baseline RF. SEA10 analyzed these alternatives using agent based models to identify baseline RF capability gaps and provide insights into possible solutions. Reduction of modeling data indicated the baseline force was as effective as some upgraded force packages depending on the measure of performance (MOP) or scenario structure under scrutiny. Sensor augmentation demonstrated significant improvements to baseline performance by increasing battlespace awareness. Weapon augmentation alone did not significantly improve baseline performance by increasing situational responsiveness. Combined sensor-weapon augmentation performed well across all MOP and scenarios. The Unmanned Surface Vehicle (USV) was the most cost-effective alternative. Dedicated helicopter support demonstrated the best performance overall, but was the most costly alternative.
Mullis, William S. "Using the acquisition process to reduce the vulnerability of future systems to information warfare." Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/9119.
Full textInformation warfare (IW) is a growing concern for the United States Army. The sophisticated, high-technology modern weapons systems upon which the U.S. Army heavily relies are increasing vulnerable to IW weapons and tactics. The acquisition process plays a major role in reducing defense systems IW vulnerability. This research identifies the primary IW threats to systems during the acquisition lifecycle and what factors in the acquisition environment contribute to IW vulnerability. This research also suggests a technique for integrating IW countermeasures into the defense systems acquisition process. A primary finding of this research is that while a Program Management Office (PMO) can institute a myriad of useful countermeasures, influencing the prime contractor to establish a secure development environment is the most important action it can take in reducing the vulnerability of future systems to IW
Books on the topic "Information warfare. Systems engineering"
Introduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.
Find full textAnand, A. Information technology: The future warfare weapon. New Delhi: Ocean Books, 2000.
Find full textDeakin, Richard S. Battlespace technologies: Network-enabled information dominance. Boston: Artech House, 2010.
Find full textPoisel, Richard. Tong xin dian zi zhan xi tong dao lun: Introduction to communication electronic warfare systems. Beijing: Dian zi gong ye chu ban she, 2003.
Find full textZhan zheng gong cheng lun: Zou xiang xin xi shi dai de zhan zheng fang fa. Beijing Shi: Guo fang da xue chu ban she, 2012.
Find full textHua xue hua gong wen xian jian suo yu li yong. 2nd ed. Dalian: Dalian li gong da xue chu ban she, 1997.
Find full textauthor, Zheng Huali, and Zhao Yuling active 2012, eds. Shi jie lu jun xin xi xi tong zhuang bei jian she fa zhan yan jiu: Study on Global Development of Army Military Information Systems. Beijing Shi: Guo fang gong ye chu ban she, 2012.
Find full textBorodakiĭ, I︠U︡ V. Informat︠s︡ionnye tekhnologii v voennom dele: Osnovy teorii i prakticheskogo primenenii︠a︡. Moskva: Gori︠a︡chai︠a︡ linii︠a︡ - Telekom, 2008.
Find full text1532-1623, Tulasīdāsa, ed. Rama, the lord of decorum. New Delhi: Ocean Books, 2000.
Find full textSølvberg, Arne, and David Chenho Kung. Information Systems Engineering. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1.
Full textBook chapters on the topic "Information warfare. Systems engineering"
Wei, Lin, Yuan Bingcheng, and Wu Pengfei. "The Design of the Control System of Navigation for UUV in Underwater Information Warfare." In Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering, 219–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31698-2_32.
Full textOttis, Rain. "Cyber Warfare." In Intelligent Systems, Control and Automation: Science and Engineering, 89–96. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_6.
Full textSølvberg, Arne, and David Chenho Kung. "Information and Information Systems." In Information Systems Engineering, 365–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1_10.
Full textBeynon-Davies, Paul. "Information Systems Engineering." In Information Systems Development, 53–66. London: Macmillan Education UK, 1998. http://dx.doi.org/10.1007/978-1-349-14931-5_7.
Full textSølvberg, Arne, and David Chenho Kung. "Information System Support for Information System Development." In Information Systems Engineering, 305–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1_8.
Full textMacDonald, I. G. "Automating Information Engineering." In Automating Systems Development, 213–29. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1033-4_18.
Full textSipper, Joshua A. "Information Warfare and Cyber Education: Issues and Recommendations." In Advances in Intelligent Systems and Computing, 235–37. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58703-1_14.
Full textBarjis, Joseph. "A Language Based Combined Requirements Engineering Approach." In Information Systems, 1–16. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35604-4_1.
Full textKraljić, Adnan, and Tarik Kraljić. "Agile Software Engineering Practices in ERP Implementation." In Information Systems, 279–90. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44322-1_21.
Full textSølvberg, Arne, and David Chenho Kung. "Rule Modeling." In Information Systems Engineering, 201–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1_5.
Full textConference papers on the topic "Information warfare. Systems engineering"
Demuth, S., J. Felini, J. Gerloff, Maim J, N. Swingle, P. Harton, and B. Horowitz. "An urban warfare application of systems engineering for the first derivative." In s and Information Engineering Design Symposium. IEEE, 2005. http://dx.doi.org/10.1109/sieds.2005.193283.
Full textDewoody, Robert, Jacob Hayes, Nick Isnardi, Joseph Kalinka, and L. T. C. Edward Teague. "Irregular warfare models for regional stability development." In 2014 Systems and Information Engineering Design Symposium (SIEDS). IEEE, 2014. http://dx.doi.org/10.1109/sieds.2014.6829898.
Full textGuo, Rui, and Bu-Yun Wang. "Measuring Complexity of Modern Sea-Warfare System." In 2010 International Conference of Information Science and Management Engineering. IEEE, 2010. http://dx.doi.org/10.1109/isme.2010.224.
Full textNastiti, Faulinda Ely, Rina Arum Prastyanti, Restiadi Bayu Taruno, and Dedy Hariyadi. "Social Media Warfare in Indonesia Political Campaign: A Survey." In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). IEEE, 2018. http://dx.doi.org/10.1109/icitisee.2018.8720959.
Full textGao, Ying, Lei Lei, Xiuliang Wang, Puzhao Zhang, and Shuxia Guo. "Design and Realization of Virtual Scene System in UAV Electronic Warfare." In 2009 International Conference on Information Engineering and Computer Science. IEEE, 2009. http://dx.doi.org/10.1109/iciecs.2009.5366091.
Full textKarnik, M. V., S. K. Gupta, D. K. Anand, F. J. Valenta, and I. A. Wexler. "Design Navigator System: A Case Study in Improving Product Development Through Improved Information Management." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84901.
Full textRowley, C., and G. Ford. "Digitally Empowering Naval Fleet Support." In 14th International Naval Engineering Conference and Exhibition. IMarEST, 2018. http://dx.doi.org/10.24868/issn.2515-818x.2018.058.
Full textWelling, Douglas M., and Dean B. Edwards. "Multiple Autonomous Underwater Crawler Control for Mine Reacquisition." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81716.
Full textManley, Richard J., Dennis G. Gallagher, William W. Hughes, and Allie M. Pilcher. "Divers Augmented Vision Display (DAVD)." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70026.
Full textXiangyong Chen, Yuanwei Jing, Chunji Li, Nan Jiang, and G. M. Dimirovski. "Effectiveness evaluation of warfare command systems with dissymmetrical warfare information." In 2010 American Control Conference (ACC 2010). IEEE, 2010. http://dx.doi.org/10.1109/acc.2010.5531011.
Full textReports on the topic "Information warfare. Systems engineering"
Wood, Robert J. Information Engineering the Foundation of Information Warfare,. Fort Belvoir, VA: Defense Technical Information Center, April 1995. http://dx.doi.org/10.21236/ada329024.
Full textRenner, Scott. Building Information Systems for Network-Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, June 2003. http://dx.doi.org/10.21236/ada466409.
Full textGatley, Eric, Ian Grado, Edwin Salipande, and Daniel Remiker. Scenario-Based Systems Engineering Application to Mine Warfare. Fort Belvoir, VA: Defense Technical Information Center, December 2015. http://dx.doi.org/10.21236/ad1009269.
Full textGneiting, B. C. ,. Westinghouse Hanford. TWRS systems engineering process and information model report. Office of Scientific and Technical Information (OSTI), May 1996. http://dx.doi.org/10.2172/664387.
Full textRoussopoulos, Nick, Timos Sellis, Leo Mark, and Christos Faloutsos. Design Issues For High Performance Engineering Information Systems. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada264839.
Full textHeminger, Alan R. Collaborative Early Systems Engineering: Strategic Information Management Review. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada544695.
Full textVan Slyke, D. A. System Engineering Analysis For Improved Scout Business Information Systems. Office of Scientific and Technical Information (OSTI), January 2017. http://dx.doi.org/10.2172/1343825.
Full textFlach, John, and Golbert G. Kuperman. Victory by Design: War, Information, and Cognitive Systems Engineering. Fort Belvoir, VA: Defense Technical Information Center, February 1998. http://dx.doi.org/10.21236/ada358305.
Full textCORPS OF ENGINEERS WASHINGTON DC. Engineering and Design: Information Systems Design in Support of Military Construction. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada404012.
Full textDEPARTMENT OF DEFENSE WASHINGTON DC. Department of Defense Handbook: Human Engineering Guidelines for Management Information Systems. Fort Belvoir, VA: Defense Technical Information Center, September 1989. http://dx.doi.org/10.21236/ada240617.
Full text