To see the other types of publications on this topic, follow the link: Information warfare. Systems engineering.

Journal articles on the topic 'Information warfare. Systems engineering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information warfare. Systems engineering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Parlin, Karel, Taneli Riihonen, Vincent Le Nir, Mark Bowyer, Thomas Ranstrom, Erik Axell, Borje Asp, Robert Ulman, Matthias Tschauner, and Marc Adrat. "Full-Duplex Tactical Information and Electronic Warfare Systems." IEEE Communications Magazine 59, no. 8 (August 2021): 73–79. http://dx.doi.org/10.1109/mcom.001.2001139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Overill, R. E. "Information warfare: battles in cyberspace." Computing & Control Engineering Journal 12, no. 3 (June 1, 2001): 125–28. http://dx.doi.org/10.1049/cce:20010304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pathak, A. K., Zafar Husain, and R. D. Pathak. "Technology-based information warfare: developing world perspective." International Journal of Computer Applications in Technology 16, no. 1 (2003): 47. http://dx.doi.org/10.1504/ijcat.2003.000310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moore, Carl, Seung Baek, Jay Liebowitz, LTC Robert Kilmer, and Robert Minehart. "Intelligent agent‐based information warfare advisor (“Bob‐in‐a‐box”)." Kybernetes 27, no. 1 (February 1998): 38–53. http://dx.doi.org/10.1108/03684929810200521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duddu, Vasisht. "A Survey of Adversarial Machine Learning in Cyber Warfare." Defence Science Journal 68, no. 4 (June 26, 2018): 356. http://dx.doi.org/10.14429/dsj.68.12371.

Full text
Abstract:
<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p>The changing nature of warfare has seen a paradigm shift from the conventional to asymmetric, contactless warfare such as information and cyber warfare. Excessive dependence on information and communication technologies, cloud infrastructures, big data analytics, data-mining and automation in decision making poses grave threats to business and economy in adversarial environments. Adversarial machine learning is a fast growing area of research which studies the design of Machine Learning algorithms that are robust in adversarial environments. This paper presents a comprehensive survey of this emerging area and the various techniques of adversary modelling. We explore the threat models for Machine Learning systems and describe the various techniques to attack and defend them. We present privacy issues in these models and describe a cyber-warfare test-bed to test the effectiveness of the various attack-defence strategies and conclude with some open problems in this area of research.</p><p> </p></div></div></div>
APA, Harvard, Vancouver, ISO, and other styles
6

Makarenko, S. I., and A. S. Mamonchikova. "Dynamic plurilateral information conflict model with different participant strategies." Radio industry (Russia) 31, no. 2 (July 7, 2021): 35–48. http://dx.doi.org/10.21778/2413-9599-2021-31-2-35-48.

Full text
Abstract:
Problem setting. The development of the information theory conflicts is connected with the need to form new models that take into account new factors and features of real actions of conflicting parties in the information area. Currently, a fairly developed scientific and methodological apparatus for study of information conflict are models in the formalism of the Markov theory processes and game theory. At the same time, models based on dynamic systems are not sufficiently developed, and dynamic models of multilateral conflicts are not available in well-known publications.Target. The purpose of the work is to form a dynamic plurilateral information conflict model with different participant strategies.Results. The research results in a dynamic plurilateral information conflict model with different participant strategies. The elements of the model scientific novelty are: the conflict formalization in the form of differential equations system, which are based on the original modification of the Lotki-Voltera model equations; nine strategies for action by parties to a multilateral conflict with varying degrees of conflict; each strategy formalization in the form of coefficients or complex functions with the modeling possibility of their application and change in duel conflicts between each pair of sides.Practical significance. The model presented using in the article allows: to study the dynamic of changes in the conflict parties resources; identify local wins and losses in transition mode; to make conclusions about global wins and losses of the parties over the conflict duration; to make recommendations about party-specific strategies choice and parameters of their strategies usefulness for achieving global wins. These studies may be useful to those skilled special purpose information systems field, electronic warfare or information warfare.
APA, Harvard, Vancouver, ISO, and other styles
7

Dong, Jie, Guowei Wu, Tingting Yang, and Yangyang Li. "The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs." Sensors 18, no. 10 (October 12, 2018): 3430. http://dx.doi.org/10.3390/s18103430.

Full text
Abstract:
With the deepening of modern military reforms, information has become the key to winning modern warfare. The use of unmanned aerial vehicle (UAV) to capture image information has become an important means of reconnaissance in modern warfare and plays an irreplaceable role. The image information usually uses a wireless image transmission system, since image information is intercepted or stolen easily during the information transmission, encrypting an image is a common method for ensuring image security. However, traditional encryption algorithms have some deficiencies in terms of efficiency and security. In order to overcome these shortcomings, a new algorithm is proposed in this paper-an improved image scrambling encryption algorithm based on Fibonacci-p coding. The first new idea of the algorithm is to separate the positive and negative signs and data of the scrambled DCT coefficients, then form the symbol matrix and the data matrix respectively, perform the scrambling encryption operation on the symbol matrix. The second new idea is to encrypt the color RGB image by converting the R, G, and B colors into Y, Cb, and Cr, and converting the normal image operation into operations on Y, Cb, and Cr, thereby implementing the encryption operation. The comprehensive performance of the algorithm is optimal with different image information. Experiments results validate the favorable performance of the proposed improved encryption algorithm.
APA, Harvard, Vancouver, ISO, and other styles
8

Sayer, Kylie. "Denying the Technology: Middle Management Resistance in Business Process Re-Engineering." Journal of Information Technology 13, no. 4 (December 1998): 247–57. http://dx.doi.org/10.1177/026839629801300404.

Full text
Abstract:
Business Process Re-engineering (BPR) as a methodology for organizational transformation has been around since the early 1990s. There are however, some serious issues of concern surrounding the success of BPR as a methodology for organizational change. This paper attempts to highlight the issues surrounding the BPR approach to change management that remain implicit within the re-engineering literature. The research presented in this paper specifically investigates BPR in practice and concentrates on the issues of power and control that underlie many of the re-engineering methodologies and how these conflict with the prerequisites of the flattened, empowered workforce that BPR envisions. The research presented here was conducted using the interpretive approach of ethnography to investigate how middle management were able to deny the technology of BPR and disable a change project. In order to maintain their hold on power in the organization they needed to revolt against the technology of re-engineering imposed on them by senior management. In using the clinical metaphor, middle management were able to create a reality around technology that portrayed it almost as a function of biological warfare, denying it being seen as a positive social tool. This paper highlights how they were able to manipulate the technology and turn its power around to reinforce their position and power in the process.
APA, Harvard, Vancouver, ISO, and other styles
9

Ang Yang, H. A. Abbass, and R. Sarker. "Characterizing warfare in red teaming." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 36, no. 2 (April 2006): 268–85. http://dx.doi.org/10.1109/tsmcb.2005.855569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zachary, Wayne W., Monica C. Zubritzky, and Floyd A. Glenn. "The Development of the Air Anti-Submarine Warfare MissionTestbed as a Tool for the Development of Operator Models." Proceedings of the Human Factors Society Annual Meeting 32, no. 16 (October 1988): 1073–77. http://dx.doi.org/10.1177/154193128803201617.

Full text
Abstract:
The central concern of human factors engineering (HFE) is facilitating a productive relationship between man and machine. A new generation of man-machine systems has arisen in which the machine acts in a relatively intelligent manner to enhance the operator's decision-making capabilities in real-time multi-tasking situations. These systems have been termed “distributed intelligence systems” (DIS) because intelligence is distributed among all system entities, whether they are human or computer. The ability of these systems to aid humans in a flexible, interactive fashion depends on the capability of the machine to predict the human's information needs in a given decision-making situation. Thus, the DIS must incorporate a model that reflects the operator's information processing requirements for the tasks necessary to operate the system. To construct this model, it is necessary to develop a DIS testbed where experimental investigations can occur. The mission environment chosen for simulation is the Naval Air Anti-Submarine Warfare (ASW) mission, whose objectives to search for, find, and attack the enemy submarine involve complex tactical decisions in a real-time multi-tasking environment. In the Air ASW mission, most significant tactical decisions are made by the Tactical Coordinator (TACCO), the main operator of the system. The aspects of the testbed discussed in this paper include those elements of the simulation and responsibilities of the TACCO needed to illustrate the types of information processing tasks involved in the ASW mission. Also, the data collection capabilities of the testbed and how this data will be applied to operator model development will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
11

Ustinova, L. A., V. A. Barkevych, N. V. Kurdil, R. M. Shvets, V. I. Saglo, and O. A. Yevtodiev. "Current state and trends in the development of the identification tools for chemical warfare agents in Ukraine: ways of harmonization in accordance with EU and NATO standards. Part IІ." Ukrainian Journal of Modern Toxicological Aspects 87, no. 3 (December 9, 2019): 30–42. http://dx.doi.org/10.33273/2663-4570-87-3-30-42.

Full text
Abstract:
ABSTRACT. Modern chemical-warfare (CW) reconnaissance tasks require a fundamentally new approach to the development of methods and technologies to create a database of technical means that provide the necessary sensitivity, responsiveness and specificity. This phase of the study involves chemical control equipment that is in operational service with EU and NATO armies. Objective: analysis of current international technological standards in the field of control of chemical warfare agents, which are in operational service with EU and NATO armies. Materials and Мethods. Domestic and foreign sources of scientific information, covering current issues of CBRN security in terms of chemical substances control equipment in EU and NATO countries and review of the prospects of their introduction into the arsenal of the Armed Forces of Ukraine. The following methods of scientific research were applied: analytical, historical, bibliographic, systematic and informational approach, expert assessments. Results and Discussion. The analysis of foreign chemical control equipment showed that the most priority are portable gas alarms, robotic and air complexes of CW reconnaissance with the possibility of remote detection of the contaminated area, their integration into automated control systems, which provide prompt collection, processing and transfer of information on changing the chemical environment. As for modern chemical control tools in EU and NATO countries in the field of detection and identification of chemical warfare agents and hazardous chemicals, chemical, physical and chemical, biochemical and spectrometric methods are the most applied due to the speed and high reliability of the results. Currently, there is a need to equip the units of the tactical branch of the Armed Forces of Ukraine and the Preventive Medicine Service of the Ministry of Defense of Ukraine with a multi-purpose warning system of radiation and chemical threats. The compatibility of the warning and troop commanding system will reduce the loss of military personnel and machines during possible combat operations using weapons of mass destruction, as the systems will increase the speed of decision making on the use of individual and collective protective equipment. Conclusion. Harmonization of the standards of the Armed Forces of Ukraine with NATO standards in the field of chemical control is a complex task that requires changes in the system of standards of medical care, which include regulatory, engineering, tactical, medical, educational, and other processes. National scientific and technical potential may be the basis for the creation of new and improved technologies for the production of CW reconnaissance devices and means to indicate chemical warfare agents (CWA) for the needs of the Armed Forces of Ukraine. Keywords: military toxicology, chemical weapon, identification of chemical warfare agents.
APA, Harvard, Vancouver, ISO, and other styles
12

Fang, Zhemei, Xiaozhou Zhou, and Ani Song. "Architectural Models Enabled Dynamic Optimization for System-of-Systems Evolution." Complexity 2020 (February 21, 2020): 1–14. http://dx.doi.org/10.1155/2020/7534819.

Full text
Abstract:
System of Systems (SoS) is designed to deliver value to participant stakeholders in a dynamic and uncertain environment where new systems are added and current systems are removed continuously and on their own volition. This requires effective evolution management at the SoS architectural level with adequate support of process, methods, and tools. This paper follows the principle of Model-Based Systems Engineering (MBSE) and develops a holistic framework integrating MBSE conceptual representations and approximate dynamic programming (ADP) to support the SoS evolution. The conceptual models provide a common architectural representation to improve communication between various decision makers while the dynamic optimization method suggests evolution planning decisions from the analytical perspective. The Department of Defense Architecture Framework (DoDAF) models using Systems Modeling Language (SysML) are used as MBSE artifacts to connect with ADP modeling elements through DoDAF metamodels to increase information traceability and reduce unnecessary information loss. Using a surface warfare SoS as an example, this paper demonstrates and explains the procedures of developing DoDAF models, mapping DoDAF models to ADP elements, formulating ADP formulation, and generating evolutionary decisions. The effectiveness of using ADP in supporting evolution to achieve a near-optimal solution that can maximize the SoS capability over time is illustrated by comparing ADP solution to other alternative solutions. The entire framework also sheds light on bridging the DoDAF-based conceptual models and other mathematical optimization methods.
APA, Harvard, Vancouver, ISO, and other styles
13

Lippert, Kari J., and Robert Cloutier. "Cyberspace: A Digital Ecosystem." Systems 9, no. 3 (June 26, 2021): 48. http://dx.doi.org/10.3390/systems9030048.

Full text
Abstract:
Cyberspace is a new frontier, not just for hackers, but for engineers. It is a digital ecosystem, the next generation of Internet and network applications, promising a whole new world of distributed and open systems that can interact, self-organize, evolve, and adapt. These ecosystems transcend traditional collaborative environments, such as client-server, peer-to-peer, or hybrid models (e.g., web services), to become a self-organized, evolving, interactive environment. Understanding cyberspace as a system is critical if we are to properly design systems to exist within it. Considering it to be a digital ecosystem, where systems can adapt and evolve, will enable systems engineering to become more effective in the future of networks and the Internet. While most systems engineers have only anecdotal experience with large segments of this ecosystem, in today’s world all of them must come to understand it. Engineering any system, or portion of a system, begins with an understanding of the system. This paper presents two interrelated yet distinct foundational models of the ecosystem of cyberspace: a Systemigram to narrate the cyclical nature of cyber warfare, and a modified predator–prey model, as a mathematical model. Systems engineers can utilize these models to design digital “species” that function and adapt within this ecosystem.
APA, Harvard, Vancouver, ISO, and other styles
14

Dixon, Thom. "The grey zone of cyber-biological security." International Affairs 97, no. 3 (May 2021): 685–702. http://dx.doi.org/10.1093/ia/iiab041.

Full text
Abstract:
Abstract The convergence of the life sciences with the information and computing sciences is beginning to generate novel security vulnerabilities. As scientific and technological advances occur, new security vulnerabilities are discovered and new methods for exploiting those vulnerabilities are developed. Novel cyber-biological capabilities are likely to enable technologically sophisticated states to develop new methods of grey zone warfare. This article provides context to this multidisciplinary area of research by reviewing the emerging field of cyberbiosecurity for its relevance to developments in grey zone warfare. This article then analyses two long-term trends that have influenced the development of contemporary cyber-biological capabilities. These two trends are advances in novel uses of biology and advances in computing, automation and biodesign. The capability to exploit vulnerabilities unique to the links between cyber and biological systems differs significantly from previous security concerns noted for biotechnology and the life sciences. Scholars and practitioners of international relations will need to develop an understanding of engineering biology and the bioeconomy in order to forecast methods of grey zone manoeuvre that rely on cyber-biological capabilities. This article offers an entry point for the scholar and practitioner so that they may bring their own disciplinary lens to the issue of grey zone ambiguity and cyberbiosecurity.
APA, Harvard, Vancouver, ISO, and other styles
15

Ilachinski, Andrew. "Exploring self‐organized emergence in an agent‐based synthetic warfare lab." Kybernetes 32, no. 1/2 (February 2003): 38–76. http://dx.doi.org/10.1108/03684920310452337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Shaji, Ramaswamy Swarnammal, V. Sachin Dev, and Thomas Brindha. "A methodological review on attack and defense strategies in cyber warfare." Wireless Networks 25, no. 6 (April 5, 2018): 3323–34. http://dx.doi.org/10.1007/s11276-018-1724-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dzhus, V., B. Haibadulov, D. Kaluhin, R. Tytarenko, and S. Kukobko. "INFLUENCE OF ERRORS OF TOPOGRAPHIC SURVEY AND ORIENTATION OF RADIO- TECHNICAL MEANS OF AIRSPACE CONTROL ON ESTIMATES OF COORDINATE INFORMATION ISSUED BY THEM." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки, no. 8 (June 29, 2021): 31–43. http://dx.doi.org/10.37701/dndivsovt.8.2021.04.

Full text
Abstract:
The last decade is characterized by a number of military conflicts, in most episodes of which the achievement of the goal (reconnaissance and (or) defeat of certain targets) by the warring parties is mostly achieved through the use of aircraft, including small and (or) unmanned. The main difference is to obtain the desired results without a direct collision with the enemy ground component of troops (forces). Most of the recommended measures to combat aircraft in modern conditions can be reduced to: the rational construction of battle order (using the air defense separation), the widespread use of covert communications, radio reconnaissance and electronic warfare, the creation of erroneous and camouflage combat (reserve) positions of air defense means , automation of transmission and processing of information about the air situation with the use of modern technologies and increase the accuracy of coordinate information provided to combat (or fire) means. Improving the accuracy of coordinate information causes: the possibility of searchless detection and (or) capture of air targets by fire, increasing the survivability of air defense systems by reducing working hours (including time for "radiation") and rapid change of their positions after the task. Modern algorithms for processing coordinate information provided by air defense systems take into account the errors of measurement of primary coordinates by radio engineering, the delay time of information in communication channels and its possible distortion. At the same time, they do not explicitly take into account the influence of topographic errors and orientation errors of radio equipment. In the work, with the use of methods of mathematical statistics and mathematical modeling, the analysis of influence of topographic errors and orientation of radio-technical means of airspace control on estimations of the coordinate information issued by them is carried out. The obtained ratios allow to make an appropriate assessment and provide recommendations for further research. In the work with the use of methods of mathematical statistics and mathematical modeling, the analysis of the influence of topographic errors and orientation of radio engineering means of airspace control on the estimates of coordinate information issued by them is carried out. The obtained ratios allow to make an appropriate assessment and provide recommendations for further research. The obtained results can be used in tests of radio-technical means of information support, in information processing algorithms and automated control systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Xu, Chengtao, Kai Zhang, Yushan Jiang, Shuteng Niu, Thomas Yang, and Houbing Song. "Communication Aware UAV Swarm Surveillance Based on Hierarchical Architecture." Drones 5, no. 2 (April 30, 2021): 33. http://dx.doi.org/10.3390/drones5020033.

Full text
Abstract:
Multi-agent unmanned aerial vehicle (UAV) teaming becomes an essential part in science mission, modern warfare surveillance, and disaster rescuing. This paper proposes a decentralized UAV swarm persistent monitoring strategy in realizing continuous sensing coverage and network service. A two-layer (high altitude and low altitude) UAV teaming hierarchical structure is adopted in realizing the accurate object tracking in the area of interest (AOI). By introducing the UAV communication channel model in its path planning, both centralized and decentralized control schemes would be evaluated in the waypoint tracking simulation. The UAV swarm network service and object tracking are measured by metrics of communication link quality and waypoints tracking accuracy. UAV swarm network connectivity are evaluated over different aspects, such as stability and volatility. The comparison of proposed algorithms is presented with simulations. The result shows that the decentralized scheme outperforms the centralized scheme in the mission of persistent surveillance, especially on maintaining the stability of inner UAV swarm network while tracking moving objects.
APA, Harvard, Vancouver, ISO, and other styles
19

Pywell, Mike. "Information Warfare and Electronic Warfare Systems R. A. Poisel Artech House, 16 Sussex Street, London, SW1V 4RW, UK. 2013. 414pp. £89. (20% discount available to RAeS members via www. artechhouse.com using RAES2014 promotion code). ISBN 978-1-608-07705-2." Aeronautical Journal 118, no. 1209 (November 2014): 1377–79. http://dx.doi.org/10.1017/s0001924000010046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ravishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure." Defence Science Journal 68, no. 1 (December 18, 2017): 54. http://dx.doi.org/10.14429/dsj.68.11402.

Full text
Abstract:
<p class="p1">National critical infrastructures are vital to the functioning of modern societies and economies. The dependence on these infrastructures is so succinct that their incapacitation or destruction has a debilitating and cascading effect on national security. Critical infrastructure sectors ranging from financial services to power and transportation to communications and health care, all depend on massive information communication technology networks. Cyberspace is composed of numerous interconnected computers, servers and databases that hold critical data and allow critical infrastructures to function. Securing critical data in a cyberspace that holds against growing and evolving cyber threats is an important focus area for most countries across the world. A novel approach is proposed to assess the vulnerabilities of own networks against adversarial attackers, where the adversary’s perception of strengths and vulnerabilities are modelled using game theoretic techniques. The proposed game theoretic framework models the uncertainties of information with the players (attackers and defenders) in terms of their information sets and their behaviour is modelled and assessed using a probability and belief function framework. The attack-defence scenarios are exercised on a virtual cyber warfare test-bed to assess and evaluate vulnerability of cyber systems. Optimal strategies for attack and defence are computed for the players which are validated using simulation experiments on the cyber war-games testbed, the results of which are used for security analyses.</p>
APA, Harvard, Vancouver, ISO, and other styles
21

Man, Peng, Chibiao Ding, Wenjuan Ren, and Guangluan Xu. "A Nonlinear Fingerprint-Level Radar Simulation Modeling Method for Specific Emitter Identification." Electronics 10, no. 9 (April 26, 2021): 1030. http://dx.doi.org/10.3390/electronics10091030.

Full text
Abstract:
With the development of information technology for modern military confrontations, radar emitter fingerprint identification has become a hot and difficult topic in the field of electronic warfare, especially in the field of electronic reconnaissance. Owing to the confidentiality of military systems, most of the existing studies use simulation data for radar emitter fingerprint identification experiments and analysis. However, most of the existing modeling methods focus on the mechanism analysis of the nonlinear fingerprint characteristics of a single independent component. Its main disadvantage is that it can only represent the nonlinear fingerprint characteristics of some components in the radar emitter system but cannot fully reflect the nonlinear fingerprint characteristics of the whole radar emitter system. In this paper, a nonlinear fingerprint-level radar simulation modeling method is proposed. In contrast to the previous single component modeling method, the systematic nonlinear characteristic modeling method of this model can provide individual radar signal data under different modulation modes and working parameters, and provide experimental conditions for data support and theoretical analysis of radar emitter fingerprint identification.
APA, Harvard, Vancouver, ISO, and other styles
22

Nalapko, Oleksii, Andrii Shyshatskyi, Viktor Ostapchuk, Qasim Abbood Mahdi, Ruslan Zhyvotovskyi, Serhii Petruk, Yevgen Lebed, Serhii Diachenko, Vira Velychko, and Illia Poliak. "Development of a method of adaptive control of military radio network parameters." Eastern-European Journal of Enterprise Technologies 1, no. 9 (109) (February 27, 2021): 18–32. http://dx.doi.org/10.15587/1729-4061.2021.225331.

Full text
Abstract:
A method of adaptive control of military radio network parameters has been developed. This method allows predicting suppressed frequencies by electronic warfare devices, determining the topology of the military radio network. Also, this method allows determining rational routes of information transmission and operating mode of radio communications. Forecasting of the electronic environment is characterized by recirculation of input data for one count, resampling on a logarithmic time scale, finding a forecast for the maximum value of entropy and resampling the forecast on the exponential time scale. The developed method allows choosing a rational network topology. The choice of topology of the military radio communication system is based on the method of ant multi-colony system. The main idea of the new option of ant colony optimization is that instead of one colony of the traditional ant algorithm several colonies are used that work together in a common search space. However, this procedure additionally takes into account the type of a priori uncertainty and the evaporation coefficient of the pheromone level. The proposed method allows choosing a rational route for information transmission. The proposed procedure is based on an improved DSR algorithm. This method uses several operating modes of radio communications, namely the technology of multi-antenna systems with noise-like signals, with pseudo-random adjustment of the operating frequency and with orthogonal frequency multiplexing. The developed method provides a gain of 10‒16 % compared to conventional management approaches
APA, Harvard, Vancouver, ISO, and other styles
23

Milczarek, Hubert, Czesław Leśnik, Igor Djurović, and Adam Kawalec. "Estimating the Instantaneous Frequency of Linear and Nonlinear Frequency Modulated Radar Signals—A Comparative Study." Sensors 21, no. 8 (April 17, 2021): 2840. http://dx.doi.org/10.3390/s21082840.

Full text
Abstract:
Automatic modulation recognition plays a vital role in electronic warfare. Modern electronic intelligence and electronic support measures systems are able to automatically distinguish the modulation type of an intercepted radar signal by means of real-time intra-pulse analysis. This extra information can facilitate deinterleaving process as well as be utilized in early warning systems or give better insight into the performance of hostile radars. Existing modulation recognition algorithms usually extract signal features from one of the rudimentary waveform characteristics, namely instantaneous frequency (IF). Currently, there are a small number of studies concerning IF estimation methods, specifically for radar signals, whereas estimator accuracy may adversely affect the performance of the whole classification process. In this paper, five popular methods of evaluating the IF–law of frequency modulated radar signals are compared. The considered algorithms incorporate the two most prevalent estimation techniques, i.e., phase finite differences and time-frequency representations. The novel approach based on the generalized quasi-maximum likelihood (QML) method is also proposed. The results of simulation experiments show that the proposed QML estimator is significantly more accurate than the other considered techniques. Furthermore, for the first time in the publicly available literature, multipath influence on IF estimates has been investigated.
APA, Harvard, Vancouver, ISO, and other styles
24

Kose, Erkan, and Jeffrey Yi-Lin Forrest. "N-person grey game." Kybernetes 44, no. 2 (February 2, 2015): 271–82. http://dx.doi.org/10.1108/k-04-2014-0073.

Full text
Abstract:
Purpose – One important assumption in the conventional cooperative game theory is that payoffs are assumed to be deterministic. In terms of the players’ cognitive ability of the realistic world, this is a very strict assumption. The classical game theory can find no way out when a particular game circumstance involves uncertainty, such as limited knowledge, small sample, and inadequate information, the payoff values of the game can only be described with interval grey numbers. The paper aims to discuss these issues. Design/methodology/approach – In this study the concept of N-person grey games is proposed in which payoffs are represented with interval grey numbers opposed to the classical game theory. A straight forward solution methodology is submitted compatible to grey numbers. Then, a currency war between anonymous countries is handled and modeled as an N-Person grey game. A generic currency war scenario is developed to follow the proposed solution procedure thoroughly. Findings – Based on the outcomes of this work, the authors can say that N-person grey game is an expansion of the classical N-person game under uncertain grey information and can be applied in more complex and uncertain environments, such as those seen in complicated currency warfare. Originality/value – This study combines the grey system theory with the classic N-person game theory and sets up the N-person grey game with grey payoff functions. Based on the grey number operating methods, the grey linear programming algorithm is established to calculate and distribute benefits to the players. In this respect this study has the feature of being the pioneer in the N-person grey game area.
APA, Harvard, Vancouver, ISO, and other styles
25

Lu, Jianhua, Yanli Tang, Tao Wan, and Bin Tang. "A Novel Method of EW System Effectiveness Evaluation Based on Conflict Status Association Analysis." Electronics 10, no. 3 (January 26, 2021): 286. http://dx.doi.org/10.3390/electronics10030286.

Full text
Abstract:
Electronic Warfare (EW) effectiveness evaluation plays an important role in promoting the development of EW technology, promoting the construction of EW equipment systems, and improving the operational capability of the system. Due to the incomplete information caused by the non-cooperative nature of EW, the data of the evaluation index, which are used for effectiveness evaluation, are in Grey scale. In order to approach these problems, we develop a novel method for EW effectiveness evaluation based on Conflict Status Grey Correlation analysis. Specifically, based on conflict theory and correlation theory, an analysis model for the approximation degree of the observation status and expected status of EW is established. Then we introduce the status Grey relational analysis method. The effectiveness value is acquired through the function correlation of the approximation values of both sides, and then we propose an evaluation discrimination method based on status robustness and correlation discrimination. At the same time, we evaluate the effect of errors in the observed values on the evaluation results. The simulation example results show that the proposed model is rational and feasible. This method can effectively overcome the problem of single-angle evaluation of the system and solves the issue of high dependence of traditional EW effectiveness evaluation theory on target data.
APA, Harvard, Vancouver, ISO, and other styles
26

Julian, Alfred. "Information Warfare and Information Systems Security." EDPACS 24, no. 3 (September 1996): 8–12. http://dx.doi.org/10.1080/07366989609452269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kim, Sieun, Taek-Young Youn, Daeseon Choi, and Ki-Woong Park. "UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization." Wireless Communications and Mobile Computing 2019 (May 16, 2019): 1–11. http://dx.doi.org/10.1155/2019/8913910.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) play an increasingly core role in modern warfare, with powerful but tiny embedded computing systems actively applied in the military field. Confidential data, such as military secrets, may be stored inside military devices such as UAVs, and the capture or loss of such data could cause significant damage to national security. Therefore, the development of securely verifiable remote erasure techniques for military devices is considered a core technology. In this study, we devised a verifiable remote erasure scheme with a countdown-concept using randomized data synchronization to satisfy securely verifiable remote erasure technology. The scheme allows the GCS (Ground Control Station) to remotely erase data stored in the UAV, even on loss of communication, and returns proof of erasure to GCS after erasure. Our approach classifies the accumulated data stored in the UAV as a new data type and applies the characteristics of that data type to generate the proof of erasure. We select a small-volume data sample (rather than all of the data) and perform prior learning only on that sample; in this way, we can obtain the probative power of the evidence of erasure with a relatively small amount of traffic. When we want to erase data of 100 Mbytes of remote device, 100 Mbytes of data transfer is required for related work, whereas our system has data transfer according to the ratio of amount of randomly selected data. By doing this, communication stability can be acquired even in unstable communication situations where the maximum traffic can change or not be predicted. Furthermore, when the UAV sends the proof of erasure to the GCS, the UAV does its best to perform the erasure operation given its situation.
APA, Harvard, Vancouver, ISO, and other styles
28

Jagadish, H. V. "Information warfare and security." ACM SIGMOD Record 30, no. 4 (December 2001): 69–70. http://dx.doi.org/10.1145/604264.604276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, C. "Taranis and beyond: inspiring aerodynamic capability." Aeronautical Journal 118, no. 1206 (August 2014): 845–59. http://dx.doi.org/10.1017/s0001924000009593.

Full text
Abstract:
Abstract In his 1916 book, Aircraft in Warfare, the Dawn of the Fourth Arm, F.W. Lanchester wrote: “The supremacy of British aircraft can only be maintained by the adoption of a thoroughly progressive constructional policy, guided constantly by the most recent scientific discovery and research, and by utilising to the full information and experience gained in the Services.” The recent successful flight trials of the Taranis low-observable unmanned demonstrator aircraft provide the latest evidence of the UK’s continued capacity for the entire design, development, manufacture, and flight testing of world-leading combat aircraft, particularly with regard to Aerodynamics. Taranis is both the culmination of many years’ research and development in the UK and a starting-point for the next generation of UK combat air systems. In this lecture, Taranis is reviewed, in such detail as current sensitivities will allow, in the wider context of UK combat aircraft aerodynamic capability, exemplified by the leading roles taken by the UK in the Tornado and Typhoon programmes and the important contribution made to the development of the F-35 Lightning II Joint Strike Fighter. The immediate technical challenges associated with the aerodynamic design and qualification of a low-observable air vehicle are considerable. In this instance they have been compounded by the balanced view taken within the project of trade-offs against many parameters. However, the UK aerodynamics community faces equally stringent challenges in terms of the identification and delivery of the most appropriate future systems; increasingly complex and demanding operational and functional requirements; and, perhaps most of all, maintaining an affordable and cost-effective capability in the face of strict budgetary pressures and austere economic conditions. Nevertheless, those challenges are accompanied by a wide range of opportunities, namely for national and international partnership; radically innovative engineering solutions and approaches; new thinking; and the engagement of the best minds and ideas in the UK academic community. Taranis represented a big integration task, requiring a particular set of skills to pull together the total package, resting on a bedrock of mastery of the technical issues. It has been an inspirational experience for those of us who have worked on it. It has demonstrated that the UK is capable of achieving the most demanding current and anticipated military aerodynamic requirements and has signposted the way to an exciting and nationally important future.
APA, Harvard, Vancouver, ISO, and other styles
30

Kovacich, Gerald L. "Information warfare and the information systems security professional." Computers & Security 16, no. 1 (January 1997): 14–24. http://dx.doi.org/10.1016/s0167-4048(97)85783-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kovacich, Gerry. "Information Warfare and the Information Systems Security Professional." Information Systems Security 6, no. 2 (January 1997): 45–55. http://dx.doi.org/10.1080/10658989709342535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Davies, Philip H. J. "Intelligence, information technology, and information warfare." Annual Review of Information Science and Technology 36, no. 1 (February 1, 2005): 312–52. http://dx.doi.org/10.1002/aris.1440360108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mykhalchenko, Serhii, and Valerii Tovbych. "PROSPECTS OF MODERN FORTIFICATION." Current problems of architecture and urban planning, no. 60 (April 26, 2021): 268–76. http://dx.doi.org/10.32347/2077-3455.2021.60.268-276.

Full text
Abstract:
The relevance of modern means of fortification and creation of new principles of spatial and urban planning solutions for special structures of defense, law enforcement and penitentiary systems, and border protection are investigated. It was researched that the presence of artificial intelligence, modern means of computer equipment and communications enables withdrawing human resources from the area of direct military clashes, and thus, the fortification will not have to protect a person on the battlefield anymore. Scientific and technological progress offers the latest firing systems with automatic target recognition and destruction. Thus, field fortification would enter the fundamentally new features that are not related to a person's protection from the means of destruction. Techniques for camouflage practicing, ensuring suddenness and the effectiveness of the use of defensive structures and devices would also become fundamentally new. The techniques for disguising, ensuring suddenness and the effectiveness of the use of defensive structures and devices will also become fundamentally new. As it was mentioned in the article, nowadays, terrible future that was described by numerous futurists and anti-utopians is here already. The global information networks, hybrid warfare, encroachments not on the burnt desert but on the thinking of the population of countries being subjected to aggression. It is precisely clear that the peace agreements reached as a result of the Second World War have been grossly trampled over by the imperial claims of the Russian Federation. Thus, there is an urgent need for scientific research that will provide the further development of the fortification as a complete field of the military engineering. The article points put that such investigations are likely to be carried out, but they are not advertised, as it should be in military affairs. The current state of affairs in Ukraine is really alarming. We are in a state of permanent armed conflict with an enemy who is stronger than us, practically protecting the world from the aggressive imperial encroachments of the Putin regime. It is a challenge for us: how to build defense, including fortifications. Meanwhile, there is only a loud embarrassment with so-called "Yatseniuk's wall".
APA, Harvard, Vancouver, ISO, and other styles
34

Baskerville, Richard. "Third-degree conflicts: information warfare." European Journal of Information Systems 19, no. 1 (February 2010): 1–4. http://dx.doi.org/10.1057/ejis.2010.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Grabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.

Full text
Abstract:
In the modern sense, the concept of information warfare includes the use and management of information and communication technologies to achieve a competitive advantage compared to the opponent. An information warfare is a manipulation with information that trusts a goal without an objective understanding, so that the goal is to take decisions against its own interests in the interests of the opponents. Information structures are considered as systems that produce and process various types of information, provide the storage of information and access to users. Such information structures may include neural networks, adaptive learning systems, etc. They must be prepared to train, respond to threats and ensure the safety of their existence, which is very topical during modern information warfare. This analytical article will cover more theoretical aspects related to the security of information systems from the system theory point of view. Knowledge base of the information structure can be a neural network, in which training should be provided from external threats.The author considers artificial neural networks as one of the potential threats in the context of information warfare.
APA, Harvard, Vancouver, ISO, and other styles
36

FOGARTY, WILLIAM M. "THE REQUIREMENT FOR WARFARE SYSTEMS ENGINEERING." Naval Engineers Journal 98, no. 5 (September 1986): 27–31. http://dx.doi.org/10.1111/j.1559-3584.1986.tb01728.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Clare, T. A., and R. A. Holden. "Automated Warfare Systems: An Engineering Perspective." Naval Engineers Journal 111, no. 4 (July 1999): 37–46. http://dx.doi.org/10.1111/j.1559-3584.1999.tb01236.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Grabusts, Peter, Aleksejs Zorins, and Artis Teilāns. "INFORMATIONAL WARFARE – INFLUENCE ON INFORMATIONAL STRUCTURES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 2 (June 20, 2019): 56. http://dx.doi.org/10.17770/etr2019vol2.4035.

Full text
Abstract:
The concept of information warfare encompasses the use of information and communication technologies to gain an advantage over a potential opponent. The information warfare is the manipulation with the information that trusts the goal, so that the goal should make decisions about its interests in the interests of opponents. Information structures are treated as systems that process different types of information, provide storage and access to users. Such structures may enclose neural networks, self-learning systems etc. They need to be ready to learn, respond to threats and ensure their safety, which is topical in today's information warfare. This paper will address aspects related to the security of information systems from a system theory point of view. The knowledge base of information structures can be elements of artificial intelligence, which security must be protected against various threats. The authors considers artificial neural networks to be one of the potential threats in the context of information warfare.
APA, Harvard, Vancouver, ISO, and other styles
39

Davis, Evan. "Book Review: Encyclopedia of Cyber Warfare." Reference & User Services Quarterly 57, no. 3 (March 16, 2018): 225. http://dx.doi.org/10.5860/rusq.57.3.6623.

Full text
Abstract:
Great Britain was once the global power because it ruled the waves, but Germany ruled below the waves, and it almost won both world wars. Now the United States is the global power, but could the airwaves be our undoing?
APA, Harvard, Vancouver, ISO, and other styles
40

Whyte, Christopher. "Protectors without Prerogative: The Challenge of Military Defense against Information Warfare." Journal of Advanced Military Studies 11, no. 1 (June 16, 2020): 166–84. http://dx.doi.org/10.21140/mcuj.2020110108.

Full text
Abstract:
This article considers the unique threat of information warfare and the challenges posed to defense establishments in democratic states that are typically legally limited in their ability to operate in domestic affairs. This author argues that military strategy on information warfare must be informed by understanding the systems of social and political function being targeted by foreign adversaries. Looking to theories of political communication, the author locates such understanding in describing democracies as information systems whose functionality resides in the countervailing operation of key social forces. Defense establishments would do well to develop greater analytic capacity for prediction of attack based on such societal—rather than strategic—factors and incorporate these predictions into efforts to shape adversary behavior in cyberspace, the primary medium via which information warfare is prosecuted today.
APA, Harvard, Vancouver, ISO, and other styles
41

Murphy, Peter. "Systems of Communication." International Journal of Knowledge and Systems Science 2, no. 2 (April 2011): 1–15. http://dx.doi.org/10.4018/jkss.2011040101.

Full text
Abstract:
Three fundamental systems of communication are defined: information, explanation, and imagination. Information is based on analytic distinctions between objects in the world. Explanatory communication provides knowledge through discourse, narration, logic, rhetoric and other forms of systemic elaboration. Intellectual discovery relies on a third system of communication, that of imagination. Rather than distinction or elaboration, imagination is rooted in intuition and analogy. The most powerful medium of the imagination is antonymous insight. The article discusses examples of the latter from warfare, politics, and science.
APA, Harvard, Vancouver, ISO, and other styles
42

HOLT, RICHARD H. "THE ROLE OF THE WARFARE SYSTEMS ENGINEER." Naval Engineers Journal 98, no. 1 (January 1986): 30–38. http://dx.doi.org/10.1111/j.1559-3584.1986.tb00612.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Moffat, James. "Mathematical modelling of information age conflict." Journal of Applied Mathematics and Decision Sciences 2006 (July 31, 2006): 1–15. http://dx.doi.org/10.1155/jamds/2006/16018.

Full text
Abstract:
Previous mathematical modelling of conflict has been based on Lanchester's equations, which relate to the grinding attrition of “industrial-age” warfare. Large blocks of force interact in order to force defeat by a process of wearing away the other. This is no longer so relevant as a way of conceptualising warfare, and we generalise the approach so that it is more appropriate to the “information age” into which we are now moving. It turns out that the solution to this problem is the development of a theory of what we call “scale-free systems.” We first develop this theory, and then indicate how it can be applied.
APA, Harvard, Vancouver, ISO, and other styles
44

Board, Editorial. "Well-known Personality in a Technical World and Information System." Global Journal of Enterprise Information System 8, no. 1 (August 9, 2016): 62. http://dx.doi.org/10.18311/gjeis/2016/7294.

Full text
Abstract:
We are pleased to share profile of Col. Inderjit Singh (Retd). Inderjit is a an experienced Information Systems and Information Security Professional with experience of more than 25 year across a wide spectrum of areas spanning Solution Architecture, Program/Project Management Telecom, IT Infrastructure Management, Info Security Advisory and Architecture, Cyber Security, Cyber Warfare and Cyber Forensics, Data Centers Design and Operations, Cloud Computing and E-Commerce Startup. An experienced Information Systems Professional with experience of more than 25 year across a wide spectrum of areas spanning Solution Architecture, Program/ Project Management in Telecom, IT Infrastructure Management, Information Security Advisory and Architecture, Cyber Security, Cyber Warfare and Cyber Forensics, Data Centers Design and Operations, Cloud Computing and E-Commerce.
APA, Harvard, Vancouver, ISO, and other styles
45

Novikov, D. A. "Hierarchical models of warfare." Automation and Remote Control 74, no. 10 (October 2013): 1733–52. http://dx.doi.org/10.1134/s0005117913100135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ruhman, Ingo. "Cyber War: Will it define the Limits to IT Security?" International Review of Information Ethics 20 (December 1, 2013): 4–15. http://dx.doi.org/10.29173/irie156.

Full text
Abstract:
Cyber warfare exploits the weaknesses in safety and security of IT systems and infrastructures for political and military purposes. Today, not only have various units in the military and secret services become known to engage in attacks on adversary’s IT systems, but even a number of cyber attacks conducted by these units have been identified. Most cyber warfare doctrines aim at a very broad range of potential adversaries, including civilians and allies, thus justifying the involvement of cyber warfare units in various IT security scenarios of non-military origin. Equating IT security with cyber warfare has serious consequences for the civil information society.
APA, Harvard, Vancouver, ISO, and other styles
47

Chilachava, Temur, Liana Karalashvili, and Nugzar Kereselidze. "Integrated Models of Non-Permanent Information Warfare." International Journal on Advanced Science, Engineering and Information Technology 10, no. 6 (December 13, 2020): 2222. http://dx.doi.org/10.18517/ijaseit.10.6.9817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Burns, David J., and Homer B. Warren. "Consumer warfare: implications for marketing strategy." Journal of Business Strategy 29, no. 6 (October 31, 2008): 44–52. http://dx.doi.org/10.1108/02756660810917237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cartwright, Shawn D. "SUPPLY CHAIN INTERDICTION and CORPORATE WARFARE." Journal of Business Strategy 21, no. 2 (February 2000): 30–35. http://dx.doi.org/10.1108/eb040072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Pipyros, Kosmas, Lilian Mitrou, Dimitris Gritzalis, and Theodoros Apostolopoulos. "Cyberoperations and international humanitarian law." Information & Computer Security 24, no. 1 (March 14, 2016): 38–52. http://dx.doi.org/10.1108/ics-12-2014-0081.

Full text
Abstract:
Purpose – The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, from a strictly legal standpoint, it indicates that addressing cyber attacks does not fall within the jurisdiction of just one legal branch. This is mainly because of the fact that the concept of cyber warfare itself is open to many different interpretations, ranging from cyber operations performed by the States within the context of armed conflict, under International Humanitarian Law, to illicit activities of all kinds performed by non-State actors including cybercriminals and terrorist groups. The paper initially presents major cyber-attack incidents and their impact on the States. On this basis, it examines the existing legal framework at the European and international levels. Furthermore, it approaches “cyber warfare” from the perspective of international law and focuses on two major issues relating to cyber operations, i.e. “jurisdiction” and “attribution”. The multi-layered process of attribution in combination with a variety of jurisdictional bases in international law makes the successful tackling of cyber attacks difficult. The paper aims to identify technical, legal and, last but not least, political difficulties and emphasize the complexity in applying international law rules in cyber operations. Design/methodology/approach – The paper focuses on the globalization of the “cyber warfare phenomenon” by observing its evolutionary process from the early stages of its appearance until today. It examines the scope, duration and intensity of major cyber-attacks throughout the years in relation to the reactions of the States that were the victims. Having this as the base of discussion, it expands further by exemplifying “cyber warfare” from the perspective of the existing European and International legal framework. The main aim of this part is to identify and analyze major obstacles that arise, for instance in terms of “jurisdiction” and “attribution” in applying international law rules to “cyber warfare”. Findings – The absence of a widely accepted legal framework to regulate jurisdictional issues of cyber warfare and the technical difficulties in identifying, with absolute certainty, the perpetrators of an attack, make the successful tackling of cyber attacks difficult. Originality/value – The paper fulfills the need to identify difficulties in applying international law rules in cyber warfare and constitutes the basis for the creation of a method that will attempt to categorize and rank cyber operations in terms of their intensity and seriousness.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography