Journal articles on the topic 'Information warfare. Systems engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Information warfare. Systems engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Parlin, Karel, Taneli Riihonen, Vincent Le Nir, Mark Bowyer, Thomas Ranstrom, Erik Axell, Borje Asp, Robert Ulman, Matthias Tschauner, and Marc Adrat. "Full-Duplex Tactical Information and Electronic Warfare Systems." IEEE Communications Magazine 59, no. 8 (August 2021): 73–79. http://dx.doi.org/10.1109/mcom.001.2001139.
Full textOverill, R. E. "Information warfare: battles in cyberspace." Computing & Control Engineering Journal 12, no. 3 (June 1, 2001): 125–28. http://dx.doi.org/10.1049/cce:20010304.
Full textPathak, A. K., Zafar Husain, and R. D. Pathak. "Technology-based information warfare: developing world perspective." International Journal of Computer Applications in Technology 16, no. 1 (2003): 47. http://dx.doi.org/10.1504/ijcat.2003.000310.
Full textMoore, Carl, Seung Baek, Jay Liebowitz, LTC Robert Kilmer, and Robert Minehart. "Intelligent agent‐based information warfare advisor (“Bob‐in‐a‐box”)." Kybernetes 27, no. 1 (February 1998): 38–53. http://dx.doi.org/10.1108/03684929810200521.
Full textDuddu, Vasisht. "A Survey of Adversarial Machine Learning in Cyber Warfare." Defence Science Journal 68, no. 4 (June 26, 2018): 356. http://dx.doi.org/10.14429/dsj.68.12371.
Full textMakarenko, S. I., and A. S. Mamonchikova. "Dynamic plurilateral information conflict model with different participant strategies." Radio industry (Russia) 31, no. 2 (July 7, 2021): 35–48. http://dx.doi.org/10.21778/2413-9599-2021-31-2-35-48.
Full textDong, Jie, Guowei Wu, Tingting Yang, and Yangyang Li. "The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs." Sensors 18, no. 10 (October 12, 2018): 3430. http://dx.doi.org/10.3390/s18103430.
Full textSayer, Kylie. "Denying the Technology: Middle Management Resistance in Business Process Re-Engineering." Journal of Information Technology 13, no. 4 (December 1998): 247–57. http://dx.doi.org/10.1177/026839629801300404.
Full textAng Yang, H. A. Abbass, and R. Sarker. "Characterizing warfare in red teaming." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 36, no. 2 (April 2006): 268–85. http://dx.doi.org/10.1109/tsmcb.2005.855569.
Full textZachary, Wayne W., Monica C. Zubritzky, and Floyd A. Glenn. "The Development of the Air Anti-Submarine Warfare MissionTestbed as a Tool for the Development of Operator Models." Proceedings of the Human Factors Society Annual Meeting 32, no. 16 (October 1988): 1073–77. http://dx.doi.org/10.1177/154193128803201617.
Full textUstinova, L. A., V. A. Barkevych, N. V. Kurdil, R. M. Shvets, V. I. Saglo, and O. A. Yevtodiev. "Current state and trends in the development of the identification tools for chemical warfare agents in Ukraine: ways of harmonization in accordance with EU and NATO standards. Part IІ." Ukrainian Journal of Modern Toxicological Aspects 87, no. 3 (December 9, 2019): 30–42. http://dx.doi.org/10.33273/2663-4570-87-3-30-42.
Full textFang, Zhemei, Xiaozhou Zhou, and Ani Song. "Architectural Models Enabled Dynamic Optimization for System-of-Systems Evolution." Complexity 2020 (February 21, 2020): 1–14. http://dx.doi.org/10.1155/2020/7534819.
Full textLippert, Kari J., and Robert Cloutier. "Cyberspace: A Digital Ecosystem." Systems 9, no. 3 (June 26, 2021): 48. http://dx.doi.org/10.3390/systems9030048.
Full textDixon, Thom. "The grey zone of cyber-biological security." International Affairs 97, no. 3 (May 2021): 685–702. http://dx.doi.org/10.1093/ia/iiab041.
Full textIlachinski, Andrew. "Exploring self‐organized emergence in an agent‐based synthetic warfare lab." Kybernetes 32, no. 1/2 (February 2003): 38–76. http://dx.doi.org/10.1108/03684920310452337.
Full textShaji, Ramaswamy Swarnammal, V. Sachin Dev, and Thomas Brindha. "A methodological review on attack and defense strategies in cyber warfare." Wireless Networks 25, no. 6 (April 5, 2018): 3323–34. http://dx.doi.org/10.1007/s11276-018-1724-1.
Full textDzhus, V., B. Haibadulov, D. Kaluhin, R. Tytarenko, and S. Kukobko. "INFLUENCE OF ERRORS OF TOPOGRAPHIC SURVEY AND ORIENTATION OF RADIO- TECHNICAL MEANS OF AIRSPACE CONTROL ON ESTIMATES OF COORDINATE INFORMATION ISSUED BY THEM." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки, no. 8 (June 29, 2021): 31–43. http://dx.doi.org/10.37701/dndivsovt.8.2021.04.
Full textXu, Chengtao, Kai Zhang, Yushan Jiang, Shuteng Niu, Thomas Yang, and Houbing Song. "Communication Aware UAV Swarm Surveillance Based on Hierarchical Architecture." Drones 5, no. 2 (April 30, 2021): 33. http://dx.doi.org/10.3390/drones5020033.
Full textPywell, Mike. "Information Warfare and Electronic Warfare Systems R. A. Poisel Artech House, 16 Sussex Street, London, SW1V 4RW, UK. 2013. 414pp. £89. (20% discount available to RAeS members via www. artechhouse.com using RAES2014 promotion code). ISBN 978-1-608-07705-2." Aeronautical Journal 118, no. 1209 (November 2014): 1377–79. http://dx.doi.org/10.1017/s0001924000010046.
Full textRavishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure." Defence Science Journal 68, no. 1 (December 18, 2017): 54. http://dx.doi.org/10.14429/dsj.68.11402.
Full textMan, Peng, Chibiao Ding, Wenjuan Ren, and Guangluan Xu. "A Nonlinear Fingerprint-Level Radar Simulation Modeling Method for Specific Emitter Identification." Electronics 10, no. 9 (April 26, 2021): 1030. http://dx.doi.org/10.3390/electronics10091030.
Full textNalapko, Oleksii, Andrii Shyshatskyi, Viktor Ostapchuk, Qasim Abbood Mahdi, Ruslan Zhyvotovskyi, Serhii Petruk, Yevgen Lebed, Serhii Diachenko, Vira Velychko, and Illia Poliak. "Development of a method of adaptive control of military radio network parameters." Eastern-European Journal of Enterprise Technologies 1, no. 9 (109) (February 27, 2021): 18–32. http://dx.doi.org/10.15587/1729-4061.2021.225331.
Full textMilczarek, Hubert, Czesław Leśnik, Igor Djurović, and Adam Kawalec. "Estimating the Instantaneous Frequency of Linear and Nonlinear Frequency Modulated Radar Signals—A Comparative Study." Sensors 21, no. 8 (April 17, 2021): 2840. http://dx.doi.org/10.3390/s21082840.
Full textKose, Erkan, and Jeffrey Yi-Lin Forrest. "N-person grey game." Kybernetes 44, no. 2 (February 2, 2015): 271–82. http://dx.doi.org/10.1108/k-04-2014-0073.
Full textLu, Jianhua, Yanli Tang, Tao Wan, and Bin Tang. "A Novel Method of EW System Effectiveness Evaluation Based on Conflict Status Association Analysis." Electronics 10, no. 3 (January 26, 2021): 286. http://dx.doi.org/10.3390/electronics10030286.
Full textJulian, Alfred. "Information Warfare and Information Systems Security." EDPACS 24, no. 3 (September 1996): 8–12. http://dx.doi.org/10.1080/07366989609452269.
Full textKim, Sieun, Taek-Young Youn, Daeseon Choi, and Ki-Woong Park. "UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization." Wireless Communications and Mobile Computing 2019 (May 16, 2019): 1–11. http://dx.doi.org/10.1155/2019/8913910.
Full textJagadish, H. V. "Information warfare and security." ACM SIGMOD Record 30, no. 4 (December 2001): 69–70. http://dx.doi.org/10.1145/604264.604276.
Full textLee, C. "Taranis and beyond: inspiring aerodynamic capability." Aeronautical Journal 118, no. 1206 (August 2014): 845–59. http://dx.doi.org/10.1017/s0001924000009593.
Full textKovacich, Gerald L. "Information warfare and the information systems security professional." Computers & Security 16, no. 1 (January 1997): 14–24. http://dx.doi.org/10.1016/s0167-4048(97)85783-5.
Full textKovacich, Gerry. "Information Warfare and the Information Systems Security Professional." Information Systems Security 6, no. 2 (January 1997): 45–55. http://dx.doi.org/10.1080/10658989709342535.
Full textDavies, Philip H. J. "Intelligence, information technology, and information warfare." Annual Review of Information Science and Technology 36, no. 1 (February 1, 2005): 312–52. http://dx.doi.org/10.1002/aris.1440360108.
Full textMykhalchenko, Serhii, and Valerii Tovbych. "PROSPECTS OF MODERN FORTIFICATION." Current problems of architecture and urban planning, no. 60 (April 26, 2021): 268–76. http://dx.doi.org/10.32347/2077-3455.2021.60.268-276.
Full textBaskerville, Richard. "Third-degree conflicts: information warfare." European Journal of Information Systems 19, no. 1 (February 2010): 1–4. http://dx.doi.org/10.1057/ejis.2010.2.
Full textGrabusts, Pēteris. "Security Aspects of Information Structures in the Information Warfare Context." Information Technology and Management Science 21 (December 14, 2018): 49–53. http://dx.doi.org/10.7250/itms-2018-0007.
Full textFOGARTY, WILLIAM M. "THE REQUIREMENT FOR WARFARE SYSTEMS ENGINEERING." Naval Engineers Journal 98, no. 5 (September 1986): 27–31. http://dx.doi.org/10.1111/j.1559-3584.1986.tb01728.x.
Full textClare, T. A., and R. A. Holden. "Automated Warfare Systems: An Engineering Perspective." Naval Engineers Journal 111, no. 4 (July 1999): 37–46. http://dx.doi.org/10.1111/j.1559-3584.1999.tb01236.x.
Full textGrabusts, Peter, Aleksejs Zorins, and Artis Teilāns. "INFORMATIONAL WARFARE – INFLUENCE ON INFORMATIONAL STRUCTURES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 2 (June 20, 2019): 56. http://dx.doi.org/10.17770/etr2019vol2.4035.
Full textDavis, Evan. "Book Review: Encyclopedia of Cyber Warfare." Reference & User Services Quarterly 57, no. 3 (March 16, 2018): 225. http://dx.doi.org/10.5860/rusq.57.3.6623.
Full textWhyte, Christopher. "Protectors without Prerogative: The Challenge of Military Defense against Information Warfare." Journal of Advanced Military Studies 11, no. 1 (June 16, 2020): 166–84. http://dx.doi.org/10.21140/mcuj.2020110108.
Full textMurphy, Peter. "Systems of Communication." International Journal of Knowledge and Systems Science 2, no. 2 (April 2011): 1–15. http://dx.doi.org/10.4018/jkss.2011040101.
Full textHOLT, RICHARD H. "THE ROLE OF THE WARFARE SYSTEMS ENGINEER." Naval Engineers Journal 98, no. 1 (January 1986): 30–38. http://dx.doi.org/10.1111/j.1559-3584.1986.tb00612.x.
Full textMoffat, James. "Mathematical modelling of information age conflict." Journal of Applied Mathematics and Decision Sciences 2006 (July 31, 2006): 1–15. http://dx.doi.org/10.1155/jamds/2006/16018.
Full textBoard, Editorial. "Well-known Personality in a Technical World and Information System." Global Journal of Enterprise Information System 8, no. 1 (August 9, 2016): 62. http://dx.doi.org/10.18311/gjeis/2016/7294.
Full textNovikov, D. A. "Hierarchical models of warfare." Automation and Remote Control 74, no. 10 (October 2013): 1733–52. http://dx.doi.org/10.1134/s0005117913100135.
Full textRuhman, Ingo. "Cyber War: Will it define the Limits to IT Security?" International Review of Information Ethics 20 (December 1, 2013): 4–15. http://dx.doi.org/10.29173/irie156.
Full textChilachava, Temur, Liana Karalashvili, and Nugzar Kereselidze. "Integrated Models of Non-Permanent Information Warfare." International Journal on Advanced Science, Engineering and Information Technology 10, no. 6 (December 13, 2020): 2222. http://dx.doi.org/10.18517/ijaseit.10.6.9817.
Full textBurns, David J., and Homer B. Warren. "Consumer warfare: implications for marketing strategy." Journal of Business Strategy 29, no. 6 (October 31, 2008): 44–52. http://dx.doi.org/10.1108/02756660810917237.
Full textCartwright, Shawn D. "SUPPLY CHAIN INTERDICTION and CORPORATE WARFARE." Journal of Business Strategy 21, no. 2 (February 2000): 30–35. http://dx.doi.org/10.1108/eb040072.
Full textPipyros, Kosmas, Lilian Mitrou, Dimitris Gritzalis, and Theodoros Apostolopoulos. "Cyberoperations and international humanitarian law." Information & Computer Security 24, no. 1 (March 14, 2016): 38–52. http://dx.doi.org/10.1108/ics-12-2014-0081.
Full text