منابع مشابه
Rethinking Defensive Information Warfare
Although the origins of information warfare lie in the defense of critical computer systems, defensive information warfare (DIW) per se has advanced little beyond an information assurance model. Information assurance is an integral part of any military organization’s operations, but it falls far short of meeting the needs for robust defense of critical command-and-control (C2) computer networks...
متن کاملAn ASW (Anti-Submarine Warfare) Simulator on Smart Phones
As modern weapon systems become complex and expensive, there is an increasing need to predict the effectiveness of a new weapon system before the actual development. In this paper, we present an ASW (Anti Submarine Warfare) simulator to measure the effectiveness of a TAS (Towed Array Sonar) on smart phones. Our simulator is composed of Red and Blue submarine model, Environment model (i.e. sea) ...
متن کاملA Simulation Model of Networked Tracking for Anti-submarine Warfare
This report describes a simulation model of sonar tracking, developed to explore the effect of networking sonars on tracking performance. The tracker is an extended Kalman filter with data association by nearest-neighbour in Mahalanobis distance. Data fusion algorithms also use Mahalanobis distance. Simulation outputs have been verified against analytical results where possible.
متن کاملDefensive Information Warfare with Non-localizable Command and Control
I loosely define "hard" information defenses as those assurance mechanisms that tend more to prevent (rather than recover from) the ill effects of security breaches and which tend to be more static in nature. Similarly, I loosely define "soft" defenses as assurances that tend to rely more on recovery from security breaches and offer a more dynamic/adaptive kind of information protection. Inform...
متن کاملCumulative Track-Initiation Probability as a Basis for Assessing Sonar-System Performance in Anti-Submarine Warfare
Calculations of sonar-system performance for anti-submarine warfare yield detection probability as a function of range to the target; whereas sonar operators typically think in terms of a ‘detection range’. This Note considers how to connect these two concepts for active sonar. Four types of probability are explored and their relative advantages teased out in the light of realworld examples. It...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Royal United Services Institution. Journal
سال: 1871
ISSN: 0035-9289
DOI: 10.1080/03071847109417050