نتایج جستجو برای: and military attack

تعداد نتایج: 16841411  

Journal: :European Journal of Operational Research 2007
Amnon Levy

Enlistment at the earliest viable age maximizes the country’s wartime army size and thereby the country’s attack-deterrence capacity. Injuries and death generate a loss of quantity and quality of life that reduces the benefit from early-age enlistment. The benefit from any age of recruitment is also affected by the rise and decline of the individual’s military performance and civilian productiv...

ژورنال: مجله طب نظامی 2020

Background and Aim: Nurses play an important role in responding to natural disasters. The aim of this study was to describe the functional dimensions and professional competencies of military nurses in disasters and emergencies. Methods: This study is a systematic review. In order to review and explain the professional competency of military nurses in disasters and emergencies, 100 published pa...

Journal: :CoRR 2017
Orly Stan Yuval Elovici Asaf Shabtai Gaby Shugol Raz Tikochinski Shachar Kur

MIL-STD-1553 is a military standard that defines the physical and logical layers, and a command/response time division multiplexing of a communication bus used in military and aerospace avionic platforms for more than 40 years. As a legacy platform, MIL-STD-1553 was designed for high level of fault tolerance while less attention was taken with regard to security. Recent studies already addresse...

2009
Sérgio Tenreiro de Magalhães Maria J. Rios Leonel Santos Hamid Jahankhani

The People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20 century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military capability or even to create casualties. This p...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

Journal: :Internasjonal Politikk 2022

Artikkelen drøfter hvordan analyse av militære disposisjoner kan brukes for å vurdere om et angrep vil komme. viser også enkel etterretningsmetodikk i slike situasjoner. Abstract in EnglishMilitary Factors That Suggest War is Right Around the CornerWhen and how do military deployments, dispositions preparations signal that an attack actually coming? The article discusses such questions using in...

2016
Madjid Tavana Dawn A. Trevisani Dennis T. Kennedy

The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and...

2013
Suraj G. Gupta Mangesh M. Ghonge P. M. Jawandhiya

Unmanned Aircraft Systems (UAS) is an emerging technology with a tremendous potential to revolutionize warfare and to enable new civilian applications. It is integral part of future urban civil and military applications. It technologically matures enough to be integrated into civil society. The importance of UAS in scientific applications has been thoroughly demonstrated in recent years (DoD, 2...

2012
D. Devi Aruna Dr. P. Subashini

A mobile ad-hoc network (MANET) is a wireless network where nodes can communicate with each other without infrastructure. Due to this nature of MANET, some malicious and selfish nodes that try compromise the routing protocol functionality and makes MANET vulnerable to Denial of Service attack in military communication environments. This paper considers military scenarios and evaluates the perfo...

2006
Robert E. Lee

Robert E. Lee is widely and rightly regarded as one of the finest generals in history. Yet on July 3, 1863, the third day of the Battle of Gettysburg, he ordered a frontal assault across a mile of open field against the strong center of the Union line. The stunning Confederate defeat that ensued produced heavier casualties than Lee’s army could afford and abruptly ended its invasion of the Nort...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید