نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
Enlistment at the earliest viable age maximizes the country’s wartime army size and thereby the country’s attack-deterrence capacity. Injuries and death generate a loss of quantity and quality of life that reduces the benefit from early-age enlistment. The benefit from any age of recruitment is also affected by the rise and decline of the individual’s military performance and civilian productiv...
Background and Aim: Nurses play an important role in responding to natural disasters. The aim of this study was to describe the functional dimensions and professional competencies of military nurses in disasters and emergencies. Methods: This study is a systematic review. In order to review and explain the professional competency of military nurses in disasters and emergencies, 100 published pa...
MIL-STD-1553 is a military standard that defines the physical and logical layers, and a command/response time division multiplexing of a communication bus used in military and aerospace avionic platforms for more than 40 years. As a legacy platform, MIL-STD-1553 was designed for high level of fault tolerance while less attention was taken with regard to security. Recent studies already addresse...
The People’s Republic of China (PRC) has a long tradition on military strategy. In the end of the 20 century this was one of the first nations to prepare itself for the new emerging concept of war that includes the combat in cyberspace, both with the intention to obtain privileged information (espionage), to reduce the enemy attack and/or military capability or even to create casualties. This p...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
Artikkelen drøfter hvordan analyse av militære disposisjoner kan brukes for å vurdere om et angrep vil komme. viser også enkel etterretningsmetodikk i slike situasjoner. Abstract in EnglishMilitary Factors That Suggest War is Right Around the CornerWhen and how do military deployments, dispositions preparations signal that an attack actually coming? The article discusses such questions using in...
The increasing complexity in Military Command and Control (C2) systems has led to greater vulnerability due to system availability and integrity caused by internal vulnerabilities and external threats. Several studies have proposed measures of availability and integrity for the assets in the C2 systems using precise and certain measures (i.e., the exact number of attacks on the availability and...
Unmanned Aircraft Systems (UAS) is an emerging technology with a tremendous potential to revolutionize warfare and to enable new civilian applications. It is integral part of future urban civil and military applications. It technologically matures enough to be integrated into civil society. The importance of UAS in scientific applications has been thoroughly demonstrated in recent years (DoD, 2...
A mobile ad-hoc network (MANET) is a wireless network where nodes can communicate with each other without infrastructure. Due to this nature of MANET, some malicious and selfish nodes that try compromise the routing protocol functionality and makes MANET vulnerable to Denial of Service attack in military communication environments. This paper considers military scenarios and evaluates the perfo...
Robert E. Lee is widely and rightly regarded as one of the finest generals in history. Yet on July 3, 1863, the third day of the Battle of Gettysburg, he ordered a frontal assault across a mile of open field against the strong center of the Union line. The stunning Confederate defeat that ensued produced heavier casualties than Lee’s army could afford and abruptly ended its invasion of the Nort...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید