نتایج جستجو برای: new warfare
تعداد نتایج: 1854981 فیلتر نتایج به سال:
The lexicon of information warfare (IW), or cyberwar, to use a common variant, has been around for more than two decades (Adams, 1998), but for most of that time it has remained the preserve of the defense community. Within the cloistered world of the Pentagon and its satellite communities, a radically new concept of postindustrial warfare has crystallized, one that is designed to ensure contin...
War and war-related concepts constitute a considerable portion of key words in political literature and strategic-security studies. Apart from its theoretical significance, war is a palpable term for the individuals and political players. It is a serious threat to humanity that has been paid due attention in the course of history by the political philosophers, strategists and even ordinary peop...
war and war-related concepts constitute a considerable portion of key words in political literature and strategic-security studies. apart from its theoretical significance, war is a palpable term for the individuals and political players. it is a serious threat to humanity that has been paid due attention in the course of history by the political philosophers, strategists and even ordinary peop...
In a dense modern electronic warfare environment, there are a lot of radar signals. Pulse repetition intervals of signals received from radars can have various modulations and levels. It is very important to recognize these modulations and to determine their levels in electronic warfare support systems. In this paper, a method of estimating PRI levels is proposed. The extensions of the biased a...
Interdisciplinary topics and fields need special attention to ensure that the breadth of knowledge they represent are completely expressed. This is especially important difficult achieve in curriculum areas tend add new ideas on a constant basis sometimes interdisciplinary themselves. The topic/field cyber warfare area this paper considers. recommends describes lesson plan provides means achiev...
The information revolution has created the ability for creating tremendous tools to support the warfighter. Tools for collecting, analyzing, and communicating information are being created to improve the efficiency and efficacy of conducting military operations. Unfortunately, the same information revolution has introduced new vulnerabilities whereby adversaries can acquire, exploit, deny, or d...
The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of interest in various environments: air respectively maritime traffic, air defence, force protection in out of area missions, harbour protection, coastal surveillance, or the security of naval platforms operating in critical en...
Abstract This article is focused on studying the emergence and evolution of operational law as a support for planning conducting military operations in times peace war. Issues regarding its curricular area, differences with international humanitarian law, how it can doctrine science are addressed. In this context, I analyse case implementation USA, following failure Vietnam, role reformation Am...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید