Query Result Set
Skip Navigation Links
   ActiveUsers:1535Hits:19380919Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
DETECTORS (5) answer(s).
 
SrlItem
1
ID:   130305


Defence from and for the MENA region: Airborne sensors / Nitschke, Stefan   Journal Article
Nitschke, Stefan Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The article focuses on the development of various airborne sensors for military missions in Middle East and North Africa (MENA) regions. It says that synthetic aperture radar (SAR), active electronically scanned array (AESA), and forward looking infrared (FLIR) are associated with bringing information to the military. It mentions that the most common way in acquiring high-resolution imagery from a battlefield is airborne reconnaissance.
        Export Export
2
ID:   123926


Locate and defeat: shot location systems / Baddeley, Adam; Merklinghaus, Dennis-P   Journal Article
Baddeley, Adam Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The article offers information on gunshot location systems with acoustic sensors to detect gunshots in an urban environment. It discusses how the system works which usually consists of microphones or sensors, a processing unit, and a user-interface displaying gunfire alerts. It details how the system locates gunshots and detect snipers. It also provides information on several gunshot location solutions which includes the Soldier Worn Acoustic Targeting System from Cobham PLC.
        Export Export
3
ID:   192046


Mitigating the Risk of Advanced Cyber Attacks: the Role of Quality, Covertness and Intensity of Use of Cyber Weapons / Gilad, Amitai; Tishler, Asher   Journal Article
Tishler, Asher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Modern countries employ computer networks that manage organizations in the private and public sectors. Cyber-attacks aim to disrupt, block, delete, manipulate or steal the data held in these networks, which challenge these countries’ national security. Consequently, cybersecurity programs must be developed to protect these networks from cyber-attacks in a manner that is similar to operations against terrorism. This study presents several models that analyze a contest between a network operator (defender) that deploys costly detectors to protect the network and a capable cyber attacker. Generally, when the deployed detectors become more potent or the defender exhibits higher vigilance, the attacker allocates more resources to R&D to ensure that the attack remains covert. We show that detectors may be substitutes, complements, or even degrade each other, implying that defenders must account for the cyber weapons’ characteristics and the attacker’s profile and strategic behavior. We derive the optimal number of detectors when the attacker’s R&D process features R&D spillovers and show that targeted detectors act as deterrents against high-quality weapons only if the attacker’s budget is not substantial. Finally, we demonstrate that common cybersecurity practices may be detrimental from a social-welfare perspective by enhancing an arms race with the attacker.
Key Words R&D  Detectors  Cyber Weapons  APT  Sequential Game  Advanced cyber-attacks 
        Export Export
4
ID:   070848


Rapid force projection technologies: assessing the performance of advanced ground sensors / Matsumura, John; Steeb, Randall; Bowdish, Randall G; Eisenhard, Scot 2000  Book
Matsumura, John Book
0 Rating(s) & 0 Review(s)
Publication Santa Monica, Rand Corporation, 2000.
Description xiv, 66p.
Standard Number 0833027247
        Export Export
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
044318358.170973/MAT 044318MainOn ShelfGeneral 
044451358.170973/MAT 044451MainOn ShelfGeneral 
5
ID:   123916


Surveillance technology trends for land warfare / Antal, John   Journal Article
Antal, John Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The article explores the trends in surveillance technology for land combat which are categorised as on-demand, enduring and persistent. These trends include small robots and throwbots that provide the ability to see a structure over a wall, old technologies in the form of high technological balloons, and wireless network of micro-mechanical systems. It notes that technological innovations including the proliferation of sensors may change nations' combat capabilities by 2020.
        Export Export