Summary/Abstract |
This paper outlines trends in devising practical recommendations on implementing planned methods of comprehensive damage to adversary information-driven systems when carrying out operational assignments to disorganize control over its troops and weapons in operations (combat actions).
|