Startsida
Hjälp
Sök i LIBRIS databas

     

 

Sökning: onr:14929934 > Information warfare...

Information warfare and electronic warfare systems / Richard A. Poisel.

Poisel, Richard (författare)
ISBN 9781608077052
Publicerad: Norwood, MA : Artech House, c2013
Publicerad: Norwood, MA : Artech House, [2013]
Engelska xvii, 414 pages
Serie: Artech House electronic warfare library
  • Bok
Innehållsförteckning Ämnesord
Stäng  
  • Machine generated contents note: ch. 1 Introduction to Information Warfare and Electronic Warfare Systems -- 1.1. Introduction -- 1.2. Global Information Grid -- 1.3. Networks -- 1.3.1. Operational and Strategic -- 1.3.2. Tactical -- 1.4. Information and Information Theory -- 1.4.1. Network-Centric Operations Background and Characteristics -- 1.5. Electronic Warfare and NCO -- 1.5.1. EW and Networking -- 1.6. EW Systems -- 1.6.1. ES Systems -- 1.6.2. EA Systems -- 1.7. Concluding Remarks -- References -- ch. 2 Information and Information Operations -- 2.1. Introduction -- 2.2. Information -- 2.2.1. The Importance of Information to Warfare -- 2.2.2. Information Sources -- 2.2.3. Information Attributes -- 2.2.4. EW and Its Effects on Information -- 2.3. OODA Loop and Cognitive Hierarchy -- 2.3.1. The OODA Loop Model -- 2.3.2. Cognitive Hierarchy Model -- 2.4. Information Operations -- 2.4.1. Information Warfare/Information Operations -- 2.4.2. Three Domains of Conflict -- 2.4.3. Applying the Domains of Conflict to IO -- 2.4.4. The Efficiency of Decision-Making -- 2.4.5. Summary -- 2.5. Concluding Remarks -- References -- ch. 3 Information Theory -- 3.1. Introduction -- 3.2. Random Variables and Probabilities -- 3.2.1. Moments -- 3.2.2. Entropy -- 3.3. Information -- 3.3.1. Entropy and Information -- 3.3.2. Measuring Information -- 3.3.3. Mutual Information -- 3.4. Information Channels -- 3.4.1. Channels -- 3.4.2. Discrete Channels -- 3.4.3. Coding -- 3.4.4. Channel Capacity -- 3.4.5. Shannon's Channel Coding Theorem -- 3.4.6. Capacity Versus Bandwidth -- 3.4.7. Shannon Limit -- 3.4.8. Capacity of M-Point QAM Signals -- 3.4.9. Capacity of an n-ary PCM System -- 3.4.10. Capacity of Frequency-Hopped Code-Division Multiple-Access Channels -- 3.4.11. Data Processing Theorem -- 3.5. Common Channel Models -- 3.5.1. Encoding and Decoding -- 3.5.2. Capacity for Additive White Gaussian Noise Channels -- 3.5.3. Memoryless Channels -- 3.5.4. Binary Channels -- 3.5.5. Binary Symmetric Channel -- 3.5.6. Erasure Channel -- 3.5.7. Burst Error Model (Gilbert-Elliot Channel) -- 3.5.8. Broadcast Channels -- 3.5.9. Channel Models---General Diagram -- 3.6. Concluding Remarks -- References -- Appendix A Weak Law of Large Numbers -- ch. 4 A Model of Information Warfare -- 4.1. Introduction -- 4.2. Defining Information Warfare -- 4.2.1. Limitations of the Shannon Model -- 4.3. Information Warfare Strategies -- 4.3.1. Four Canonical IW Strategies -- 4.3.2. Summary -- 4.4. Hypergames and IW -- 4.4.1. Hypergames -- 4.4.2. Gaining Advantage from Differences in Perception -- 4.4.3. Mapping the Canonical IW Strategies onto Hypergames -- 4.5. Concluding Remarks -- References -- Appendix A Turing Machines -- ch. 5 Electronic Warfare Systems and Network-Centric Warfare -- 5.1. Introduction -- 5.2. Network Centric Warfare -- 5.2.1. Concept of Network-Centric Warfare -- 5.2.2. Definition of NCW -- 5.2.3. Dissenting Views -- 5.3. Thick and Thin Sensors -- 5.4. EW Contributions -- 5.4.1. EW Contribution to Situation Assessment -- 5.4.2. EW Contribution to Targeting -- 5.4.3. Electronic Support -- 5.4.4. EW Target Analysis -- 5.4.5. EW Intelligence Analysis -- 5.4.6. Communications EW Contribution -- 5.4.7. Electronic Attack -- 5.4.8. Virtual CEW Organizations -- 5.4.9. Information Required by Communications EW Systems -- 5.5. Effects-Based Operations and the Role of EW -- 5.5.1. EW and EBO -- 5.5.2. Ability to Conduct Effects-Based Operations -- 5.5.3. Cueing Other Sensors -- 5.6. Collaboration -- 5.6.1. Information Saturation -- 5.6.2. Network-Centric Benefit -- 5.7. Data and Information Fusion -- 5.7.1. The Need for Fusion -- 5.7.2. Cognitive Hierarchy---Revisited -- 5.7.3. Fusion Levels -- 5.7.4. Human Interaction -- 5.7.5. Summary -- 5.8. Concluding Remarks -- References -- ch. 6 Networking -- 6.1. Introduction -- 6.2. Computer Networks -- 6.2.1. The Internet -- 6.2.2. Mobile Computer Networks -- 6.2.3. Evolving Wireless Networks Outside the Internet -- 6.3. Mobile Ad Hoc Networks -- 6.3.1. Ad Hoc Networks versus Mobile Ad Hoc Networks -- 6.3.2. History of MANETs -- 6.3.3. MANET Layers -- 6.3.4. Routing Protocols for MANETs -- 6.4. MANET Security -- 6.4.1. Security Issues -- 6.4.2. A Multilevel Security Approach -- 6.4.3. Trusted Node Routing -- 6.5. EW Attacks on MANETs -- 6.5.1. Traditional Attacks/Channel Capacity for MANETs -- 6.5.2. Nontraditional MANET Attacks -- 6.5.3. MANET Security Challenges -- 6.6. MANETs and EW Systems -- 6.6.1. Command and Control -- 6.6.2. Reporting -- 6.6.3. Target Tasking/Dynamic Retasking -- 6.6.4. On-the-Move Communications -- 6.6.5. Sensor Networks -- 6.6.6. Location Reporting -- 6.7. Concluding Remarks -- References -- ch. 7 Situation Awareness -- 7.1. Introduction -- 7.2. Situation Awareness and Fusion Levels -- 7.3. Situation Assessment Strategies -- 7.3.1. Knowledge Acquisition and Database Development -- 7.3.2. Development of an Active Memory -- 7.3.3. Summary -- 7.4. Bayesian Logic and Bayesian Belief Networks -- 7.4.1. Introduction to Bayesian Logic -- 7.4.2. Modeling Knowledge and Conflict Using Bayes' Reasoning -- 7.4.3. Bayesian Belief Networks -- 7.5. Concluding Remarks -- References -- ch. 8 EW Systems -- 8.1. Introduction -- 8.2. EW System Architectures -- 8.2.1. ES System Architectures -- 8.3. Receiving Systems -- 8.3.1. Basic Architecture -- 8.4. EA System Architectures -- 8.4.1. Jamming Techniques -- 8.4.2. Asset Sharing -- 8.4.3. Jamming Systems -- 8.5. EW System Operational Considerations -- 8.5.1. Means Versus Effects -- 8.5.2. Radio Propagation Issues -- 8.5.3. Wartime Reserve Modes -- 8.5.4. Employment Considerations -- 8.5.5. ES Operational Considerations -- 8.5.6. EA Operational Considerations -- 8.6. Concluding Remarks -- References -- ch. 9 Electronic Warfare System Performance -- 9.1. Introduction -- 9.1.1. Confidentiality from Eavesdropping -- 9.1.2. Jammer Effects on Communication Reliability -- 9.2. The Wiretap Channel -- 9.2.1. Wyner's Wiretap Channel -- 9.2.2. Discrete Memoryless Wiretap Channel -- 9.2.3. Privacy Capacity -- 9.3. Arbitrarily Varying Channels -- 9.3.1. Arbitrarily Varying Channels -- 9.3.2. Coding Scheme -- 9.3.3. AVC Capacities -- 9.4. Electronic Support Performance -- 9.4.1. ES Performance---Privacy Capacity -- 9.5. Jamming Performance in AWGN Channels -- 9.5.1. Jammer Scenario -- 9.5.2. Broadband Noise Jamming -- 9.5.3. Partial-Band Noise Jamming -- 9.6. Spatially Duplexed EW System Performance with Multiple Antennas -- 9.6.1. Active Intercept Channel -- 9.6.2. Jamming Waveforms -- 9.6.3. Antenna Selection -- 9.6.4. Self-Interference Cancellation -- 9.6.5. Summary -- 9.7. EW Performance with Collocated EA and ES and Multiple Antennas -- 9.7.1. Channel Scenario -- 9.7.2. Privacy Rate Approximations -- 9.7.3. Strategic Wiretap Game -- 9.7.4. Extensive Form Intercept Game -- 9.7.5. Simulation Results -- 9.7.6. Summary -- 9.8. Independent ES and EA System Performance -- 9.8.1. Arbitrarily Varying Wiretap Channels -- 9.8.2. Degraded Channels -- 9.8.3. Coding Scheme and Performance Measures -- 9.8.4. Privacy Capacity -- 9.8.5. Performance of AVWTCs -- 9.8.6. Examples -- 9.8.7. Summary -- 9.9. Concluding Remarks -- References -- ch. 10 EW Architecture Simulations -- 10.1. Introduction -- 10.2. Engineering Simulation -- 10.2.1. Electronic Attack -- 10.2.2. Transmission Sequence -- 10.2.3. Jammer Placement -- 10.2.4. Results -- 10.2.5. Summary and Conclusions from the Engineering Simulation -- 10.3. Operational Simulation -- 10.3.1. Scenario Model -- 10.3.2. EW Methodology -- 10.3.3. Key Assumptions -- 10.3.4. NEA Scenario -- 10.3.5. MOUT Scenario -- 10.4. Recommendations -- 10.5. Concluding Remarks -- 10.5.1. Engineering Simulation -- 10.5.2. Operational Simulation -- References -- Appendix A Simulated Networks.

Ämnesord

Informationskrigföring  (sao)
Telekrigföring  (sao)
IT-säkerhet  (sao)
Databehandling  (sao)
Information warfare.  (LCSH)
Information technology  -- Security measures. (LCSH)
Information warfare  (LCSH)
Data processing  (LCSH)
Computer security  (LCSH)
Electronic warfare  (LCSH)

Klassifikation

U163 (LCC)
355.343 (DDC)
623.043 (DDC)
Se (kssb/8 (machine generated))
Inställningar Hjälp

Titeln finns på 2 bibliotek. 

Bibliotek i Stockholmsregionen (1)

Ange som favorit

Bibliotek i västra Sverige (1)

Ange som favorit
Om LIBRIS
Sekretess
Hjälp
Fel i posten?
Kontakt
Teknik och format
Sök utifrån
Sökrutor
Plug-ins
Bookmarklet
Anpassa
Textstorlek
Kontrast
Vyer
LIBRIS söktjänster
SwePub
Uppsök

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

Copyright © LIBRIS - Nationella bibliotekssystem

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy