Computer network operations

Results: 408



#Item
261War / Cyberwarfare / Information warfare / Propaganda in the United States / Computer network operations / Psychological Operations / Electronic warfare / Information / System / Information operations / Military intelligence / Psychological warfare

OPINION PAPER Is The IW Paradigm Outdated? A Discussion of U.S. IW Theory Timothy L. Thomas

Add to Reading List

Source URL: fmso.leavenworth.army.mil

Language: English - Date: 2003-08-27 10:57:44
262War / Computer crimes / Electronic warfare / Computer network operations / 1st Information Operations Command / Military technology / Information warfare / Cyberterrorism / Military doctrine / Military science / Cyberwarfare / Military

NATO Individual Fellowship[removed]FINAL REPORT Strategic and Organisational Implications for Euro-Atlantic Security of Information Operations Dr Andrew Rathmell

Add to Reading List

Source URL: www.nato.int

Language: English - Date: 2002-03-05 08:04:00
263Search algorithms / Theoretical computer science / Network theory / Operations research / Cybernetics / Shortest path problem / Genetic algorithm / A* search algorithm / Topology / Mathematics / Mathematical optimization / Applied mathematics

Topology Optimization of Adaptive Compliant Aircraft Wing Leading Edge

Add to Reading List

Source URL: www.pellegrino.caltech.edu

Language: English - Date: 2011-02-15 13:15:39
264Computer security / National security / Information operations / Espionage / Operations security / Software testing / Vulnerability / Risk assessment / Countermeasure / Security / Cyberwarfare / Computer network security

OPERATIONS SECURITY PLAN Contract Number: ______ Operations Security (OPSEC) Plan

Add to Reading List

Source URL: www.cdse.edu

Language: English - Date: 2014-03-05 15:04:17
265Military science / Electronic warfare / Military technology / Military organization / United States Cyber Command / Department of Defense Cyber Crime Center / Stuxnet / Computer network operations / Twenty-Fourth Air Force / Cyberwarfare / Computer crimes / Hacking

Awaiting Cyber 9/11 By C l i f f o r d S . M ag e e E

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-08-28 11:33:52
266Information operations / War / Electronic warfare / Hacking / Information warfare / Computer network operations / Chinese Information Operations and Information Warfare / Cyber Operations / Cyberwarfare / Military science / Military intelligence

Microsoft Word - FINAL_USCC_PRC_Cyber_Capabilities_Study.docx

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:31:58
267IEEE standards / Telecommunications engineering / Local area network / Wi-Fi / Wireless / Computer network / Metro Ethernet / Technology / Wireless networking / Ethernet

Network  Operations  Manual   Prepared  by:  IT  Architecture  and  Infrastructure   Committee   Document  Version:1.2   Last  Edited:  [removed]  

Add to Reading List

Source URL: www.utexas.edu

Language: English - Date: 2013-08-29 13:56:24
268Decision tree / Influence diagram / Tree / CNO / Artificial intelligence / Science / Decision theory / Computer network operations / Operational Test and Evaluation Force

Using Decision Analysis to Increase Commanders’ Confidence for Employment of Computer Network Operations By: Rudolph “Reb Butler, Major USAF, Dr. Dick Deckro and Jeff Weir, Lieutenant Colonel, USAF

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 11:26:04
269Computing / System software / Software / Content-control software / Computer network security / Email filtering / Internet censorship in Australia / Spam filtering / Anti-spam / Content filtering

Testimony of Kevin Blakeman Chairman Telage, thank you and your fellow commissioners for offering me the opportunity to testify before you today. My name is Kevin Blakeman. I am president of U.S. Operations for SurfContr

Add to Reading List

Source URL: www.copacommission.org

Language: English - Date: 2013-02-05 12:43:59
270Operations research / Convex analysis / Markov models / Convex optimization / Speech recognition / Hidden Markov model / Semidefinite programming / Support vector machine / Artificial neural network / Statistics / Mathematical optimization / Mathematics

Large Margin Hidden Markov Models for Automatic Speech Recognition Fei Sha Computer Science Division University of California

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2011-08-01 12:49:01
UPDATE