Electronic warfare

Results: 1516



#Item
31June 11, 2015  Paris Air Show 2015: Elbit Systems Launches Air Keeper - A Unique Airborne SIGINT and EW Solution Already operational, the new solution is suitable for cargo, transport or

June 11, 2015 Paris Air Show 2015: Elbit Systems Launches Air Keeper - A Unique Airborne SIGINT and EW Solution Already operational, the new solution is suitable for cargo, transport or

Add to Reading List

Source URL: www.elbitsystems.com

Language: English - Date: 2015-06-11 07:36:05
32REMOTE SENSING  Vantage™ Unmanned Air Vehicle J.R. Southwick Tactical Electronic Warfare Division Introduction: The Vehicle Research Section (VRS)

REMOTE SENSING Vantage™ Unmanned Air Vehicle J.R. Southwick Tactical Electronic Warfare Division Introduction: The Vehicle Research Section (VRS)

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2010-01-22 10:32:22
    33AIS ISA Research Committee 01: Armed Forces & Conflict Resolution

    AIS ISA Research Committee 01: Armed Forces & Conflict Resolution

    Add to Reading List

    Source URL: www.isa-rc01.net

    Language: English - Date: 2014-03-19 05:31:12
    34Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

    Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

    Add to Reading List

    Source URL: cyberisks.ro

    Language: English - Date: 2014-10-10 03:40:58
    35The Cyber War Has Not Begun James Andrew Lewis Center for Strategic and International Studies March 2010 Expanded attention to cybersecurity is a good thing, but it seems that it is difficult to discuss this topic withou

    The Cyber War Has Not Begun James Andrew Lewis Center for Strategic and International Studies March 2010 Expanded attention to cybersecurity is a good thing, but it seems that it is difficult to discuss this topic withou

    Add to Reading List

    Source URL: csis.org

    Language: English - Date: 2010-03-11 13:45:21
    36ThetaRay_Logo_Options_Draft7

    ThetaRay_Logo_Options_Draft7

    Add to Reading List

    Source URL: www.thetaray.com

    Language: English - Date: 2014-12-06 20:04:03
    37INTERNATIONAL STAFF EMERGING SECURITY CHALLENGES SECRÉTARIAT INTERNATIONAL DÉFIS DE SÉCURITÉ ÉMERGENTS  Cyber Threats to NATO and its Methodology for

    INTERNATIONAL STAFF EMERGING SECURITY CHALLENGES SECRÉTARIAT INTERNATIONAL DÉFIS DE SÉCURITÉ ÉMERGENTS Cyber Threats to NATO and its Methodology for

    Add to Reading List

    Source URL: sverof.se

    Language: English - Date: 2013-12-16 06:29:22
    38SEAWORTHINESS AND CYBER SECURITY – THE HIDDEN THREAT TO SHIPPING INSURING CYBER IN THE MARITIME INDUSTRY 23 JULY 2014

    SEAWORTHINESS AND CYBER SECURITY – THE HIDDEN THREAT TO SHIPPING INSURING CYBER IN THE MARITIME INDUSTRY 23 JULY 2014

    Add to Reading List

    Source URL: www.seasecurity.org

    Language: English - Date: 2014-07-24 03:54:18
    39Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

    Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

    Add to Reading List

    Source URL: www.westholland.cn

    Language: English - Date: 2015-03-31 09:09:36
    40Microsoft Word - gosler.doc

    Microsoft Word - gosler.doc

    Add to Reading List

    Source URL: dnnpro.outer.jhuapl.edu

    Language: English - Date: 2012-09-27 16:53:20