Electronic warfare

Results: 1516



#Item
31Data collection / Espionage / Cyberwarfare / Signals intelligence / Elbit Systems / Electronic warfare / Signals intelligence by alliances /  nations and industries / Signals intelligence operational platforms by nation / National security / Intelligence / Intelligence gathering disciplines

June 11, 2015 Paris Air Show 2015: Elbit Systems Launches Air Keeper - A Unique Airborne SIGINT and EW Solution Already operational, the new solution is suitable for cargo, transport or

Add to Reading List

Source URL: www.elbitsystems.com

Language: English - Date: 2015-06-11 07:36:05
32

REMOTE SENSING Vantage™ Unmanned Air Vehicle J.R. Southwick Tactical Electronic Warfare Division Introduction: The Vehicle Research Section (VRS)

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2010-01-22 10:32:22
    33Cyberwarfare / Electronic warfare / Hacking / Military technology / Inter-University Seminar on Armed Forces and Society / International Sociological Association / Definitions of terrorism / Civil–military relations / Military sociology / Military science / Sociology

    AIS ISA Research Committee 01: Armed Forces & Conflict Resolution

    Add to Reading List

    Source URL: www.isa-rc01.net

    Language: English - Date: 2014-03-19 05:31:12
    34Hacking / War / Advanced persistent threat / Military technology / Securitate / Malware / Computer insecurity / Zero-day attack / Security / Cyberwarfare / Electronic warfare

    Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

    Add to Reading List

    Source URL: cyberisks.ro

    Language: English - Date: 2014-10-10 03:40:58
    35War / Electronic warfare / Hacking / Military technology / Military science / Cyberterrorism / Cyber / Industrial espionage / Internet-related prefixes / Cyberwarfare / Computer crimes / Security

    The Cyber War Has Not Begun James Andrew Lewis Center for Strategic and International Studies March 2010 Expanded attention to cybersecurity is a good thing, but it seems that it is difficult to discuss this topic withou

    Add to Reading List

    Source URL: csis.org

    Language: English - Date: 2010-03-11 13:45:21
    36Electronic warfare / Hacking / Computer security / Advanced persistent threat / SCADA / Stuxnet / Malware / Operation Aurora / Computer crime / Cybercrime / Technology / Cyberwarfare

    ThetaRay_Logo_Options_Draft7

    Add to Reading List

    Source URL: www.thetaray.com

    Language: English - Date: 2014-12-06 20:04:03
    37Hacking / Military technology / Cyberwarfare / NATO / Cooperative Cyber Defence Centre of Excellence / Military / International relations / Electronic warfare

    INTERNATIONAL STAFF EMERGING SECURITY CHALLENGES SECRÉTARIAT INTERNATIONAL DÉFIS DE SÉCURITÉ ÉMERGENTS Cyber Threats to NATO and its Methodology for

    Add to Reading List

    Source URL: sverof.se

    Language: English - Date: 2013-12-16 06:29:22
    38Institutional investors / Electronic warfare / Military technology / Insurance / Economics / Protection and indemnity insurance / Cyberwarfare / Risk purchasing group / Types of insurance / Financial economics / Financial institutions

    SEAWORTHINESS AND CYBER SECURITY – THE HIDDEN THREAT TO SHIPPING INSURING CYBER IN THE MARITIME INDUSTRY 23 JULY 2014

    Add to Reading List

    Source URL: www.seasecurity.org

    Language: English - Date: 2014-07-24 03:54:18
    39Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

    Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

    Add to Reading List

    Source URL: www.westholland.cn

    Language: English - Date: 2015-03-31 09:09:36
    40Electronic warfare / Hacking / Military technology / Counter-intelligence / Military intelligence / Cyberwarfare / Counterintelligence / Adversary model / Computer security / Espionage / Security / Military science

    Microsoft Word - gosler.doc

    Add to Reading List

    Source URL: dnnpro.outer.jhuapl.edu

    Language: English - Date: 2012-09-27 16:53:20
    UPDATE