首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   

2.
在雷达情报处理系统中,大量采用串口通信方式传输雷达情报。雷达情报串口传输质量是雷达情报处理系统中需要考虑的问题。针对现状,探讨了三种检测和评估串口传输质量的方法即主动方式、被动方式和主被动结合方式,主被动结合检测与评估方法更适合应用于雷达情报处理系统。该方法结合物理层、数据链路层、报文层信息,从误码率、误帧/组率和错报率的角度进行分析,利用串口协议通信服务设备和报文产生器对雷达情报串口传输质量进行检测与评估,已成功应用于实际工程中,收到了较好的效果。  相似文献   

3.
Information Management (IM) – the systematic ordering, processing and channelling of information within organisations – forms a critical component of modern military command and control systems. As a subject of scholarly enquiry, however, the history of military IM has been relatively poorly served. Employing new and under-utilised archival sources, this article takes the British Expeditionary Force (BEF) of the First World War as its case study and assesses the extent to which its IM system contributed to the emergence of the modern battlefield in 1918. It argues that the demands of fighting a modern war resulted in a general, but not universal, improvement in the BEF’s IM techniques, which in turn laid the groundwork, albeit in embryonic form, for the IM systems of modern armies.  相似文献   

4.
基于规则的域间路由系统异常检测   总被引:2,自引:0,他引:2       下载免费PDF全文
随着Internet的爆炸性增长,域间路由系统变得越来越复杂并难以控制,许多与域间路由安全相关的事件广泛引起了人们的关注。提出一个基于规则的域间路由监测框架,其中的规则可分为常规异常检测规则和特殊异常检测规则,它们能有效用于检测异常路由和可能的攻击行为,这两种规则的不同在于特殊异常检测规则是由大量路由得到的Internet模型来定义。研究了Internet层次模型与ISP商业关系模型的构造,基于这个框架实现了一个原型系统———ISP-Health,最后给出了检测能力结果。  相似文献   

5.
战术互联网子网干扰效果评估   总被引:2,自引:0,他引:2  
目前对Ad hoc网络攻击的研究大多是针对网络各层协议弱点所设计,战术互联网通信设备运用了许多先进的抗干扰传输技术,协议攻击很难奏效,直接对战术互联网受扰后的网络性能评估很有必要。文章的主要工作是对战术互联网子网进行建模分析,通过设置节点接包时以概率出错来模拟节点受扰情况,分析受扰节点数、节点受扰程度不同时整个战术互联网子网的性能变化。  相似文献   

6.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   

7.
军事电子信息处理中的人工神经网络技术   总被引:2,自引:0,他引:2       下载免费PDF全文
本文首先分析了现代战场环境对军事电子系统智能信息处理的应用需求,然后对人工神经网络理论与技术在军事电子信息处理中的现实应用与潜在前景给出了一个较为详细的介绍与分析。着重介绍了神经网络在雷达、红外及声纳目标的检测、识别、多机动目标跟踪及武器系统的智能控制等方面的应用情况,力图展示神经网络用于军事电子信息处理的特色与优势。最后分析了人工神经网络技术发展与应用中存在的一些问题。  相似文献   

8.
This paper models the determination of the defence industrial base – the number of different military systems a country decides to maintain. High R&D costs means that few countries can afford to produce major weapons systems and the producers also import systems. Non‐producers rely on imports and we assume their demand is driven by regional arms races. Military capability is determined by the number of systems and the quantity and quality of each. We examine how the defence industrial base is influenced by military expenditures, R&D costs, export controls, the nature of regional arms races and a variety of other factors.  相似文献   

9.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   

10.
Conventional studies on the consequences of sanctions tend to focus on the target society as a whole without specifying how foreign economic pressures might affect the well-being of vulnerable groups within target countries – the same groups who often disproportionately bear the burden of sanctions. This study explores the extent to which sanctions increase the likelihood of discriminatory government practices against one of the globally most vulnerable groups, ethnic groups. It is argued that sanctions contribute to the rise of official ethnic-based economic and political discrimination through contracting the economy and creating incentives for the target government to employ ethnic-based discriminatory policies. Using data on over 900 ethnic groups from 1950 to 2003, the results lend support for the theoretical claim that sanctions prompt the government to pursue ethnic-based discriminatory economic and political practices in multiethnic countries. The findings also indicate that multilateral sanctions are likely to be more harmful to the well-being of ethnic groups than sanctions levied by individual countries. Further, the negative effect of comprehensive sanctions appears to be greater than that of sanctions with moderate and limited impact on the target economy. The regime type of the target state, on the other hand, appears to have a significant role only in conditioning the hypothesized effect of sanctions on economic discrimination. Overall, this study’s focus on a vulnerable segment of the target society – ethnic groups – offers a greater understanding of the consequences of sanctions. It also provides additional insight as to how, in multiethnic countries, political elites might domestically respond to external pressures to retain power.  相似文献   

11.
量子技术与传统技术相结合以提升经典系统性能是近年来电子信息、计算机技术等众多科学领域研究热点。由于隐身和电子对抗技术的进步和日益成熟,雷达作为一类典型的电子信息系统,其目标探测受到了越来越多的挑战。从雷达目标探测角度出发,介绍了量子雷达的基本概念与分类、若干实现模型,重点剖析、归纳了量子纠缠等量子效应增强雷达目标探测性能的物理机理与研究现状,指出了量子雷达研究和实现中的关键技术与研究方向。  相似文献   

12.
Person-borne improvised explosive devices (PBIEDs) are often used in terrorist attacks in Western countries. This study aims to predict the trajectories of PBIED fragments and the subsequent safety risks for people exposed to this hazard. An explosive field test with a typical PBIED composed of a plastic explosive charge and steel nut enhancements was performed to record initial fragment behaviour, including positions, velocity, and trajectory angles. These data were used to predict the full trajectory of PBIED fragments using a probabilistic analysis. In the probabilistic analyses a probability of fatality or serious injury was computed. Based on the results presented, many practical conclusions can be drawn, for instance, regarding safe evacuation distances if a person were exposed to a suspected PBIED.  相似文献   

13.
The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns – non-randomness – in the time-series of terrorist incidents.  相似文献   

14.
Why are some countries prone to ethno-nationalist conflict, whereas others are plagued by class conflict? This is a question that has seldom been raised and rarely been examined empirically. This paper presents a social-structural theory to account for the variable incidence of these two forms of political instability. These two types of conflict result from distinct principles of group solidarity – ethnicity and class – and since each individual is simultaneously a member of an ethnic group (or many such groups) and a particular class, these two principles vary in the degree to which they are mutually exclusive or cross-cutting. The degree of economic stratification between groups and economic segmentation within them shapes the relative salience of each principle of group solidarity in any society and is associated with a characteristic form of political mobilization. In places where between-group inequalities are high, and within-group inequalities low, ethnicity should be the dominant principle of group solidarity and serve as the primary basis of group conflict. By contrast, in countries where between-group inequalities are low, and within-group inequalities high, class is more likely to serve as the dominant principle of group solidarity, and conflicts along class lines are more likely. We test these conjectures with data in over 100 countries on cross-cutting cleavages, ethnic war, and class conflict. The results are supportive of the theory, and provide evidence that how groups are stratified and segmented in societies shapes the type of civil war.  相似文献   

15.
In recent years, South Africa has come to be used by international terrorists as a safe house, for paramilitary training purposes, as a base from which to plan attacks on other countries and as a conduit for financial transactions. South Africa's own counter-terrorism initiatives have been labelled ‘reactive’ by analysts. Indeed, the existing counter-terrorism regime suffers from a lack of political will to issues of corruption and ineptitude bedevilling the security apparatus of the state. However, using lessons learned from other countries, Pretoria can yet turn the tide against international terrorism by adopting more pro-active measures and by undertaking steps aimed at the depoliticisation and decriminalisation of the security forces.  相似文献   

16.
在制冷空调系统中采用电子膨胀阀(EXV)代替传统的热力膨胀阀后,为各种调节控制技术的应用提供了广阔的前景.作者介绍了模糊控制器的设计及在制冷空调系统中的应用前景,并通过Matlab工具包中的Simulink软件进行模拟仿真,验证了模糊控制器的控制特性.  相似文献   

17.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   

18.
唐苏妍  祁永强  裴飞 《国防科技》2017,38(2):049-054
信息攻防作战力量既可以独立成军成战,又可以和各军兵种、各种武器平台无缝衔接、联合协同,以发挥无限的战争潜力,是以信息攻防新技术为支撑、以软硬打击新能力为标志的新型作战力量。从核心信息基础设施建设,信息攻击和防护能力建设以及信息攻防协同作战三个方面论述了信息攻防新型作战力量建设的重要问题及战法对策,对信息攻防作战的特点规律和技术手段进行了剖析。  相似文献   

19.
This paper develops and illustrates an approximate approach for analytically assessing the impacts on both costs and service of consolidation of repair facilities. The repair facilities are two echelon generalizations of the classical repairmen problem in which two types of failures, say major and minor, can occur, each type requiring repair at a different echelon: The questions addressed are the reductions possible in spares, repairmen, and service rates due to the consolidated system's increased efficiency, as well as the physical separation between the users and the consolidated repair facility that is economical. The method of analysis is based upon asymptotic approximations developed for the repairmen problem, valid when the number of operational equipments is large (greater than 50); it is helpful since it provides a tractable means for predicting the steady-state performance of the decentralized and consolidated installations as a function of the many parameters involved without having to resort to an exhaustive computation of all the exact steady-state probabilities.  相似文献   

20.
低慢小无人机具有小型化、红外与雷达暴露征候小、飞行高度低、飞行轨迹不定以及购买使用几乎无门槛等特征,给当前全球军事区域和军事行动安全带来了新的挑战。本文首先分析了世界主要国家对低慢小无人机的界定、国内外管控情况和相关威胁事件;然后,从低慢小无人机的侦察袭击能力、军事区域现有安防措施和低慢小无人机对军事区域进行侦察的相关案例入手,讨论了低慢小无人机对军事区域的侦察袭击的威胁;最后从政策制度、营区部署与隐蔽伪装以及反制措施配置三方面对军事区域防低慢小无人机侦察袭击的手段与措施进行了分析和研究,重点就机动性、经济性、技术难度、可操作性、反应速度、打击效果、能否对抗集群目标以及适用场合等方面对当前各种反无人机的干扰、驱离、毁坏措施进行了对比。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号