排序方式: 共有44条查询结果,搜索用时 15 毫秒
1.
Kenton G. Fasana 《Defence Studies》2018,18(2):167-187
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations. 相似文献
2.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability. 相似文献
3.
4.
在频率为1010以下的情况下,给出了由正弦交变电流引起的二维时变电磁场所对应的偏微分方程,并用非线性算子半群理论及单调算子理论证明了相应偏微分方程第一边值初值问题广义解的存在与唯一性. 相似文献
5.
6.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. 相似文献
7.
介绍了存储示波器在核爆炸电磁脉冲测量中的应用,给出了系统框图,用计算机作FFT运算,实现频谱分析. 相似文献
8.
Jian-hao Dou Xin Jia Zheng-xiang Huang Xiao-hui Gu Ying-min Zheng Bin Ma Qiang-qiang Xiao 《防务技术》2021,17(3):846-858
The use of a shaped liner driven by electromagnetic force is a new means of forming jets. To study the mechanism of jet formation driven by electromagnetic force, we considered the current skin effect and the characteristics of electromagnetic loading and established a coupling model of"Electric—Magnetic—Force"and the theoretical model of jet formation under electromagnetic force. The jet formation and penetration of conical and trumpet liners have been calculated. Then, a numerical simulation of liner collapse under electromagnetic force, jet generation, and the stretching motion were performed using an ANSYS multiphysics processor. The calculated jet velocity, jet shape, and depth of penetration were consistent with the experimental results, with a relative error of less than 10%. In addition, we calculated the jet formation of different curvature trumpet liners driven by the same loading condition and ob-tained the influence rule of the curvature of the liner on jet formation. Results show that the theoretical model and the ANSYS multiphysics numerical method can effectively calculate the jet formation of liners driven by electromagnetic force, and in a certain range, the greater the curvature of the liner is, the greater the jet velocity is. 相似文献
9.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献
10.
Timothy J. Junio 《战略研究杂志》2013,36(1):125-133
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed. 相似文献