首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
  国内免费   1篇
  2021年   1篇
  2015年   1篇
  2013年   1篇
  2012年   1篇
排序方式: 共有4条查询结果,搜索用时 15 毫秒
1
1.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
2.
Jihadist violence is typically associated with being particularly indiscriminate. Often, as in variations of the ‘new terrorism’ thesis, this characteristic is proposed to correspond in some way to its other attributes such as its globalised, decentralised and ‘postmodern’ religious nature. Recent work appears to give more substance to such claims, by claiming to show a relationship between indiscriminate violence and decentralised group organisation. However, in this paper we show, based on an analysis of jihadist targeting in Western Europe and America from 2001 to 2013, that targeting choices by jihadists unconnected to organised militant groups have in fact been consistently more, rather than less discriminate in their targeting choices than their better-integrated peers. Drawing on this finding, as well as a broader reading of jihadist targeting discourses, we argue for a more complex understanding of the relationship between radicalisation, extremist ideology, decentralisation, and targeting choice.  相似文献   
3.
以编队对地攻击为背景,对网络瞄准下武器网络化制导决策方法展开了研究。首先给出了制导通路的概念并分析了网络瞄准(Networked Targeting,NT)下网络化制导过程的特点;然后设计了构建制导通路的算法,从制导误差的影响因素出发,分析了影响制导通路性能的因素,并根据制导通路中各编队的对地攻击能力与制导时长建立了通路优选模型;最后从任务机组指挥员的角度设计了网络化制导的动态执行过程,并对算法和模型进行了仿真验证。  相似文献   
4.
Book Reviews     
The purpose of this article is to analyse British strategic nuclear targeting between 1974 and 1979, prior to the successful completion of the sophisticated modification to Polaris submarine-missile system codenamed Chevaline. It will use as its starting point the parameters for UK strategic nuclear targeting, and the foundation of the ‘Moscow Criterion’, prior to the deployment of Britain's Polaris submarines which began in 1968. It will then discuss the recommendation by the Chiefs of Staff to retarget Polaris in 1975/76 and the implications of that recommendation in terms of the British approach to strategic nuclear deterrence. The article will conclude with an assessment of these retargeting decisions on the decision to replace Polaris with the US Trident system in 1980.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号