Filters








5,810 Hits in 12.0 sec

War-Algorithm Accountability [article]

Dustin A. Lewis, Gabriella Blum, Naz K. Modirzadeh
2016 arXiv   pre-print
We define war algorithm as any algorithm that is expressed in computer code, that is effectuated through a constructed system, and that is capable of operating in relation to armed conflict.  ...  In this briefing report, we introduce a new concept (war algorithms) that elevates algorithmically-derived choices and decisions to a, and perhaps the, central concern regarding technical autonomy in war  ...  systems.  ... 
arXiv:1609.04667v1 fatcat:ugm2getvhjdohjiu6en2xlfrfe

CFD simulation for the analysis of a contaminated environment with chemical war: influence of flow profiles and determination of risk areas over a reservoir for water distribution

Carlos Eduardo Santos Bonfim, José Carlos Costa da Silva Pinto, Willian Melo Poubel
2020 Brazilian Journal of Development  
Acknowledgment to the Chemical Engineering Section of the Military Engineering Institute for support during the Master's Degree and to the Chemical, Biological, Radiological and Nuclear Defense Institute  ...  for granting the use of ANSYS license.  ...  In Figures 7 and 8 below, we observe the well-defined vector trend of ammonia dispersion speed, going from the center to the ends on the fluid surface.  ... 
doi:10.34117/bjdv6n5-131 fatcat:6a7iajemwjfc7l7ivvtlafn4yu

Strategic Information Warfare: A New Face of War

Roger C. Molander, Andrew S. Riddile, Peter A. Wilson
1996 Parameters  
We live in an age that is driven by information. Technological breakthroughs . . . are changing the face of war and how we prepare for war."  ...  --William Perry, Secretary of Defense Information warfare (IW) represents a rapidly evolving and, as yet, imprecisely defined field of growing interest for defense planners and policy-makers.  ...  Some participants believed that the entry price to many of the IW attack options posited could be raised by denying easy access to networks and control systems through the exploitation of new software  ... 
doi:10.55540/0031-1723.1794 fatcat:4e5mwok4fvffvhbcrwaexhrobu

5. Supplying War [chapter]

2019 Empire's Labor  
The first is logistics space, which I define as the networked spaces of supply and support, including infrastructure, sites, equipment, information, and tech nologies that ensure the flow and maintenance  ...  largest surface logistics center in the country and home to nearly 5,000 contractors).  ... 
doi:10.7591/9781501716393-007 fatcat:xro3dbb6u5gxnc477rwuownp2a

Cyber War and Strategic Thought: Do the Classic Theorists Still Matter? [chapter]

Craig B. Greathouse
2013 Cyberspace and International Relations  
Warfare in the future will be different from warfare in the past, but are the classic theorists still viable capable of providing insight into the nature of war, conflict, and policy within the realm of  ...  The ideas of Clausewitz, Sun Tzu, Jomini, along with more modern theorists such as Douhet and Warden are applied to the ideas of cyber war.  ...  Massive Cyber Assault The last category in the typology is that of a massive cyber attack designed to destroy network and data systems across the entirety of an actor.  ... 
doi:10.1007/978-3-642-37481-4_2 fatcat:omyyp5pfwzbgxjlwfheftbddia

The Evolution οf War Conflicts. The Fourth Military Revolution (RMA) & Operational Applications

Nicholas Paounis
2020 HAPSc Policy Briefs Series  
At the heart of the new form taken by the phenomenon of war is the possibility of mass collection and utilization of information, in combination with the technological development of weapons systems.  ...  War, that is, the confluence of military forces, over the course of the Centuries, has differed in terms of Strategic Concept, in terms of Doctrine of Operations, and in terms of technological capabilities  ...  The objectives during a "Cyber War" are summarized as follows: Cyber defense: i) protection of deadly information systems and information from a hostile cyber attack, ii) silencing of hostile information  ... 
doi:10.12681/hapscpbs.26523 fatcat:f4zoqefpong3tlmiwn2nflnmxe

Design of an Intelligent Combat Robot for war fields

S Bhargavi, S.Manjunath
2011 International Journal of Advanced Computer Science and Applications  
The objective of this paper is to minimize human casualties in terrorist attack such as 26/11. The combat robot [1] has been designed to tackle such a cruel terror attacks.  ...  Since human life is always precious, these robots are the replacement of fighters against terrorist in war areas.  ...  The system program written in embedded C [11] using KEIL IDE software will be stored in Microcontroller.  ... 
doi:10.14569/ijacsa.2011.020813 fatcat:dzhfw735ifdrzhjcgxi5fbtwfq

All But War Is Simulation: The Military-Entertainment Complex

Timothy Lenoir
2000 Configurations  
"Not yet," she says, as she calls their home base systems administrator for software that uploads just in time.  ...  In a similar vein, one of Intel's 1999 ads for the Pentium II processor articulates the consumer's desire for ever-faster uploads, and ultimately for fusing the digital and the real.  ...  In addition to its work in the defense community, MÄK's software has been licensed for use by several entertainment firms, such as Total Entertainment Network and Zombie Virtual Reality Entertainment,  ... 
doi:10.1353/con.2000.0022 fatcat:625xpmxyqfhsxhuvua5ctixl3i

Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework [chapter]

Michael N. Schmitt
2011 Essays on Law and War at the Fault Lines  
the data needed, and completing and reviewing the collection of information.  ...  Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  For instance, the Defense Information Systems Agency (DISA) identified fifty-three attacks on military and DOD systems in 1992.  ... 
doi:10.1007/978-90-6704-740-1_1 fatcat:o2ayah7vrvgbnkwhtcj4m2yema

Study on Ai Performance and Possibilities for Future Wars

2020 Regular Issue  
The objective of study is to draw out lessons from AI applications and success achieved during pandemic spread for the application of AI in future wars.  ...  The recent outbreak of COVID 19 is comparable to outbreak of any other havoc on the mankind including war, due to similar characteristics of three Vs i.e. Velocity; Volume and Veracity.  ...  The US defense think tank Rand Corporation had warned in a study that the use of AI in military applications could give a rise to a nuclear war by 2040.  ... 
doi:10.35940/ijmh.l1087.105220 fatcat:h23znouybze3taxakleypo5hf4

War, Health and Ecosystem: Generative Metaphors in Cybersecurity Governance

Julia Slupska
2020 Philosophy & Technology  
We suggest that alternative metaphors-such as health, ecosystem, and architecturecan help expose the dominance of the war metaphor and provide a more collaborative and conceptually accurate frame for negotiations  ...  The discussion of global governance of cybersecurity problems has to date been dominated by the metaphor of 'cyber war'.  ...  Mariarosaria Taddeo, whose advice and feedback was invaluable to the completion of this project and who co-authoured an earlier version of this paper in the Yearbook of the Digital Ethics Lab 2019.  ... 
doi:10.1007/s13347-020-00397-5 fatcat:lhnvqde6m5btzll46amq7g6hba

Cities and the 'War on Terror'

STEPHEN GRAHAM
2006 International Journal of Urban and Regional Research  
The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes  ...  provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in  ...  into the manifold flows and processes of globalization.  ... 
doi:10.1111/j.1468-2427.2006.00665.x fatcat:bk47fefrcbbllau6idtfpuuiyq

War at the Background of Europe: The Crisis of Mali

Besenyő János
2018 Figshare  
In this paper I would like to clarify the reasons for the events taking place in the country, their dynamics and possible consequences.  ...  Fueled by the fear of a greater and bloodier conflict and its overspill, limited military operations began.  ...  3 We have introduced our criticism and discussed the opportunities to be exploited in our study.  ... 
doi:10.6084/m9.figshare.7015283.v1 fatcat:dcgz7gzczff6tnyse3gmu2dz6i

Same Water, Difference Dreams: Salient Lessons of the Sino-Japanese War for Future Naval Warfare

Andrew Rhodes
2020 MCU Journal  
American officers considering the role of the sea Services in a future war must understand the history and organizational culture of the Chinese military and consider how these factors shape the Chinese  ...  Careful consideration of the Sino-Japanese War can support two priority focus areas from the Commandant's Planning Guidance: "warfighting" and "education and training."  ...  China's increasingly hostile actions are made more complicated by its robust antiarea, access-denial network of surface-to-air, surface-to-surface, and antiship missile and sensor systems.  ... 
doi:10.21140/mcuj.20201102002 fatcat:i75a5j73pbd4vax543d74t2i6a

The Great War of Enclosure: Securing the Skies

Ian G.R. Shaw
2017 Antipode  
Such a reenchanted atmosphere collapses the geopolitical and geoeconomic in uncertain robotic orbits.  ...  Crucially, this discloses new morphologies and ontologies of urban (in)security, in which an atmospheric state polices deterritorialized aerial circulations.  ...  Additionally, I would like to acknowledge the support of the Economic and Social Research Council (ES/K009087/1) and the Urban Studies Foundation.  ... 
doi:10.1111/anti.12309 fatcat:feldxq72hfdslbsi5supjnx7ue
« Previous Showing results 1 — 15 out of 5,810 results