Filters








598 Hits in 8.2 sec

Information Technology Security Threats to Modern e-Enabled Aircraft: A Cautionary Note

Marko Wolf, Moritz Minzlaff, Martin Moser
2014 Journal of Aerospace Information Systems  
In addition, increasing digitalization, connectivity, and similar developments of modern ("e-enabled") aircraft are shown to cause an ever larger attack surface.  ...  In particular, it adds the following contributions: It assesses the current state of public research on aircraft IT security and contrasts it with an evaluation of the threat-level through a discussion  ...  Based on this analysis, we discuss in Section 5 open challenges that have to be addressed to ensure the information security of modern e-enabled aircraft and to minimize the risks due to security vulnerabilities  ... 
doi:10.2514/1.i010156 fatcat:3fdft4lkczdcpoidtp243cbfyy

European activities in civil applications of drones: an overview of remotely piloted aircraft systems (RPAS)

Reiner Creutzburg, Sos S. Agaian, Sabah A. Jassim, Eliza Y. Du
2015 Mobile Multimedia/Image Processing, Security, and Applications 2015  
E-CIT is concerned with the empowerment of citizens' rights with reference to emerging information and communication technologies (ICTs) .  ...  Frost and Sullivan, 2007) . drones is assumed to be recognized by citizens, but this is seen as a threat to public acceptance of the technology.  ... 
doi:10.1117/12.2177979 fatcat:uh4f25bzlfecnl57xdejbryysq

Command of the Commons: The Military Foundation of U.S. Hegemony

Barry R. Posen
2003 International Security  
recommended a policy of "primacy"-essentially hegemony-to consolidate, exploit, and expand the U.S. relative advantage have carried the day against those who argued for a more restrained U.S. foreign  ...  Those who hypothesized a long "unipolar moment" of extraordinary U.S. relative power have proven more prescient than those who expected the relatively quick emergence of a multipolar world. 1 Those who  ...  Fifth Fleet, declared, "Iran now poses a threat to navigation and aircraft ºying over the Gulf."  ... 
doi:10.1162/016228803322427965 fatcat:7mbn2tfaevg47di2e3w7i6o34u

Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations

Jon R Lindsay
2013 Journal of Strategic Studies  
agility also encourages pathologies of both bureaucracies and bazaars. 33 RMA thinking owes a clear debt to modern airpower theory: John A.  ...  By and large for the US in these domains, target identification and tracking is reliable, and networks enable far-flung forces to communicate and self-organize against threats.  ... 
doi:10.1080/01402390.2012.734252 fatcat:ij2hjycpevbqviisjntfhth6mi

Same Water, Difference Dreams: Salient Lessons of the Sino-Japanese War for Future Naval Warfare

Andrew Rhodes
2020 MCU Journal  
The Sino-Japanese War of 1894–95 remains a cautionary tale full of salient lessons for future conflict.  ...  approach to naval strategy and operations.  ...  Modern military technology that is required to compete with a technologically advanced peer is expensive.  ... 
doi:10.21140/mcuj.20201102002 fatcat:i75a5j73pbd4vax543d74t2i6a

The Impact of China on Cybersecurity: Fiction and Friction

Jon R. Lindsay
2015 International Security  
Nevertheless, the economically driven proliferation of information technology enables numerous instances of friction to emerge below the threshold of violence.  ...  David E. Sanger and Nicole Perlroth, "N.S.A. Breached Chinese Servers Seen as Security Threat," New York Times, March 22, 2014.  ... 
doi:10.1162/isec_a_00189 fatcat:uvxkwlblwrgojbvh5dnwbkofw4

The Security Imaginary: Explaining Military Isomorphism

Joelien Pretorius
2008 Security Dialogue  
to constitute a society's security imaginary.  ...  This article proposes the notion of a security imaginary as a heuristic tool for exploring military isomorphism (the phenomenon that weapons and military strategies begin to look the same across the world  ...  Introduction S INCE THE GULF WAR of 1990-91, the USA has showcased a model for military modernization in the information era.  ... 
doi:10.1177/0967010607086825 fatcat:sn4iaqk6uvhvxaqli7tk6b7nvm

The British Superpower, Irregular Warfare, and Military Honor

T.J. Linzy
2018 MCU Journal  
To that end, MCUP launched the Marine Corps University Journal (MCU Journal) in 2010 to provide a forum for interdisciplinary discussion of national security and international relations issues and how  ...  To submit an article or to learn more about our submission guidelines, please email MCU_Press@usmcu.edu. BOOK REVIEWS Send an email with a brief description of your interests to MCU_Press@usmcu.edu.  ...  To overcome these obstacles, NATO has developed a malware information sharing platform (MISP), which enables certain companies as well as the European Union (EU) to exchange information with NATO in a  ... 
doi:10.21140/mcuj.2018090203 fatcat:u7vmp3qei5hahcjbhozat7muza

Book Reviews

USAWC Press
2021 Parameters  
Humire, executive director of the Center for a Secure Free Society, discusses his past association with Manwaring and the need to change our thinking about how to approach modern warfare given its increasingly  ...  As David Kilcullen notes, urban operations are here to stay.  ...  Originally established in 1956 to provide small unit direct action and unconventional warfare capabilities during a Soviet invasion, Detachment A adopted a counterterrorism role in the 1970s as the threat  ... 
doi:10.55540/0031-1723.3085 fatcat:epxtc4lhenezzkxrirvvcym63q

The Rise and Fall of the Great Powers in the Twenty-first Century: China's Rise and the Fate of America's Global Position

Stephen G. Brooks, William C. Wohlforth
2016 International Security  
In recent years, however, the concept has been more likely to serve a rather different purpose: to gauge change in today's international system.  ...  origins lie in a major academic literature devoted to explaining large-scale patterns of behavior in international systems.  ...  Chase, "Information Technology and China's Naval Modernization" Joint Forces Quarterly, Vol. 50, No. 3 (2008), pp. 24-30.  ... 
doi:10.1162/isec_a_00225 fatcat:jzg475zszvazlhhv7ozredzoiy

Book Reviews

Parameters Editors
1999 Parameters  
of people and machines to take and hold land," and "the modernists who see war moving away from a fixed battlefield into a location that has come to be called cyberspace."  ...  To some extent, this is shaped by service. "While the Navy and Air Force are competing for Information Age roles and missions," Adams writes, "the Army continues to focus on traditional war."  ...  If information warfare is the major threat to American security in the future, might it make sense to craft some radically new organization to deal with it?  ... 
doi:10.55540/0031-1723.1925 fatcat:jusfjtwzvbcqlb6hnjwxquq7om

Reliability Inversion: A Cautionary Tale

Behrooz Parhami
2020 Computer  
Blockchain-enabled features Below is a list of features that blockchain technology helps to improve.  ...  The other threat will be around information operations.  ...  This scholarship was created in honor of the late Richard E. Merwin, a past president of the CS, to recognize and reward student leadership.  ... 
doi:10.1109/mc.2019.2958907 fatcat:xcaxq7gocbfy5iyv2ne7d6nwlu

War-Algorithm Accountability [article]

Dustin A. Lewis, Gabriella Blum, Naz K. Modirzadeh
2016 arXiv   pre-print
In introducing this concept, our foundational technological concern is the capability of a constructed system, without further human intervention, to help make and effectuate a decision or choice of a  ...  Through that lens, we link international law and related accountability architectures to relevant technologies.  ...  May 2016), and at the Berkman Klein Center for Internet and Society of Harvard University, Cambridge (July 2016) for critical feedback and comments; and Peter Krafft, Claudia Pérez D'Arpino, and Merel A.  ... 
arXiv:1609.04667v1 fatcat:ugm2getvhjdohjiu6en2xlfrfe

Restructuring the multilateral export control regime system

D. H. Joyner
2004 Journal of Conflict and Security Law  
that have contributed to the current unwillingness of regime members to institute programmes of reform within the regimes.  ...  This article identifies a current disharmony arising from increased expectations for the effectiveness and scope of the multilateral non-proliferation export control regime system, coupled with the reality  ...  materials and technology by states of concern, and other emerging threats to international security.  ... 
doi:10.1093/jcsl/9.2.181 fatcat:amifqttzhzhorncnpd7qzzk6vy

From Chancellorsville to Kosovo, Forgetting the Art of War

Vincent J. Goulding
2000 Parameters  
That said, Jackson's campaign in the Shenandoah Valley paid much greater dividends for the Confederacy than Robert E. Lee's "greatest battle" a year later. There is a reason for that.  ...  Jackson was also fortunate enough to be blessed with superiors willing to accept transitory tactical reverses if they contributed to the accomplishment of strategic ends. Robert E.  ...  to his cautionary advice.  ... 
doi:10.55540/0031-1723.1977 fatcat:a6s36tsti5fe7mcyvui23llknu
« Previous Showing results 1 — 15 out of 598 results