|
|
|
Won Shin, Da-Sol Kim and Hyunsuk Ko
In submarine warfare systems, passive SONAR is commonly used to detect enemy targets while concealing one?s own submarine. The bearing information of a target obtained from passive SONAR can be accumulated over time and visually represented as a two-dime...
ver más
|
|
|
|
|
|
|
Sanaa Kaddoura, Ramzi A. Haraty, Karam Al Kontar and Omar Alfandi
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attack...
ver más
|
|
|
|
|
|
|
Rose Frii-Manyi Anjoh,Adolf Ngundu Lyonga
Pág. 126 - 140
The pursuit to control the villages of Upper Bakweri Land (UBL) by the villages of Soppo Mokongo (Great Soppo) and Gbea (Buea Town) led to a series of wars which erupted in the area between 1880 and 1939. The desire for domination resulted to the formati...
ver más
|
|
|
|
|
|
|
Alexander Kosenkov
In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its ele...
ver más
|
|
|
|
|
|
|
Kathryn Merrick, Medria Hardhienata, Kamran Shafi and Jiankun Hu
Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics...
ver más
|
|
|
|
|
|
|
Bill Hutchinson,Mat Warren
Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven ...
ver más
|
|
|
|
|
|
|
M.J. Warren,W. Hutchinson
This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare ...
ver más
|
|
|
|