Auswahl der wissenschaftlichen Literatur zum Thema „Digital weapon“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Digital weapon" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Digital weapon"
Czosseck, Christian, und Karlis Podins. „A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict“. International Journal of Cyber Warfare and Terrorism 2, Nr. 1 (Januar 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Der volle Inhalt der QuelleKim, Eungsu, und Kiyeol Ryu. „Design for Weapon Live Test Decision Support System Using Digital Twin Architecture“. Journal of the Korea Institute of Military Science and Technology 25, Nr. 5 (05.10.2022): 501–12. http://dx.doi.org/10.9766/kimst.2022.25.5.501.
Der volle Inhalt der QuelleKim, Gakgyu, Kangkyun Jin, Yongju Cho und Kyoungchan Won. „Initial operational capability of future weapon systems and field test method using digital twin“. Journal of Advances in Military Studies 5, Nr. 3 (31.12.2022): 1–22. http://dx.doi.org/10.37944/jams.v5i3.167.
Der volle Inhalt der QuellePuchnin, Aleksandr, und Pavel Minenko. „Digital crime weapons of the XXI century: object, means, tools“. Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, Nr. 3 (03.10.2022): 111–17. http://dx.doi.org/10.35750/2071-8284-2022-3-111-117.
Der volle Inhalt der QuelleCHEN, Jie, Hao FANG, Bin XIN und Fang DENG. „Modeling, Optimization and Control in Ground-based Digital Weapon Systems“. Acta Automatica Sinica 39, Nr. 7 (25.03.2014): 943–62. http://dx.doi.org/10.3724/sp.j.1004.2013.00943.
Der volle Inhalt der QuelleMathew, Dr Alex, und Hannah Alex. „Cyberbiosecurity as the Foremost Biological Weapon to the Digital World“. International Research Journal of Innovations in Engineering and Technology 06, Nr. 02 (2022): 75–79. http://dx.doi.org/10.47001/irjiet/2022.602013.
Der volle Inhalt der QuelleBadarna, Ibrahim, und Anat Gesser-Edelsburg. „Exploring the Link between Masculine Perceptions, Violence, Social Media Influence, and Weapon Carrying and Use: A Qualitative Inquiry into Arab Adolescent Boys and Young Men in Israel“. Social Sciences 13, Nr. 3 (13.03.2024): 165. http://dx.doi.org/10.3390/socsci13030165.
Der volle Inhalt der QuelleChatterjee, Tirthankar, Debojyoti Bhattacharyya, Deepti Majumdar und Madhusudan Pal. „Ergonomic Assessment of Multi Calibre Individual Weapon System in Virtual Reality Platform“. Defence Science Journal 69, Nr. 3 (30.04.2019): 240–48. http://dx.doi.org/10.14429/dsj.69.14426.
Der volle Inhalt der QuelleSundiev, Igor’ Yu, und Andrey B. Frolov. „Organizational and Digital Network Means of Terminal Destruction of Social Development“. Economic Strategies 144, Nr. 3 (25.06.2021): 58–69. http://dx.doi.org/10.33917/es-3.177.2021.58-69.
Der volle Inhalt der QuellePristiyono, Pristiyono, Juliana Juliana und Yudi Prayoga. „MEASURING CUSTOMER TRUST THROUGH DIGITAL TRANSFORMATION OF BANKING AS A COMPETITIVE ADVANTAGE“. Jurnal Ekonomi Bisnis dan Kewirausahaan 11, Nr. 2 (31.08.2022): 214. http://dx.doi.org/10.26418/jebik.v11i2.51986.
Der volle Inhalt der QuelleDissertationen zum Thema "Digital weapon"
Setterberg, Petter. „Designing a Game Weapon : Start to Finish“. Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-22548.
Der volle Inhalt der QuelleChabaud, Laurent. „L'arme numérique : essai sur la dématérialisation des infractions pénales“. Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMOND043.
Der volle Inhalt der QuelleThe development of the Internet, and of digital technology in general, has facilitated the commission of a large number of offences, and has made its entry into most branches of criminal law. However, there is still one branch of criminal law where digital technology has not made its entry: offences against the physical integrity of the person. Doesn't this logical rejection raise questions? The development of objects connected to the Internet means that such attacks are becoming a reality. The possibility of such attacks must therefore be incorporated into the Penal Code. The first part of this paper proposes to explore this possibility by bringing together the notions of weapon and digital to create the notion of digital weapon. Although these notions may seem antinomic, they are in fact relatively close. Their integration into the penal code shows that they obey the same mechanism: sanctioning the use of a particular tool - a weapon or a digital device - to commit an offence. We therefore propose a paradigm shift in the analysis of the weapon to bring these notions closer together. This re-theorization of the weapon around its function, which we call the mode of perpetration, enables us to take better account of the dematerialization of offences. The second part sets out to extend the regime of the "mode of perpetration" weapon to include the digital weapon, thereby strengthening the economic efficiency of the law in the fight against cybercrime. In particular, this allows us to take a global approach to cybercrime, favoring proactive rather than merely reactive analysis
Bowen, James M. „Physicochemical characterization of discrete weapons grade plutonium metal particles originating from the 1960 BOMARC incident“. University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1384850163.
Der volle Inhalt der QuelleShen, Teng-Yue, und 沈騰岳. „Air Defense Digital Battlefield and Weapon-Target Assignment Problem Research“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36275011311297653968.
Der volle Inhalt der Quelle國防大學理工學院
資訊工程碩士班
102
This thesis aims to address the several problems in a distributed Joint Missile Defense System (JMDS) which includes weapon-target-assignment (WTA), dynamic simulation, distributed architecture, and the communication between firepowers and radars. We propose an objective function which pursues Facilities Protection Benefit (FPB), Intercept Benefit (IB) and Cost Benefit (CB). Also, we utilize improved rule-based greedy algorithm to complete WTA. For dynamic simulation, we apply Google Map to be a simulated battlefield and simulate some scenarios which could encounter in the real situations. We build a distributed architecture of the JFDS to simulate military operation units located at different place in battleground. These operation units can communicate each other. Through the technique of web-page, we can watch the process of engagement and review the result visually and intuitively so that commander can understand the quality of weapon-target-assignment result. At the simulation experiment, we design a scenario and record the result which includes the average quantity of our facility, the average execution time of the weapon-target-assignment, the average cost of firepower consumption, and the average percentage of target devastation. Regard to the experiment result, we can prove that it is better solution to solve WTA problem through the improved algorithm which we propose. At the same time, we also record the average utilization rate of firepower under the different algorithms. We can prove that it is better to enhance the utilization rate of all our deployed firepowers under the improved rule-based greedy algorithm. The better but high-cost firepower won’t be the first choice; instead, the others which equip middle-or-low level can also be exploited well. Finally, we can utilize the simulated result for deploying firepowers and adjusting position and quantity to find the best airspace defense management strategy.
Bücher zum Thema "Digital weapon"
Dunnigan, James F. Digital Soldiers: The Evolution of High-tech Weaponry and Tomorrow's Brave New Battlefield. New York: St. Martin's Press, 1996.
Den vollen Inhalt der Quelle findenAutotestcon, 2000 (36th 2000 Anaheim California). 2000 IEEE Autotestcon proceedings: Autotestcon 2000 : IEEE Systems Readiness Technology Conference : Future sustainment for military and aerospace : September 18-21, 2000, Disneyland Hotel, Anaheim, California. Piscataway, New Jersey: IEEE, 2000.
Den vollen Inhalt der Quelle findenAutotestcon '99 (35th 1999 San Antonio, Tex.). 1999 IEEE Autotestcon proceedings: Autotestcon '99 : IEEE Systems Readiness Technology Conference : Test technology for the new millennium : August 30-September 2, 1999. Piscataway, New Jersey: IEEE, 1999.
Den vollen Inhalt der Quelle findenAutotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. Piscataway, N.J: IEEE, 2001.
Den vollen Inhalt der Quelle findenAutotestcon (38th 2002 Huntsville, Ala.). 2002 IEEE Autotestcon proceedings: [IEEE] Systems Readiness Technology Conference : The new Millennium challenge--transforming test : [October 16-17, 2002], Huntsville, Alabama. Piscataway, New Jersey: IEEE, 2002.
Den vollen Inhalt der Quelle finden(2005), Anmin Chŏngchʻaek Pʻorŏm. Hanʼguk hyŏndaesa: Chinsil kwa haesŏk. Kyŏnggi-do Pʻaju-si: Nanam Chʻulpʻan, 2005.
Den vollen Inhalt der Quelle findenZetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishing Group, 2015.
Den vollen Inhalt der Quelle findenZetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown, 2014.
Den vollen Inhalt der Quelle findenGalliott, Jai, Duncan MacIntosh und Jens David Ohlin, Hrsg. Lethal Autonomous Weapons. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197546048.001.0001.
Der volle Inhalt der QuelleDunnigan, James F. Digital Soldiers. St. Martin's Press, 2001.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Digital weapon"
Hüsing, Zita. „Hacking as a Weapon“. In Regimes of Capital in the Post-Digital Age, 126–39. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003372578-11.
Der volle Inhalt der QuelleChaturvedi, Saumya, Vandana, Stuti Sharma und Anshika. „Digital Knowledge Ecosystem: A New Weapon to Achieve Sustainable Food Waste Management“. In Sustainable Food Waste Management, 403–13. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8967-6_22.
Der volle Inhalt der QuelleIneneji, Collins, und Mehmet Kusaf. „Weapon Detection Using Radar Cross Section (RCS) and Resnet50 Towards Improved Decision Accuracy“. In Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 749–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_87.
Der volle Inhalt der QuelleGlenny, Misha. „The Digital Revolution in a Historical Perspective“. In Introduction to Digital Humanism, 47–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_4.
Der volle Inhalt der QuelleTucker, Aaron. „The Soldier Interfaces on the Digitally Augmented Battlefield“. In Virtual Weaponry, 69–105. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60198-4_3.
Der volle Inhalt der QuelleTamburrini, Guglielmo. „Artificial Intelligence and Large-Scale Threats to Humanity“. In Introduction to Digital Humanism, 241–54. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_16.
Der volle Inhalt der QuelleTaddeo, Mariarosaria, und Alexander Blanchard. „A Comparative Analysis of the Definitions of Autonomous Weapons“. In The 2022 Yearbook of the Digital Governance Research Group, 57–79. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_6.
Der volle Inhalt der QuelleHughes, Andrew. „Weapons of Mass Consumption: Social and Digital Media in Political Campaigns“. In Market Driven Political Advertising, 61–78. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77730-6_4.
Der volle Inhalt der QuelleKendzierskyj, Stefan, und Hamid Jahankhani. „Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age“. In Advanced Sciences and Technologies for Security Applications, 3–21. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_1.
Der volle Inhalt der QuelleJaffe, Joshua. „Cyber Weapons and the Fifth Domain: Implications of Cyber Conflict on International Relations“. In The 2022 Yearbook of the Digital Governance Research Group, 51–56. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_5.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Digital weapon"
CARUSO, PAMELA, und ERIC SCHACHT. „Kinetic Energy Weapon Digital Emulation Center“. In Aerospace Design Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1992. http://dx.doi.org/10.2514/6.1992-1071.
Der volle Inhalt der QuelleMcCormick, Kirsten, Andy Cullington und Kirstin Rouse. „Artificial intelligence to assist weapon package selection for airborne weapon delivery“. In Open Architecture/Open Business Model, Digital Engineering, Agile Software and Autonomy for the Internet of Military Things (IoMT) 2023, herausgegeben von Raja Suresh. SPIE, 2023. http://dx.doi.org/10.1117/12.2659631.
Der volle Inhalt der QuelleHamada, Mohamed Yousef. „Digital Thread and the Impact on Weapon System Acquisition Cost Growth“. In AeroTech® Digital Summit. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2021. http://dx.doi.org/10.4271/2021-01-0026.
Der volle Inhalt der QuelleVasalos, Averkios, Nikolaos Uzunoglu, Heung-Gyoon Ryu und Ioannis Vasalos. „Neural network target classification for Concealed Weapon radar detection“. In 2013 18th International Conference on Digital Signal Processing (DSP). IEEE, 2013. http://dx.doi.org/10.1109/icdsp.2013.6622819.
Der volle Inhalt der QuelleYoon, Kun Su, Jae Hyun Park, In Gyu Kim und Kwang Su Ryu. „New modeling algorithm for improving accuracy of weapon launch acceptability region“. In 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655454.
Der volle Inhalt der QuelleMa, Weijuan, Yuan Zhang, Jixin Duan, Baizhan Yang und Jianhua Huo. „Design of General and Digital Simulation Software for Close-In Weapon System“. In 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5677170.
Der volle Inhalt der QuelleWELTER, JAMES, und GEOFFREY BUTLER. „Multimedia digital database innovations and application to the analysis of weapon effects and performance“. In Flight Simulation and Technologies. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-3592.
Der volle Inhalt der QuelleKhichi, Manish, und Rajesh Kumar Yadav. „A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods“. In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9580031.
Der volle Inhalt der QuelleSchmidt, Timothy. „Lichten Award Paper: Automated Optical Rotor Blade Tip Clearance Tracking Using Artificial Intelligence Algorithms“. In Vertical Flight Society 78th Annual Forum & Technology Display. The Vertical Flight Society, 2022. http://dx.doi.org/10.4050/f-0078-2022-17633.
Der volle Inhalt der QuelleG., Harold, Branden Sletteland und Max Taylor. „Future Vertical Lift Digital Backbone, Navigating Technology and Implementation Details“. In Vertical Flight Society 76th Annual Forum & Technology Display. The Vertical Flight Society, 2020. http://dx.doi.org/10.4050/f-0076-2020-16431.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Digital weapon"
Caruso, Pamela W., und Eric N. Schacht. Kinetic Energy Weapon Digital Emulation Center. Fort Belvoir, VA: Defense Technical Information Center, Februar 1992. http://dx.doi.org/10.21236/ada346441.
Der volle Inhalt der QuelleDowns, Lawrence G., und Jr. Digital Data Warfare Using Malicious Computer Code as a Weapon. Fort Belvoir, VA: Defense Technical Information Center, April 1995. http://dx.doi.org/10.21236/ada424872.
Der volle Inhalt der QuellePinchuk, O. P., und A. A. Prokopenko. Model of a computer-orient-ed methodological system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of qualification improvement. Національна академія Державної прикордонної служби України імені Б. Хмельницького, 2023. http://dx.doi.org/10.33407/lib.naes.736836.
Der volle Inhalt der Quelle