Academic literature on the topic 'Warfare'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Warfare.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Warfare"

1

Tursyn, Alisher, and Aigerim Turuntaeva. "Hybrid warfare and the challenge to international law." Eurasian Science Review An International peer-reviewed multidisciplinary journal 2, no. 5 (May 3, 2024): 10–19. http://dx.doi.org/10.63034/esr-92.

Full text
Abstract:
This article explores the complex landscape of hybrid warfare, a multifaceted conflict strategy blending conventional military tactics with cyberattacks, information warfare, and economic coercion. It examines the challenges hybrid warfare poses to international law, the difficulties in establishing legal definitions, and the strategic responses by major powers including Russia, the United States, and China. The discussion extends to the adaptation of national and international strategies to address the gray zones of conflict that hybrid warfare exploits. Emphasizing the need for innovative legal frameworks and international cooperation, the article highlights hybrid warfare’s impact on global security dynamics and the evolving nature of warfare in the digital age.
APA, Harvard, Vancouver, ISO, and other styles
2

Rautenbach, Peter. "The Subtle Knife." Journal of Intelligence, Conflict, and Warfare 2, no. 1 (December 6, 2019): 25. http://dx.doi.org/10.21810/jicw.v2i1.951.

Full text
Abstract:
This article looks to tie together the polar opposite of hybrid warfare and nuclear deterrence. The reason for this is that hybrid warfare and its effects on nuclear deterrence need to be explored as there appears to be substantial increases in hybrid warfare’s usage. This article found that hybrid warfare has an erosion like effect on nuclear deterrence because it increases the likelihood that nuclear weapons will be used. This may be due to both the fact that hybrid warfare can ignore conventional redlines, but also because the cyber aspect of hybrid warfare has unintended psychological effects on how deterrence functions. how does this relate to nuclear war? In short, cyber warfare attacks key concepts which make nuclear deterrence a viable strategy including the concepts of stability, clarity, and rationality. Therefore, hybrid warfare increases the chance of nuclear use.
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Garrett. "China's Strategic Devaluing of American Social Capital." Journal of Strategic Security 16, no. 1 (April 2023): 1–18. http://dx.doi.org/10.5038/1944-0472.16.1.2026.

Full text
Abstract:
The information technology era has opened a myriad of new battlespaces through which nations engage each other. China has advanced their “three warfares” doctrine – political warfare, public opinion warfare, and legal warfare – behind a robust and aggressive economic agenda. Direct financial investment and tightly controlled access to both their large consumer market and cheap labor force has given them considerable leverage in key sectors of American industry, particularly those in the communication sphere. The narrative crafting capabilities increasingly acquired by China are beginning to appear as genuine cultural hegemony. This indicates an ability to shape the American collective consciousness by shifting values and behaviors, and ultimately weaken the social bonds within the population. This article thus frames the nature of warfare in the information age as the strategic devaluing of social capital. This reframing of adversarial strategies may be helpful to countering such efforts by providing new insight into the tactics currently employed.
APA, Harvard, Vancouver, ISO, and other styles
4

Jalil Shah, Hassan, and Muhammad Ehsan. "HYBRID WARFARE: EMERGING CHALLENGES FOR PAKISTAN." Journal of Contemporary Studies 11, no. 2 (February 28, 2023): 69–85. http://dx.doi.org/10.54690/jcs.v11i2.234.

Full text
Abstract:
Hybrid Warfare is gaining currency and posing new challenges to military thinkers and practitioners. The changes by the technological revolution, information and psychological operations, digitisation of the battlefield, and modernization in conventional warfare have ceased to be the standalone option for applying force. These changes envisage the application of all Elements of National Power (EoNP), projected along a continuous span of activities, stretching from stability, security, reconstruction and terminating at armed conflict. The paper explains that hybrid warfare is the instrument of choice by the challengers, primarily India, to weaken Pakistan, subjugate it and either balkanise it or make it a flaccid state as the least desired objective. With hybrid warfare as an instrument of application against Pakistan, this article has attempted to dissect hybrid warfare's contours and its impact on Pakistan.
APA, Harvard, Vancouver, ISO, and other styles
5

Shivalkar, Sushmita, Geeta Yadav, and Swapnali Patil Sakshi Dale. "Warfare Robot." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 781–83. http://dx.doi.org/10.31142/ijtsrd22888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

ŞTEFĂNESCU, Daniel-Cornel. "IS HYBRID WARFARE A NEW MANNER OF CONDUCTING WARFARE?" Review of the Air Force Academy 14, no. 2 (December 8, 2016): 155–60. http://dx.doi.org/10.19062/1842-9238.2016.14.2.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stahel, Albert A. "Dissymmetric warfare versus asymmetric warfare." International Transactions in Operational Research 11, no. 4 (July 2004): 435–46. http://dx.doi.org/10.1111/j.1475-3995.2004.00468.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Douglas, Matthew, and Mark Reith. "A Survey of Learning Technology Integration in Information Warfare Education." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 148–56. http://dx.doi.org/10.34190/eccws.23.1.2403.

Full text
Abstract:
Information and communication technologies (ICTs) are enduringly important in today’s world. From paying for morning coffee at the local cafe to receiving a text message from a loved one, ICTs are a part of everyday life. On a larger scale, entire nations are dependent on ICTs. From power grids to the storage of classified documents, nations have come to rely on ICTs. This dependence on ICTs has increased information warfare’s importance as a warfighting domain. In order to effectively conduct information warfare operations, operators must first be properly trained on how to be successful in this domain. The use of learning technologies could be useful to train information warfare forces. This paper surveys the current state of learning technology integration into information warfare education. Learning technologies have become commonplace in today’s professional world. Many topics in organizations are taught through learning technologies such as interactive computer-based trainings, educational videos, and more complex serious games. This is no different for information warfare professionals. Learning technologies can provide alternative ways to teach important information warfare concepts such as the roles, assets, and capabilities that are necessary to succeed in this domain. The use of artificial intelligence, game-based learning, gamification, and simulation-based learning to enhance the training of information warfare forces is discussed in this survey. Additionally, the effect of adding learning technology into information warfare education curriculum as well as the key elements for each type of learning technology integrated are analysed. This paper also identifies areas of future research to further develop this topic. These findings are useful to information warfare educators who are developing curriculum or looking for ways to introduce new technologies into existing curriculum. Artificial intelligence, game-based learning, gamification, and simulation-based learning are all great options to support information warfare education, and there are even more options that have yet to be researched that present further opportunities to study in this area.
APA, Harvard, Vancouver, ISO, and other styles
9

Verĉiĉ, Dejan. "From Marketing Warfare to Warfare Marketing." Journal of Political Marketing 1, no. 4 (September 6, 2002): 115–16. http://dx.doi.org/10.1300/j199v01n04_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nikolić, Nebojša. "Unlimited warfare: Chinese perception of modern warfare." Vojno delo 69, no. 7 (2017): 293–303. http://dx.doi.org/10.5937/vojdelo1706293n.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Warfare"

1

Schaad, Michael A. "More Effective Warfare: Warfare Waged Psychologically." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/7411.

Full text
Abstract:
The Powell Doctrine for waging war was generally focused on the use of overwhelming physical force to defeat the enemy. Destroying enemy combatants and capabilities faster and more severely than the rate at which they can inflict losses has traditionally resulted in victory. Consequently, kinetic operations have always been at the forefront. Despite this predominance of kinetic operations, history has shown that technologically superior, militarily advanced, and numerically overwhelming forces are sometimes defeated by ragtag groups of a few hundred guerrillas with inferior combat capabilities. Rather than attempting to convince our enemies through the use of violent action which targets their physical well-being rather than their mental decision makingthere is a more effective way to wage war psychologically. By exploring case studies of Hezbollah, Hamas, and the neo-Taliban, this thesis examines whether resequencing psychological and kinetic operations, at various times throughout a conflict, will create stronger, more synchronized and believable messages, thus producing warfare waged in a more effective and efficient manner.
APA, Harvard, Vancouver, ISO, and other styles
2

Eidman, Christopher R., and Gregory Scott Green. "Unconventional cyber warfare: cyber opportunities in unconventional warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42615.

Full text
Abstract:
Approved for public release; distribution is unlimited
Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S. will need to examine new and innovative ways to modernize its irregular warfare fighting capabilities. Within its irregular warfare capabilities, the U.S. will need to identify effective doctrine and strategies to leverage its tactical and technical advantages in the conduct of unconventional warfare. Rather than take a traditional approach to achieve unconventional warfare objectives via conventional means, this thesis proposes that unconventional warfare can evolve to achieve greater successes using the process of unconventional cyber warfare.
APA, Harvard, Vancouver, ISO, and other styles
3

Lesyk, N. I. "Information warfare." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saleem, Y. "Environmental warfare." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36287.

Full text
Abstract:
It is the middle of day, and the sky is plain black. Smoke is everywhere—black, smothering smoke. The earth is spewing burning fire that bathes the darkness with bright orange-red. Drops are falling from the sky, but not rain drops. A scene from a science fiction movie? Or maybe an artistic take on what hell might look like? No, these are the Kuwaiti oil fields burning after being set on fire by the retreating Iraqi forces following the end of the Persian Gulf War. It was an act of sabotage that was aimed to impair the Kuwaiti oil production and subsequently their economy, but it ended up causing an environmental disaster of devastating consequences. One billion barrels of oil burned to flames over the course of around 10 months. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/36287
APA, Harvard, Vancouver, ISO, and other styles
5

Kuzmenko, Victoria Vladimirovna, and Вікторія Володимирівна Кузьменко. "Information warfare a new face of warfare in international relations." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51632.

Full text
Abstract:
1. International communication [Electronic resource].- Access mode: http:// academy.gov.ua/infpol/pages/dop/2/files/53dfa6b2-8428-4688-9bba- 7c38b11fa419.pdf; 2. Information warfare[Electronic resource].- Access mode: https://www. wikiwand.com/uk/%D0%86%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0 %B0%D1%86%D1%96%D0%B9%D0%BD%D0%B0_%D0%B2%D1%96%D0% B9%D0%BD%D0%B0 3. Information warfare: a new form of people’s war [Electronic resource].- Access mode: https://fas.org/irp/world/china/docs/iw_wei.htm 4. Information warfare - the essence, methods and means of warfare[Electronic resource].- Access mode: https://www.bezpeka.com/uk/informacijna-vijnasutnistmetodi-ta-zasobi-vedennja/ .
Information is one of the most important components in the life of modern society. The status of a person, state, or organization in the real world is largely determined by its ability to communicate with people and its position in the information space. International relations have always been based on the principles of communication. International communication- is the exchange of information between participants on the world stage, which has an international character . Information has a global impact, that is, with the successful management of people’s minds, it is possible to destroy the opponent or even to start a war. And international communication is a guide to the beginning of information conflicts between the subjects, which can later escalate into information warfare. Today, the causes of information warfare in international relations may be simple communication between participants, but most often it is terrorism and cybercrime. A computer as a tool can be used to commit a crime and can be the object of a specific crime. These actions are used to disrupt and disable various government databases and management systems.
Інформація - одна з найважливіших складових у житті сучасного суспільства. Статус людини, держави чи організації в реальному світі значною мірою визначається її здатністю спілкуватися з людьми та її становищем в інформаційному просторі. Міжнародні відносини завжди базувались на принципах спілкування. Міжнародне спілкування - це обмін інформацією між учасниками на світовій арені, що має міжнародний характер . Інформація має глобальний вплив, тобто завдяки успішному управлінню свідомістю людей можна знищити супротивника або навіть розпочати війну. А міжнародне спілкування є орієнтиром для початку інформаційних конфліктів між суб’єктами, які згодом можуть перерости в інформаційну війну. Сьогодні причинами інформаційної війни у ​​міжнародних відносинах може бути просте спілкування між учасниками, але найчастіше це тероризм та кіберзлочинність. Комп’ютер як інструмент може бути використаний для вчинення злочину і може бути об’єктом конкретного злочину. Ці дії використовуються для порушення та відключення різних державних баз даних та систем управління.
APA, Harvard, Vancouver, ISO, and other styles
6

Emmersen, Tracy, Ng Kiang Chuan, David Chiam, Ong Zi Xuan, Perh Hong Yih Daniel, Koh Wee Yung, Wes Wessner, et al. "Advanced Undersea Warfare Systems." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/6959.

Full text
Abstract:
Includes supplemental materials
Approved for public release; distribution is unlimited.
Over the next twenty years, the proliferation of threats in the undersea environment will likely challenge the platform-centric model that the United States Navy uses to maintain dominance in Undersea Warfare (USW). Meanwhile, rapidly maturing technologies offer greater capabilities to potential adversaries around the world. Such a paradigm creates an imperative for the Navy to harness emerging technologies to maintain USW dominance amid a dynamic threat environment, while balancing cost, risk, and required performance. This systems engineering analysis develops Advanced Undersea Warfare Systems (AUWS) that provide a technological and tactical advantage based on the needs of the war-fighter. Following critical analysis of the numerous possible alternatives for performing the necessary Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) and prosecution and an objective screening process, four system architectures, and associated operational concepts, are selected for detailed analysis. From cost, risk, and performance analyses, superior AUWS concepts are shown to be flexible, scalable, and tailorable systems that balance critical need areas. This analysis highlights the need for new warfare systems that can meet future challenges to the traditional platform-centric model for USW dominance. Using the results and recommendations in this analysis will allow the Navy to deploy capabilities that effectively and efficiently meet future operational needs.
APA, Harvard, Vancouver, ISO, and other styles
7

Higgins, Eric John, Ronald Leroy Higgs, Gregory Rodger Parkins, Vincent S. Tionquiao, and Christopher Kevin Wells. "Expeditionary warfare : force protection." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/6917.

Full text
Abstract:
Includes supplementary material.
In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study. The Systems Engineering and Analysis Team used the Systems Engineering and Management process as the primary methodology to complete this multidisciplinary task. Survivability was identified as the most critical factor for evaluating the protection of the Sea Base and its transport assets. Threats to the Sea Base were reviewed, analyzed, and prioritized. System design and analysis focused on preliminary analyses of various sensors, search concepts, and weapons. These preliminary analyses identified capability gaps that were translated into functional concepts and proposed architectures for detailed modeling and analysis. These proposed architectures were identified as either Point or Distributed. In order to adequately determine the relative performance of the proposed architectures generated by the team, a thorough and systematic design of experiments was developed and applied in the Naval Simulation System and EXTEND. Based on the results obtained, the Systems Engineering and Analysis Team determined that a Distributed Sensor and Weapons architecture would significantly increase the survivability of future Expeditionary Warfare forces.
APA, Harvard, Vancouver, ISO, and other styles
8

Torres, Santino M. "Countermobilization: unconventional social warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42741.

Full text
Abstract:
Approved for public release; distribution is unlimited
The purpose of this thesis is to identify and understand the factors associated with effective social countermobilization against violent extremism. Understanding such factors can help a state develop a sponsored countermovement to protect its national interests against violent extremist movements. This thesis attempts to provide a strategy and framework by which to defeat violent extremist movements through the use of unconventional warfare techniques.
APA, Harvard, Vancouver, ISO, and other styles
9

White, Scott C. "Reorganizing for Irregular Warfare." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4353.

Full text
Abstract:
Approved for public release, distribution unlimited
A thorough understanding of Irregular Warfare (IW) and the principles of organizational theory and design will enable the Department of Defense (DoD) to organize efficiently and effectively for operations within the Irregular Warfare Environment, while maintaining its conventional capabilities. We develop our argument for this thesis in several stages. First, we define irregular warfare and differentiate it from conventional warfare through the development of our critical success factors. We introduce organizational theory and design in order to incorporate the critical success factors. We conclude that the DoD should reorganize certain elements of the U.S. Special Operations Command by incorporating existing capabilities, focusing on conducting operations within the Irregular Warfare Environment, and implementing our critical success factors.
APA, Harvard, Vancouver, ISO, and other styles
10

Ford, Alexander S. "Dehumanization and irregular warfare." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34664.

Full text
Abstract:
Approved for public release; distribution is unlimited
In the current global environment the practice of dehumanizationthe stripping away of common attributes among people that call for respect and constrain violenceand the misperception it creates have resulted in misguided attempts by militaries to influence the center of gravity in irregular warfare, the civilian population. Traditional thought in this matter implies that cultural training is the most important factor in creating more effective influence when dealing in irregular warfare scenarios. By examining dehumanization and the factors that cause it in irregular warfare environments, this thesis will provide a framework for how dehumanization impacts influence operations. My analysis seeks to explain how dehumanization occurs and how it can be prevented, thereby setting necessary conditions for effective population influence.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Warfare"

1

Butterfield, Moira. Warfare! London: Franklin Watts, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Inc, World Book, ed. Warfare. Chicago, IL: World Book, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kemp, Paul. Sea warfare. London: Arms & Armour Press, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cooksley, Peter G. Air warfare. London: Arms & Armour Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thiele, Ralph, ed. Hybrid Warfare. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-35109-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Spiers, Edward M. Chemical Warfare. London: Palgrave Macmillan UK, 1986. http://dx.doi.org/10.1007/978-1-137-10454-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jajodia, Sushil, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, and Cliff Wang, eds. Cyber Warfare. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14039-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Murray, Williamson, and Peter R. Mansoor, eds. Hybrid Warfare. Cambridge: Cambridge University Press, 2012. http://dx.doi.org/10.1017/cbo9781139199254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abdelnour, Ziad K., and Wesley A. Whittaker, eds. Economic Warfare. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781119203131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nicholson, Helen. Medieval Warfare. London: Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-1-4039-4386-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Warfare"

1

Ritchie, William, Katherine Pond, Edward J. Anthony, George Maul, Patricia L. Wiberg, Miles O. Hayes, Andrew D. Short, et al. "Warfare—See Coastal Warfare." In Encyclopedia of Coastal Science, 1043. Dordrecht: Springer Netherlands, 2005. http://dx.doi.org/10.1007/1-4020-3880-1_339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Steven P. "Warfare." In Encyclopedia of Global Bioethics, 2965–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-09483-0_440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Steven P. "Warfare." In Encyclopedia of Global Bioethics, 1–10. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-05544-2_440-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "warfare." In Computer Science and Communications Dictionary, 1908. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bolin, Thomas M. "Warfare." In The Biblical World, 611–28. 2nd ed. London: Routledge, 2021. http://dx.doi.org/10.4324/9781315678894-39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oprey, Christopher. "Warfare." In Handbook for History Teachers, 515–18. London: Routledge, 2021. http://dx.doi.org/10.4324/9781032163840-69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Walters, D. R. W. G. "Warfare." In Handbook for History Teachers, 695–97. London: Routledge, 2021. http://dx.doi.org/10.4324/9781032163840-103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Baker, Jill L. "Warfare." In Technology of the Ancient Near East, 104–23. Milton Park, Abingdon, Oxon: Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781351188111-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Scott, A. F. "Warfare." In The Saxon Age, 143–62. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003409625-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Middleton, Nick. "Warfare." In The Global Casino, 536–58. 7th ed. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003395096-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Warfare"

1

Gusterson, Hugh. "Drone warfare." In NUCLEAR WEAPONS AND RELATED SECURITY ISSUES. Author(s), 2017. http://dx.doi.org/10.1063/1.5009234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Askin, Osman, Riza Irmak, and Mustafa Avsever. "Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2015. http://dx.doi.org/10.1117/12.2189351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brandt, Kevin, and Ellen Roland. "Modeling coalition warfare." In the 25th conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/256563.256903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Martynenko, Evgeny. "HYBRID WARFARE PHENOMENA." In 4th International Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM2017. Stef92 Technology, 2017. http://dx.doi.org/10.5593/sgemsocial2017/hb11/s01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Horne, Gary E. "Maneuver warfare distillations." In the 31st conference. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/324898.325020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xiangyong Chen, Yuanwei Jing, Chunji Li, Nan Jiang, and G. M. Dimirovski. "Effectiveness evaluation of warfare command systems with dissymmetrical warfare information." In 2010 American Control Conference (ACC 2010). IEEE, 2010. http://dx.doi.org/10.1109/acc.2010.5531011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kartusová, Alžběta. "Hybridní hrozby – fenomén v oblasti válek 21. století." In Nestandardní bezpečnostní situace: ústavní, mezinárodní a evropský pohled. Západočeská univerzita v Plzni, 2021. http://dx.doi.org/10.24132/zcu.2021.09228.89-102.

Full text
Abstract:
This article describes a new kind of security threats – hybrid threats – and aims to clarify not only the terms hybrid threat and hybrid warfare, but also examine the methods that are being used in relation to planning and engagement in such warfares. Furthermore, it suggests methods of protection against possible hybrid attacks both on international and national level.
APA, Harvard, Vancouver, ISO, and other styles
8

Aucsmith, David. "Implications of Cyber Warfare." In IH&MMSec '15: ACM Information Hiding and Multimedia Security Workshop. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2756601.2756622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stark, Andrew J., Kyle Davis, Chris Ward, and Jordan Gray. "Photonics for electronic warfare." In 2014 IEEE Avionics, Fiber-Optics and Photonics Technology Conference (AVFOP). IEEE, 2014. http://dx.doi.org/10.1109/avfop.2014.6999438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hale, Jim. "Cyber Warfare Integrated Network." In AIAA International Air and Space Symposium and Exposition: The Next 100 Years. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2003. http://dx.doi.org/10.2514/6.2003-2855.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Warfare"

1

Vatet, Ian V. Can Network-Centric Warfare Save Undersea Warfare? Fort Belvoir, VA: Defense Technical Information Center, February 2000. http://dx.doi.org/10.21236/ada379174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

AIR UNIV MAXWELL AFB AL. Electronic Warfare. Fort Belvoir, VA: Defense Technical Information Center, February 2012. http://dx.doi.org/10.21236/ada562410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sherman, William C. Air Warfare. Fort Belvoir, VA: Defense Technical Information Center, March 2002. http://dx.doi.org/10.21236/ada421698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

JOINT CHIEFS OF STAFF WASHINGTON DC. Electronic Warfare. Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada464647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Van Messel, John A. Unrestricted Warfare: A Chinese Doctrine for Future Warfare? Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada509132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sullivan, Gordon R., and James M. Dubik. Envisioning Future Warfare. Fort Belvoir, VA: Defense Technical Information Center, January 1995. http://dx.doi.org/10.21236/ada450234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McGrady, John W. Sustaining Unconventional Warfare. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada587508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wright, Darrell L. Electronic Warfare Test. Fort Belvoir, VA: Defense Technical Information Center, September 1999. http://dx.doi.org/10.21236/ada377902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dotto, Peter A. Defeating Guerrilla Warfare. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada240241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

NAVAL SURFACE WARFARE CENTER DAHLGREN DIV VA. Naval Surface Warfare Center Dahlgren Division, Technical Digest; Expeditionary Warfare. Fort Belvoir, VA: Defense Technical Information Center, January 1996. http://dx.doi.org/10.21236/ada332964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography