Littérature scientifique sur le sujet « Digital weapon »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Digital weapon ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Digital weapon"
Czosseck, Christian, et Karlis Podins. « A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict ». International Journal of Cyber Warfare and Terrorism 2, no 1 (janvier 2012) : 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Texte intégralKim, Eungsu, et Kiyeol Ryu. « Design for Weapon Live Test Decision Support System Using Digital Twin Architecture ». Journal of the Korea Institute of Military Science and Technology 25, no 5 (5 octobre 2022) : 501–12. http://dx.doi.org/10.9766/kimst.2022.25.5.501.
Texte intégralKim, Gakgyu, Kangkyun Jin, Yongju Cho et Kyoungchan Won. « Initial operational capability of future weapon systems and field test method using digital twin ». Journal of Advances in Military Studies 5, no 3 (31 décembre 2022) : 1–22. http://dx.doi.org/10.37944/jams.v5i3.167.
Texte intégralPuchnin, Aleksandr, et Pavel Minenko. « Digital crime weapons of the XXI century : object, means, tools ». Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, no 3 (3 octobre 2022) : 111–17. http://dx.doi.org/10.35750/2071-8284-2022-3-111-117.
Texte intégralCHEN, Jie, Hao FANG, Bin XIN et Fang DENG. « Modeling, Optimization and Control in Ground-based Digital Weapon Systems ». Acta Automatica Sinica 39, no 7 (25 mars 2014) : 943–62. http://dx.doi.org/10.3724/sp.j.1004.2013.00943.
Texte intégralMathew, Dr Alex, et Hannah Alex. « Cyberbiosecurity as the Foremost Biological Weapon to the Digital World ». International Research Journal of Innovations in Engineering and Technology 06, no 02 (2022) : 75–79. http://dx.doi.org/10.47001/irjiet/2022.602013.
Texte intégralBadarna, Ibrahim, et Anat Gesser-Edelsburg. « Exploring the Link between Masculine Perceptions, Violence, Social Media Influence, and Weapon Carrying and Use : A Qualitative Inquiry into Arab Adolescent Boys and Young Men in Israel ». Social Sciences 13, no 3 (13 mars 2024) : 165. http://dx.doi.org/10.3390/socsci13030165.
Texte intégralChatterjee, Tirthankar, Debojyoti Bhattacharyya, Deepti Majumdar et Madhusudan Pal. « Ergonomic Assessment of Multi Calibre Individual Weapon System in Virtual Reality Platform ». Defence Science Journal 69, no 3 (30 avril 2019) : 240–48. http://dx.doi.org/10.14429/dsj.69.14426.
Texte intégralSundiev, Igor’ Yu, et Andrey B. Frolov. « Organizational and Digital Network Means of Terminal Destruction of Social Development ». Economic Strategies 144, no 3 (25 juin 2021) : 58–69. http://dx.doi.org/10.33917/es-3.177.2021.58-69.
Texte intégralPristiyono, Pristiyono, Juliana Juliana et Yudi Prayoga. « MEASURING CUSTOMER TRUST THROUGH DIGITAL TRANSFORMATION OF BANKING AS A COMPETITIVE ADVANTAGE ». Jurnal Ekonomi Bisnis dan Kewirausahaan 11, no 2 (31 août 2022) : 214. http://dx.doi.org/10.26418/jebik.v11i2.51986.
Texte intégralThèses sur le sujet "Digital weapon"
Setterberg, Petter. « Designing a Game Weapon : Start to Finish ». Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-22548.
Texte intégralChabaud, Laurent. « L'arme numérique : essai sur la dématérialisation des infractions pénales ». Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMOND043.
Texte intégralThe development of the Internet, and of digital technology in general, has facilitated the commission of a large number of offences, and has made its entry into most branches of criminal law. However, there is still one branch of criminal law where digital technology has not made its entry: offences against the physical integrity of the person. Doesn't this logical rejection raise questions? The development of objects connected to the Internet means that such attacks are becoming a reality. The possibility of such attacks must therefore be incorporated into the Penal Code. The first part of this paper proposes to explore this possibility by bringing together the notions of weapon and digital to create the notion of digital weapon. Although these notions may seem antinomic, they are in fact relatively close. Their integration into the penal code shows that they obey the same mechanism: sanctioning the use of a particular tool - a weapon or a digital device - to commit an offence. We therefore propose a paradigm shift in the analysis of the weapon to bring these notions closer together. This re-theorization of the weapon around its function, which we call the mode of perpetration, enables us to take better account of the dematerialization of offences. The second part sets out to extend the regime of the "mode of perpetration" weapon to include the digital weapon, thereby strengthening the economic efficiency of the law in the fight against cybercrime. In particular, this allows us to take a global approach to cybercrime, favoring proactive rather than merely reactive analysis
Bowen, James M. « Physicochemical characterization of discrete weapons grade plutonium metal particles originating from the 1960 BOMARC incident ». University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1384850163.
Texte intégralShen, Teng-Yue, et 沈騰岳. « Air Defense Digital Battlefield and Weapon-Target Assignment Problem Research ». Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36275011311297653968.
Texte intégral國防大學理工學院
資訊工程碩士班
102
This thesis aims to address the several problems in a distributed Joint Missile Defense System (JMDS) which includes weapon-target-assignment (WTA), dynamic simulation, distributed architecture, and the communication between firepowers and radars. We propose an objective function which pursues Facilities Protection Benefit (FPB), Intercept Benefit (IB) and Cost Benefit (CB). Also, we utilize improved rule-based greedy algorithm to complete WTA. For dynamic simulation, we apply Google Map to be a simulated battlefield and simulate some scenarios which could encounter in the real situations. We build a distributed architecture of the JFDS to simulate military operation units located at different place in battleground. These operation units can communicate each other. Through the technique of web-page, we can watch the process of engagement and review the result visually and intuitively so that commander can understand the quality of weapon-target-assignment result. At the simulation experiment, we design a scenario and record the result which includes the average quantity of our facility, the average execution time of the weapon-target-assignment, the average cost of firepower consumption, and the average percentage of target devastation. Regard to the experiment result, we can prove that it is better solution to solve WTA problem through the improved algorithm which we propose. At the same time, we also record the average utilization rate of firepower under the different algorithms. We can prove that it is better to enhance the utilization rate of all our deployed firepowers under the improved rule-based greedy algorithm. The better but high-cost firepower won’t be the first choice; instead, the others which equip middle-or-low level can also be exploited well. Finally, we can utilize the simulated result for deploying firepowers and adjusting position and quantity to find the best airspace defense management strategy.
Livres sur le sujet "Digital weapon"
Dunnigan, James F. Digital Soldiers : The Evolution of High-tech Weaponry and Tomorrow's Brave New Battlefield. New York : St. Martin's Press, 1996.
Trouver le texte intégralAutotestcon, 2000 (36th 2000 Anaheim California). 2000 IEEE Autotestcon proceedings : Autotestcon 2000 : IEEE Systems Readiness Technology Conference : Future sustainment for military and aerospace : September 18-21, 2000, Disneyland Hotel, Anaheim, California. Piscataway, New Jersey : IEEE, 2000.
Trouver le texte intégralAutotestcon '99 (35th 1999 San Antonio, Tex.). 1999 IEEE Autotestcon proceedings : Autotestcon '99 : IEEE Systems Readiness Technology Conference : Test technology for the new millennium : August 30-September 2, 1999. Piscataway, New Jersey : IEEE, 1999.
Trouver le texte intégralAutotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings : IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. Piscataway, N.J : IEEE, 2001.
Trouver le texte intégralAutotestcon (38th 2002 Huntsville, Ala.). 2002 IEEE Autotestcon proceedings : [IEEE] Systems Readiness Technology Conference : The new Millennium challenge--transforming test : [October 16-17, 2002], Huntsville, Alabama. Piscataway, New Jersey : IEEE, 2002.
Trouver le texte intégral(2005), Anmin Chŏngchʻaek Pʻorŏm. Hanʼguk hyŏndaesa : Chinsil kwa haesŏk. Kyŏnggi-do Pʻaju-si : Nanam Chʻulpʻan, 2005.
Trouver le texte intégralZetter, Kim. Countdown to Zero Day : Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishing Group, 2015.
Trouver le texte intégralZetter, Kim. Countdown to Zero Day : Stuxnet and the Launch of the World's First Digital Weapon. Crown, 2014.
Trouver le texte intégralGalliott, Jai, Duncan MacIntosh et Jens David Ohlin, dir. Lethal Autonomous Weapons. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197546048.001.0001.
Texte intégralDunnigan, James F. Digital Soldiers. St. Martin's Press, 2001.
Trouver le texte intégralChapitres de livres sur le sujet "Digital weapon"
Hüsing, Zita. « Hacking as a Weapon ». Dans Regimes of Capital in the Post-Digital Age, 126–39. London : Routledge, 2023. http://dx.doi.org/10.4324/9781003372578-11.
Texte intégralChaturvedi, Saumya, Vandana, Stuti Sharma et Anshika. « Digital Knowledge Ecosystem : A New Weapon to Achieve Sustainable Food Waste Management ». Dans Sustainable Food Waste Management, 403–13. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8967-6_22.
Texte intégralIneneji, Collins, et Mehmet Kusaf. « Weapon Detection Using Radar Cross Section (RCS) and Resnet50 Towards Improved Decision Accuracy ». Dans Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 749–56. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_87.
Texte intégralGlenny, Misha. « The Digital Revolution in a Historical Perspective ». Dans Introduction to Digital Humanism, 47–63. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_4.
Texte intégralTucker, Aaron. « The Soldier Interfaces on the Digitally Augmented Battlefield ». Dans Virtual Weaponry, 69–105. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60198-4_3.
Texte intégralTamburrini, Guglielmo. « Artificial Intelligence and Large-Scale Threats to Humanity ». Dans Introduction to Digital Humanism, 241–54. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_16.
Texte intégralTaddeo, Mariarosaria, et Alexander Blanchard. « A Comparative Analysis of the Definitions of Autonomous Weapons ». Dans The 2022 Yearbook of the Digital Governance Research Group, 57–79. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_6.
Texte intégralHughes, Andrew. « Weapons of Mass Consumption : Social and Digital Media in Political Campaigns ». Dans Market Driven Political Advertising, 61–78. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77730-6_4.
Texte intégralKendzierskyj, Stefan, et Hamid Jahankhani. « Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age ». Dans Advanced Sciences and Technologies for Security Applications, 3–21. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_1.
Texte intégralJaffe, Joshua. « Cyber Weapons and the Fifth Domain : Implications of Cyber Conflict on International Relations ». Dans The 2022 Yearbook of the Digital Governance Research Group, 51–56. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_5.
Texte intégralActes de conférences sur le sujet "Digital weapon"
CARUSO, PAMELA, et ERIC SCHACHT. « Kinetic Energy Weapon Digital Emulation Center ». Dans Aerospace Design Conference. Reston, Virigina : American Institute of Aeronautics and Astronautics, 1992. http://dx.doi.org/10.2514/6.1992-1071.
Texte intégralMcCormick, Kirsten, Andy Cullington et Kirstin Rouse. « Artificial intelligence to assist weapon package selection for airborne weapon delivery ». Dans Open Architecture/Open Business Model, Digital Engineering, Agile Software and Autonomy for the Internet of Military Things (IoMT) 2023, sous la direction de Raja Suresh. SPIE, 2023. http://dx.doi.org/10.1117/12.2659631.
Texte intégralHamada, Mohamed Yousef. « Digital Thread and the Impact on Weapon System Acquisition Cost Growth ». Dans AeroTech® Digital Summit. 400 Commonwealth Drive, Warrendale, PA, United States : SAE International, 2021. http://dx.doi.org/10.4271/2021-01-0026.
Texte intégralVasalos, Averkios, Nikolaos Uzunoglu, Heung-Gyoon Ryu et Ioannis Vasalos. « Neural network target classification for Concealed Weapon radar detection ». Dans 2013 18th International Conference on Digital Signal Processing (DSP). IEEE, 2013. http://dx.doi.org/10.1109/icdsp.2013.6622819.
Texte intégralYoon, Kun Su, Jae Hyun Park, In Gyu Kim et Kwang Su Ryu. « New modeling algorithm for improving accuracy of weapon launch acceptability region ». Dans 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655454.
Texte intégralMa, Weijuan, Yuan Zhang, Jixin Duan, Baizhan Yang et Jianhua Huo. « Design of General and Digital Simulation Software for Close-In Weapon System ». Dans 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5677170.
Texte intégralWELTER, JAMES, et GEOFFREY BUTLER. « Multimedia digital database innovations and application to the analysis of weapon effects and performance ». Dans Flight Simulation and Technologies. Reston, Virigina : American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-3592.
Texte intégralKhichi, Manish, et Rajesh Kumar Yadav. « A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods ». Dans 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9580031.
Texte intégralSchmidt, Timothy. « Lichten Award Paper : Automated Optical Rotor Blade Tip Clearance Tracking Using Artificial Intelligence Algorithms ». Dans Vertical Flight Society 78th Annual Forum & Technology Display. The Vertical Flight Society, 2022. http://dx.doi.org/10.4050/f-0078-2022-17633.
Texte intégralG., Harold, Branden Sletteland et Max Taylor. « Future Vertical Lift Digital Backbone, Navigating Technology and Implementation Details ». Dans Vertical Flight Society 76th Annual Forum & Technology Display. The Vertical Flight Society, 2020. http://dx.doi.org/10.4050/f-0076-2020-16431.
Texte intégralRapports d'organisations sur le sujet "Digital weapon"
Caruso, Pamela W., et Eric N. Schacht. Kinetic Energy Weapon Digital Emulation Center. Fort Belvoir, VA : Defense Technical Information Center, février 1992. http://dx.doi.org/10.21236/ada346441.
Texte intégralDowns, Lawrence G., et Jr. Digital Data Warfare Using Malicious Computer Code as a Weapon. Fort Belvoir, VA : Defense Technical Information Center, avril 1995. http://dx.doi.org/10.21236/ada424872.
Texte intégralPinchuk, O. P., et A. A. Prokopenko. Model of a computer-orient-ed methodological system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of qualification improvement. Національна академія Державної прикордонної служби України імені Б. Хмельницького, 2023. http://dx.doi.org/10.33407/lib.naes.736836.
Texte intégral