Literatura científica selecionada sobre o tema "Digital weapon"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Digital weapon".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Digital weapon"
Czosseck, Christian, e Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict". International Journal of Cyber Warfare and Terrorism 2, n.º 1 (janeiro de 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Texto completo da fonteKim, Eungsu, e Kiyeol Ryu. "Design for Weapon Live Test Decision Support System Using Digital Twin Architecture". Journal of the Korea Institute of Military Science and Technology 25, n.º 5 (5 de outubro de 2022): 501–12. http://dx.doi.org/10.9766/kimst.2022.25.5.501.
Texto completo da fonteKim, Gakgyu, Kangkyun Jin, Yongju Cho e Kyoungchan Won. "Initial operational capability of future weapon systems and field test method using digital twin". Journal of Advances in Military Studies 5, n.º 3 (31 de dezembro de 2022): 1–22. http://dx.doi.org/10.37944/jams.v5i3.167.
Texto completo da fontePuchnin, Aleksandr, e Pavel Minenko. "Digital crime weapons of the XXI century: object, means, tools". Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, n.º 3 (3 de outubro de 2022): 111–17. http://dx.doi.org/10.35750/2071-8284-2022-3-111-117.
Texto completo da fonteCHEN, Jie, Hao FANG, Bin XIN e Fang DENG. "Modeling, Optimization and Control in Ground-based Digital Weapon Systems". Acta Automatica Sinica 39, n.º 7 (25 de março de 2014): 943–62. http://dx.doi.org/10.3724/sp.j.1004.2013.00943.
Texto completo da fonteMathew, Dr Alex, e Hannah Alex. "Cyberbiosecurity as the Foremost Biological Weapon to the Digital World". International Research Journal of Innovations in Engineering and Technology 06, n.º 02 (2022): 75–79. http://dx.doi.org/10.47001/irjiet/2022.602013.
Texto completo da fonteBadarna, Ibrahim, e Anat Gesser-Edelsburg. "Exploring the Link between Masculine Perceptions, Violence, Social Media Influence, and Weapon Carrying and Use: A Qualitative Inquiry into Arab Adolescent Boys and Young Men in Israel". Social Sciences 13, n.º 3 (13 de março de 2024): 165. http://dx.doi.org/10.3390/socsci13030165.
Texto completo da fonteChatterjee, Tirthankar, Debojyoti Bhattacharyya, Deepti Majumdar e Madhusudan Pal. "Ergonomic Assessment of Multi Calibre Individual Weapon System in Virtual Reality Platform". Defence Science Journal 69, n.º 3 (30 de abril de 2019): 240–48. http://dx.doi.org/10.14429/dsj.69.14426.
Texto completo da fonteSundiev, Igor’ Yu, e Andrey B. Frolov. "Organizational and Digital Network Means of Terminal Destruction of Social Development". Economic Strategies 144, n.º 3 (25 de junho de 2021): 58–69. http://dx.doi.org/10.33917/es-3.177.2021.58-69.
Texto completo da fontePristiyono, Pristiyono, Juliana Juliana e Yudi Prayoga. "MEASURING CUSTOMER TRUST THROUGH DIGITAL TRANSFORMATION OF BANKING AS A COMPETITIVE ADVANTAGE". Jurnal Ekonomi Bisnis dan Kewirausahaan 11, n.º 2 (31 de agosto de 2022): 214. http://dx.doi.org/10.26418/jebik.v11i2.51986.
Texto completo da fonteTeses / dissertações sobre o assunto "Digital weapon"
Setterberg, Petter. "Designing a Game Weapon : Start to Finish". Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-22548.
Texto completo da fonteChabaud, Laurent. "L'arme numérique : essai sur la dématérialisation des infractions pénales". Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMOND043.
Texto completo da fonteThe development of the Internet, and of digital technology in general, has facilitated the commission of a large number of offences, and has made its entry into most branches of criminal law. However, there is still one branch of criminal law where digital technology has not made its entry: offences against the physical integrity of the person. Doesn't this logical rejection raise questions? The development of objects connected to the Internet means that such attacks are becoming a reality. The possibility of such attacks must therefore be incorporated into the Penal Code. The first part of this paper proposes to explore this possibility by bringing together the notions of weapon and digital to create the notion of digital weapon. Although these notions may seem antinomic, they are in fact relatively close. Their integration into the penal code shows that they obey the same mechanism: sanctioning the use of a particular tool - a weapon or a digital device - to commit an offence. We therefore propose a paradigm shift in the analysis of the weapon to bring these notions closer together. This re-theorization of the weapon around its function, which we call the mode of perpetration, enables us to take better account of the dematerialization of offences. The second part sets out to extend the regime of the "mode of perpetration" weapon to include the digital weapon, thereby strengthening the economic efficiency of the law in the fight against cybercrime. In particular, this allows us to take a global approach to cybercrime, favoring proactive rather than merely reactive analysis
Bowen, James M. "Physicochemical characterization of discrete weapons grade plutonium metal particles originating from the 1960 BOMARC incident". University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1384850163.
Texto completo da fonteShen, Teng-Yue, e 沈騰岳. "Air Defense Digital Battlefield and Weapon-Target Assignment Problem Research". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36275011311297653968.
Texto completo da fonte國防大學理工學院
資訊工程碩士班
102
This thesis aims to address the several problems in a distributed Joint Missile Defense System (JMDS) which includes weapon-target-assignment (WTA), dynamic simulation, distributed architecture, and the communication between firepowers and radars. We propose an objective function which pursues Facilities Protection Benefit (FPB), Intercept Benefit (IB) and Cost Benefit (CB). Also, we utilize improved rule-based greedy algorithm to complete WTA. For dynamic simulation, we apply Google Map to be a simulated battlefield and simulate some scenarios which could encounter in the real situations. We build a distributed architecture of the JFDS to simulate military operation units located at different place in battleground. These operation units can communicate each other. Through the technique of web-page, we can watch the process of engagement and review the result visually and intuitively so that commander can understand the quality of weapon-target-assignment result. At the simulation experiment, we design a scenario and record the result which includes the average quantity of our facility, the average execution time of the weapon-target-assignment, the average cost of firepower consumption, and the average percentage of target devastation. Regard to the experiment result, we can prove that it is better solution to solve WTA problem through the improved algorithm which we propose. At the same time, we also record the average utilization rate of firepower under the different algorithms. We can prove that it is better to enhance the utilization rate of all our deployed firepowers under the improved rule-based greedy algorithm. The better but high-cost firepower won’t be the first choice; instead, the others which equip middle-or-low level can also be exploited well. Finally, we can utilize the simulated result for deploying firepowers and adjusting position and quantity to find the best airspace defense management strategy.
Livros sobre o assunto "Digital weapon"
Dunnigan, James F. Digital Soldiers: The Evolution of High-tech Weaponry and Tomorrow's Brave New Battlefield. New York: St. Martin's Press, 1996.
Encontre o texto completo da fonteAutotestcon, 2000 (36th 2000 Anaheim California). 2000 IEEE Autotestcon proceedings: Autotestcon 2000 : IEEE Systems Readiness Technology Conference : Future sustainment for military and aerospace : September 18-21, 2000, Disneyland Hotel, Anaheim, California. Piscataway, New Jersey: IEEE, 2000.
Encontre o texto completo da fonteAutotestcon '99 (35th 1999 San Antonio, Tex.). 1999 IEEE Autotestcon proceedings: Autotestcon '99 : IEEE Systems Readiness Technology Conference : Test technology for the new millennium : August 30-September 2, 1999. Piscataway, New Jersey: IEEE, 1999.
Encontre o texto completo da fonteAutotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. Piscataway, N.J: IEEE, 2001.
Encontre o texto completo da fonteAutotestcon (38th 2002 Huntsville, Ala.). 2002 IEEE Autotestcon proceedings: [IEEE] Systems Readiness Technology Conference : The new Millennium challenge--transforming test : [October 16-17, 2002], Huntsville, Alabama. Piscataway, New Jersey: IEEE, 2002.
Encontre o texto completo da fonte(2005), Anmin Chŏngchʻaek Pʻorŏm. Hanʼguk hyŏndaesa: Chinsil kwa haesŏk. Kyŏnggi-do Pʻaju-si: Nanam Chʻulpʻan, 2005.
Encontre o texto completo da fonteZetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishing Group, 2015.
Encontre o texto completo da fonteZetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown, 2014.
Encontre o texto completo da fonteGalliott, Jai, Duncan MacIntosh e Jens David Ohlin, eds. Lethal Autonomous Weapons. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197546048.001.0001.
Texto completo da fonteDunnigan, James F. Digital Soldiers. St. Martin's Press, 2001.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Digital weapon"
Hüsing, Zita. "Hacking as a Weapon". In Regimes of Capital in the Post-Digital Age, 126–39. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003372578-11.
Texto completo da fonteChaturvedi, Saumya, Vandana, Stuti Sharma e Anshika. "Digital Knowledge Ecosystem: A New Weapon to Achieve Sustainable Food Waste Management". In Sustainable Food Waste Management, 403–13. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8967-6_22.
Texto completo da fonteIneneji, Collins, e Mehmet Kusaf. "Weapon Detection Using Radar Cross Section (RCS) and Resnet50 Towards Improved Decision Accuracy". In Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 749–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_87.
Texto completo da fonteGlenny, Misha. "The Digital Revolution in a Historical Perspective". In Introduction to Digital Humanism, 47–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_4.
Texto completo da fonteTucker, Aaron. "The Soldier Interfaces on the Digitally Augmented Battlefield". In Virtual Weaponry, 69–105. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60198-4_3.
Texto completo da fonteTamburrini, Guglielmo. "Artificial Intelligence and Large-Scale Threats to Humanity". In Introduction to Digital Humanism, 241–54. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_16.
Texto completo da fonteTaddeo, Mariarosaria, e Alexander Blanchard. "A Comparative Analysis of the Definitions of Autonomous Weapons". In The 2022 Yearbook of the Digital Governance Research Group, 57–79. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_6.
Texto completo da fonteHughes, Andrew. "Weapons of Mass Consumption: Social and Digital Media in Political Campaigns". In Market Driven Political Advertising, 61–78. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77730-6_4.
Texto completo da fonteKendzierskyj, Stefan, e Hamid Jahankhani. "Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age". In Advanced Sciences and Technologies for Security Applications, 3–21. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_1.
Texto completo da fonteJaffe, Joshua. "Cyber Weapons and the Fifth Domain: Implications of Cyber Conflict on International Relations". In The 2022 Yearbook of the Digital Governance Research Group, 51–56. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_5.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Digital weapon"
CARUSO, PAMELA, e ERIC SCHACHT. "Kinetic Energy Weapon Digital Emulation Center". In Aerospace Design Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1992. http://dx.doi.org/10.2514/6.1992-1071.
Texto completo da fonteMcCormick, Kirsten, Andy Cullington e Kirstin Rouse. "Artificial intelligence to assist weapon package selection for airborne weapon delivery". In Open Architecture/Open Business Model, Digital Engineering, Agile Software and Autonomy for the Internet of Military Things (IoMT) 2023, editado por Raja Suresh. SPIE, 2023. http://dx.doi.org/10.1117/12.2659631.
Texto completo da fonteHamada, Mohamed Yousef. "Digital Thread and the Impact on Weapon System Acquisition Cost Growth". In AeroTech® Digital Summit. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2021. http://dx.doi.org/10.4271/2021-01-0026.
Texto completo da fonteVasalos, Averkios, Nikolaos Uzunoglu, Heung-Gyoon Ryu e Ioannis Vasalos. "Neural network target classification for Concealed Weapon radar detection". In 2013 18th International Conference on Digital Signal Processing (DSP). IEEE, 2013. http://dx.doi.org/10.1109/icdsp.2013.6622819.
Texto completo da fonteYoon, Kun Su, Jae Hyun Park, In Gyu Kim e Kwang Su Ryu. "New modeling algorithm for improving accuracy of weapon launch acceptability region". In 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655454.
Texto completo da fonteMa, Weijuan, Yuan Zhang, Jixin Duan, Baizhan Yang e Jianhua Huo. "Design of General and Digital Simulation Software for Close-In Weapon System". In 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5677170.
Texto completo da fonteWELTER, JAMES, e GEOFFREY BUTLER. "Multimedia digital database innovations and application to the analysis of weapon effects and performance". In Flight Simulation and Technologies. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-3592.
Texto completo da fonteKhichi, Manish, e Rajesh Kumar Yadav. "A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods". In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9580031.
Texto completo da fonteSchmidt, Timothy. "Lichten Award Paper: Automated Optical Rotor Blade Tip Clearance Tracking Using Artificial Intelligence Algorithms". In Vertical Flight Society 78th Annual Forum & Technology Display. The Vertical Flight Society, 2022. http://dx.doi.org/10.4050/f-0078-2022-17633.
Texto completo da fonteG., Harold, Branden Sletteland e Max Taylor. "Future Vertical Lift Digital Backbone, Navigating Technology and Implementation Details". In Vertical Flight Society 76th Annual Forum & Technology Display. The Vertical Flight Society, 2020. http://dx.doi.org/10.4050/f-0076-2020-16431.
Texto completo da fonteRelatórios de organizações sobre o assunto "Digital weapon"
Caruso, Pamela W., e Eric N. Schacht. Kinetic Energy Weapon Digital Emulation Center. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 1992. http://dx.doi.org/10.21236/ada346441.
Texto completo da fonteDowns, Lawrence G., e Jr. Digital Data Warfare Using Malicious Computer Code as a Weapon. Fort Belvoir, VA: Defense Technical Information Center, abril de 1995. http://dx.doi.org/10.21236/ada424872.
Texto completo da fontePinchuk, O. P., e A. A. Prokopenko. Model of a computer-orient-ed methodological system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of qualification improvement. Національна академія Державної прикордонної служби України імені Б. Хмельницького, 2023. http://dx.doi.org/10.33407/lib.naes.736836.
Texto completo da fonte