Search Results - "Reconnaissance"

  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74
  15. 75

    Unmanned Aircraft Systems in the Cyber Domain by Nichols, Randall K., Mumm, Hans C., Lonstein, Wayne D.

    Published 2019
    Table of Contents: “…Chapter 1 - A View of the UAS Market -- Chapter 2 - UAS Law - Legislation, Regulation, and Adjudication -- Chapter 3 - Understanding Hostile Use and Cyber-Vulnerabilities of UAS -- Chapter 4 - INFOSEC – Protecting UAS Information Channels & Components -- Chapter 5 - Intelligence & Red Teaming -- Chapter 6 - Case Studies in Risk for UAS -- Chapter 7 - UAS SAA Methodologies, Conflict Detection -- Chapter 8 - Designing UAS Systems for Stealth -- Chapter 9 - Case Study Smart Skies Project -- Chapter 10 - UAS Intelligence, Surveillance and Reconnaissance (ISR) -- Chapter 11 - UAS Weapons -- Chapter 12 - UAS System Deployment and Information Dominance (ID) -- Chapter 13 - Data Links Functions, Attributes and Latency -- Chapter 14 - Exposing UAS Vulnerabilities via Electronic Warfare (EW) and Countering with Low Probability Intercept Signals (LPI) -- Chapter 15 - Africa - World’s First Busiest Drone Operational Proving Ground -- Chapter 16 - Chinese Drones in Spratly Islands, and Chinese Threats to USA forces in Pacific -- Chapter 17 - High-Altitude Platforms (HAPS) – A Promise not Reached -- Chapter 18 - C-UAS and Large Scale Threats -- Chapter 19 - Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries -- Chapter 20 - Legal and Regulatory – Where It Was, Where It Is and What’s Ahead? …”
    Access online version
    Electronic eBook
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80