Showing 301 - 320 results of 756 for search '"surveillance"', query time: 0.06s Refine Results
  1. 301
  2. 302
  3. 303
  4. 304
  5. 305
  6. 306
  7. 307
  8. 308
  9. 309
  10. 310
  11. 311
  12. 312
  13. 313
  14. 314
  15. 315
  16. 316
  17. 317
  18. 318

    Unmanned Aircraft Systems in the Cyber Domain by Nichols, Randall K., Mumm, Hans C., Lonstein, Wayne D.

    Published 2019
    Table of Contents: “…Chapter 1 - A View of the UAS Market -- Chapter 2 - UAS Law - Legislation, Regulation, and Adjudication -- Chapter 3 - Understanding Hostile Use and Cyber-Vulnerabilities of UAS -- Chapter 4 - INFOSEC – Protecting UAS Information Channels & Components -- Chapter 5 - Intelligence & Red Teaming -- Chapter 6 - Case Studies in Risk for UAS -- Chapter 7 - UAS SAA Methodologies, Conflict Detection -- Chapter 8 - Designing UAS Systems for Stealth -- Chapter 9 - Case Study Smart Skies Project -- Chapter 10 - UAS Intelligence, Surveillance and Reconnaissance (ISR) -- Chapter 11 - UAS Weapons -- Chapter 12 - UAS System Deployment and Information Dominance (ID) -- Chapter 13 - Data Links Functions, Attributes and Latency -- Chapter 14 - Exposing UAS Vulnerabilities via Electronic Warfare (EW) and Countering with Low Probability Intercept Signals (LPI) -- Chapter 15 - Africa - World’s First Busiest Drone Operational Proving Ground -- Chapter 16 - Chinese Drones in Spratly Islands, and Chinese Threats to USA forces in Pacific -- Chapter 17 - High-Altitude Platforms (HAPS) – A Promise not Reached -- Chapter 18 - C-UAS and Large Scale Threats -- Chapter 19 - Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries -- Chapter 20 - Legal and Regulatory – Where It Was, Where It Is and What’s Ahead? …”
    Access online version
    Electronic eBook
  19. 319
  20. 320