Search

Your search keyword '"Network-centric warfare"' showing total 633 results

Search Constraints

Start Over You searched for: Descriptor "Network-centric warfare" Remove constraint Descriptor: "Network-centric warfare"
633 results on '"Network-centric warfare"'

Search Results

51. Network-Centric Warfare Concept: Pro and Contra.

52. Doing More of the Right High-End Effects-Based Things Without More: From Basics to Families of System of Systems Capabilities.

53. Managing Electronic Warfare Air Force Units in Present-day Conditions.

54. Asymmetric Response in Network-Centric Warfare.

55. LOGIKAI HADVISELÉS - KRITIKUS PONTOK HARCA.

56. Operational Testing: From Basics to System-of- Systems Capabilities.

57. Articulation, antagonism, and intercalation in Western military imaginaries.

58. Network Foundation for Command and Control (C2) Systems: Literature Review

59. Military History and Fourth Generation Warfare.

60. ‘All hazards approach’ to disaster management: the role of information and knowledge management, Boyd's OODA Loop, and network-centricity.

61. P-8A "Poseidon" Collaborative Simulation and Stimulation for Electromagnetic Environmental Effects Test & Evaluation.

62. Security in Mobile Ad Hoc Networks.

63. A comparative investigation of acknowledgment mechanisms for data transport in space internet.

64. Patch Models and Their Applications to Multivehicle Command and Control.

65. DEVELOPMENT FEATURES AND IMPROVED CLASSIFICATION OF SITUATIONAL SURVEILLANCE AND ATTACK SYSTEMS

66. Fusion of disparate identity estimates for shared situation awareness in a network-centric environment

67. The more you know, the less you understand: The problem with information warfare.

68. Revolution in Military Affairs and Outer Space

69. The Millenials’ war: dilemmas of network dependency in today’s military

70. Research Report

71. Militärische Cyber-Operationen: Nutzen, Limitierungen und Lehren für Deutschland

72. FPGA Implementation of Real-Time Soldier Activity Detection based on Neural Network Classifier in Smart Military Suit

73. Replication Strategies of Mobile Agents for Autonomous Vulnerability Mitigation

76. Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks

78. Mission command in the information age

79. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

80. Agent-Based Simulation and Its Application to Analyze Combat Effectiveness in Network-Centric Warfare Considering Communication Failure Environments

81. Command and control in the context of digitization: a study based on computational modeling

82. Simulation-Based Optimization on the System-of-Systems Model via Model Transformation and Genetic Algorithm: A Case Study of Network-Centric Warfare

83. Target Path Detection Algorithm Using Activation Time Lag of PDR Sensors Based on USN

84. Designing dynamical systems for security and defence network knowledge management. A case of study: Airport bird control falconers organizations

85. OODA loop in command & control systems

86. Security Infrastructure for Service Oriented Architectures at the Tactical Edge

87. A computational framework for modeling targets as complex adaptive systems

88. Research on the Effect of Information Sharing on Command Decision-Making in Network-Centric Warfare

89. A Survey Study of the Combat Effectiveness Analysis Models and Future Research Areas

90. Establishment of Equipment Support Model and Command Flow of Equipment Support Based on Network Centric Warfare

91. A Study on the Design of an Underwater Distributed Sensor Network for the Shallow Water by An Effectiveness Analysis

92. Western European Armed Forces and the Modernisation Agenda: Following or Falling Behind?

93. M&S Case Study for Information Sharing Enabled Combat Entities

94. A P2P Based Tactical Information Sharing System for Mobile Nodes

95. North Korean Cyber Warfare Threat and South Korean Action

96. Network-based Metric for Measuring Combat Effectiveness

97. Development of Stream Cipher using the AES

98. Cloud Computing-Core Platform to Build Future Networking Data Links

99. Research on Modeling and Simulation of Networked Air & Missile Defense

Catalog

Books, media, physical & digital resources