Narrow your search

Library

Vlaams Parlement (7)

FARO (5)

KU Leuven (5)

LUCA School of Arts (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

UGent (5)

ULB (5)

More...

Resource type

book (7)


Language

English (6)

French (1)


Year
From To Submit

2023 (1)

2017 (1)

2014 (1)

2013 (2)

2010 (1)

More...
Listing 1 - 7 of 7
Sort by

Book
Data_flood
Author:
ISBN: 0833084305 0833084321 0833084291 9780833084323 9780833084309 9780833084293 Year: 2014 Publisher: Santa Monica, CA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Navy analysts are struggling to keep pace with the growing flood of data collected by intelligence, surveillance, and reconnaissance sensors. This challenge is sure to intensify as the Navy continues to field new and additional sensors. The authors explore options for solving the Navy's "big data" challenge, considering changes across four dimensions: people, tools and technology, data and data architectures, and demand and demand management.


Book
Interoperability : continuing challenge in coalition air operations
Authors: ---
Year: 2000 Publisher: Santa Monica, CA : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The United States is increasingly participating in coalition military operations. Coalition support may be required for successful military operations and in most such operations the United States desires to share the burden. U.S. allies recognize the increased security that coalition operations can bring. Because interoperability is a key element in coalitions, RAND undertook research to help the Air Force identify potential interoperability problems that may arise in coalition air operations and to suggest nonmateriel and technology-based solutions. The research focus is on command, control, communications, intelligence, surveillance, and reconnaissance (C3ISR) systems in out-of-NATO-area operations. The authors' review of recent coalition air operations found that interoperability problems arose because of differences in doctrine, incompatible communications, different planning and execution systems, and different weapon system capabilities. For example, allies may lack sufficient all-weather, day and night precision-guided weapons. The authors suggest the following to increase interoperability in coalition operations: (1) common or harmonized doctrine for combined joint task force operations, from planning through assessment, (2) compatible or adaptable concepts of operation for airborne surveillance and control, (3) common information-sharing standards and compatible tactical communication systems, and (4) expert, experienced personnel who understand the capabilities of coalition partners. From a technology perspective and cost considerations, C3ISR initiatives appear to offer the best opportunities for interoperability enhancements.


Book
Outsmarting agile adversaries in the electromagnetic spectrum
Authors: --- --- --- --- --- et al.
Year: 2023 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The U.S. Air Force's electronic warfare integrated reprogramming (EWIR) enterprise examines intelligence on adversary threats that emit in the electromagnetic spectrum (EMS) (in particular, radars and jammers) and configures electronic warfare software and hardware to enable aircraft or other resources to react to and/or respond to adverse changes in the EMS environment. With the growing advancements in U.S. adversaries' electronic warfare assets that enable complex and diverse EMS capabilities, identifying, tracking, and responding to these threats requires much faster updates than the existing EWIR enterprise was designed for. The research team conducted four interrelated technology case studies that together comprise the fundamental elements necessary for creating a near-real-time, autonomous, inflight software reprogramming capability and, more specifically, artificial intelligence–enabled cognitive electronic warfare capabilities—the use of machine learning algorithms that enable platforms to learn, reprogram, adapt, and effectively counter threats in flight. The research team also highlighted important continuing roles for the existing EWIR enterprise even as the U.S. Air Force moves toward a cognitive future.


Book
Le renseignement américain : Entre secret et transparence, 1947-2013
Author:
ISBN: 2753552991 2753533075 9782753533073 Year: 2017 Publisher: Rennes : Presses universitaires de Rennes,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Les révélations Snowden confirment qu’aux États-Unis le tiraillement entre impératifs du secret et exigences de transparence demeure vivace. Grâce aux révélations ponctuelles de ce genre et surtout à la mise à disposition régulière de fonds d’archives, il est possible de rendre compte de l’histoire du renseignement américain contemporain, jusqu’aux transformations qu’il a connues depuis les attentats du 11 septembre 2001.

Privacy on the line
Authors: --- --- ---
ISBN: 9780262256018 0262256010 9780262042406 1282096265 9786612096266 0262262517 0262514001 0262042401 9780262514002 Year: 2010 Publisher: Cambridge, Massachusetts ; [Piscataqay, New Jersey] MIT Press IEEE Xplore

Loading...
Export citation

Choose an application

Bookmark

Abstract

Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services; attempts are being made to require ISPs to retain their data for years in case the government wants it; and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In Privacy on the Line, Whitfield Diffie and Susan Landau strip away the hype surrounding the policy debate over privacy to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated and expanded edition revises their original - and prescient - discussions of both policy and technology in light of recent controversies over NSA spying and other government threats to communications privacy.


Book
Breaking Japanese diplomatic codes : David Sissons and D Special Section during the Second World War
Authors: ---
ISBN: 1925021076 1925021084 9781925021080 9781925021073 Year: 2013 Publisher: Canberra : ANU E Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

During the Second World War, Australia maintained a super-secret organisation, the Diplomatic (or `D’) Special Section, dedicated to breaking Japanese diplomatic codes. The Section has remained officially secret as successive Australian Governments have consistently refused to admit that Australia ever intercepted diplomatic communications, even in war-time. This book recounts the history of the Special Section and describes its code-breaking activities.


Book
Motion imagery processing and exploitation (MIPE)
Authors: --- --- --- --- --- et al.
ISBN: 9780833084828 0833084828 0833081500 9780833081506 Year: 2013 Publisher: Santa Monica, CA RAND

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Intelligent agents (Computer software) --- Remote sensing. --- Military intelligence --- Photographic interpretation (Military science) --- Video surveillance. --- Electronic intelligence. --- Research. --- Science --- Science research --- Scientific research --- Information services --- Learning and scholarship --- Methodology --- Research teams --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Electronic countermeasures --- Video recording --- Aerial photograph reading --- Photo interpretation --- Aerial photography --- Photogrammetric pictures --- Photography, Military --- Remote-sensing imagery --- Remote sensing systems --- Remote terrain sensing --- Sensing, Remote --- Terrain sensing, Remote --- Aerial photogrammetry --- Aerospace telemetry --- Detectors --- Space optics --- Information warfare --- Deception (Military science) --- Agents, Autonomous (Computer software) --- Agents, Cognitive (Computer software) --- Agents, Intelligent (Computer software) --- Assistants, Cognitive (Computer software) --- Assistants, Intelligent software --- Autonomous agents (Computer software) --- Cognitive agents (Computer software) --- Cognitive assistants (Computer software) --- IAs (Computer software) --- Intelligent agent software --- Intelligent software agents --- Intelligent software assistants --- Software agents (Computer software) --- Special agents (Computer software) --- Artificial intelligence --- Research --- Computer programs

Listing 1 - 7 of 7
Sort by