241 research outputs found

    Rethinking SEAD: Employment of contemporary Fighter Aircraft Capabilities against an A2/AD-System of Systems of a peer Adversary in Europe

    Get PDF
    The Russian full scale invasion of Ukraine has demonstrated, how relevant the discussion about a potential NATO article 5 intervention in Europe is. A frequently used term in this context is Anti Access/ Area Denial. While this term is not existent in Russian strategy, the Integrated Air Defense System it encompasses poses a major challenge to NATO’s freedom of movement in case of a conflict. The air power role Suppression of Enemy Air Defenses can provide means to tackle the threat the Russian IADS poses to NATO. This thesis elaborates on NATO’s capabilities to counter the Russian IADS with SEAD capabilities. The topics SEAD and A2/AD are analyses in an extensive literature review. A qualitative small-N study based on subject matter expert interviews is conducted in order to identify, how the way SEAD operations are executed must be adjusted based in the present SEAD capabilities in NAT

    Information fusion architectures for security and resource management in cyber physical systems

    Get PDF
    Data acquisition through sensors is very crucial in determining the operability of the observed physical entity. Cyber Physical Systems (CPSs) are an example of distributed systems where sensors embedded into the physical system are used in sensing and data acquisition. CPSs are a collaboration between the physical and the computational cyber components. The control decisions sent back to the actuators on the physical components from the computational cyber components closes the feedback loop of the CPS. Since, this feedback is solely based on the data collected through the embedded sensors, information acquisition from the data plays an extremely vital role in determining the operational stability of the CPS. Data collection process may be hindered by disturbances such as system faults, noise and security attacks. Hence, simple data acquisition techniques will not suffice as accurate system representation cannot be obtained. Therefore, more powerful methods of inferring information from collected data such as Information Fusion have to be used. Information fusion is analogous to the cognitive process used by humans to integrate data continuously from their senses to make inferences about their environment. Data from the sensors is combined using techniques drawn from several disciplines such as Adaptive Filtering, Machine Learning and Pattern Recognition. Decisions made from such combination of data form the crux of information fusion and differentiates it from a flat structured data aggregation. In this dissertation, multi-layered information fusion models are used to develop automated decision making architectures to service security and resource management requirements in Cyber Physical Systems --Abstract, page iv

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    Statistical assessment on Non-cooperative Target Recognition using the Neyman-Pearson statistical test

    Get PDF
    Electromagnetic simulations of a X-target were performed in order to obtain its Radar Cross Section (RCS) for several positions and frequencies. The software used is the CST MWS©. A 1 : 5 scale model of the proposed aircraft was created in CATIA© V5 R19 and imported directly into the CST MWS© environment. Simulations on the X-band were made with a variable mesh size due to a considerable wavelength variation. It is intended to evaluate the Neyman-Pearson (NP) simple hypothesis test performance by analyzing its Receiver Operating Characteristics (ROCs) for two different radar detection scenarios - a Radar Absorbent Material (RAM) coated model, and a Perfect Electric Conductor (PEC) model for recognition purposes. In parallel the radar range equation is used to estimate the maximum range detection for the simulated RAM coated cases to compare their shielding effectiveness (SE) and its consequent impact on recognition. The AN/APG-68(V)9’s airborne radar specifications were used to compute these ranges and to simulate an airborne hostile interception for a Non-Cooperative Target Recognition (NCTR) environment. Statistical results showed weak recognition performances using the Neyman-Pearson (NP) statistical test. Nevertheless, good RCS reductions for most of the simulated positions were obtained reflecting in a 50:9% maximum range detection gain for the PAniCo RAM coating, abiding with experimental results taken from the reviewed literature. The best SE was verified for the PAniCo and CFC-Fe RAMs.Simulações electromagnéticas do alvo foram realizadas de modo a obter a assinatura radar (RCS) para várias posições e frequências. O software utilizado é o CST MWS©. O modelo proposto à escala 1:5 foi modelado em CATIA© V5 R19 e importado diretamente para o ambiente de trabalho CST MWS©. Foram efectuadas simulações na banda X com uma malha de tamanho variável devido à considerável variação do comprimento de onda. Pretende-se avaliar estatisticamente o teste de decisão simples de Neyman-Pearson (NP), analisando as Características de Operação do Receptor (ROCs) para dois cenários de detecção distintos - um modelo revestido com material absorvente (RAM), e outro sendo um condutor perfeito (PEC) para fins de detecção. Em paralelo, a equação de alcance para radares foi usada para estimar o alcance máximo de detecção para ambos os casos de modo a comparar a eficiência de blindagem electromagnética (SE) entre os diferentes revestimentos. As especificações do radar AN/APG-68(V)9 do F-16 foram usadas para calcular os alcances para cada material, simulando uma intercepção hostil num ambiente de reconhecimento de alvos não-cooperativos (NCTR). Os resultados mostram performances de detecção fracas usando o teste de decisão simples de Neyman-Pearson como detector e uma boa redução de RCS para todas as posições na gama de frequências selecionada. Um ganho de alcance de detecção máximo 50:9 % foi obtido para o RAM PAniCo, estando de acordo com os resultados experimentais da bibliografia estudada. Já a melhor SE foi verificada para o RAM CFC-Fe e PAniCo

    Air Force Institute of Technology Research Report 2003

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, and Engineering Physics

    State of the art of cyber-physical systems security: An automatic control perspective

    Get PDF
    Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia
    • …
    corecore