군통신에서의재밍(Jamming) 기술

JH Kim, EC Kim, JM Lee - Information and Communications …, 2009 - koreascience.kr
최근 전자전 (EW: Electronic Warfare) 은 현대전의 핵심으로 자리매김하고 있다. 전자전에서
재밍 (Jamming) 은 적군의 통신을 교란시키는 전자공격 (EA: Electronic Attack) 을 의미하는 …

Anti-Jamming 기반전술통신기술

이두호, 고병훈, 김광순 - 한국통신학회지(정보와통신), 2007 - dbpia.co.kr
최근 들어 차세대 전술통신 체계인 전술 종합 정보 통신체계 (TICN: tactical information
communication network) 구축 사업이 진행되고 있다. 전술통신 환경에서 고속의 데이터 통신을 …

Information jamming in electronic warfare: operational requirements and techniques

S Vardhan, A Garg - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Information jamming in electronic warfare is a form of electronic attack where jammers
radiate interfering signals toward an enemy's system, blocking the receiver with highly …

Communications electronic countermeasures: an overview

JD Hooper - NASA STI/Recon Technical Report N, 1990 - ui.adsabs.harvard.edu
This report presents a review of the requirements and methods for technically effective
communications jamming. An equation to determine technical jamming effectiveness is …

Modeling and analyzing electromagnetic interference signal in complex battlefield environments

C Liu, R Wu, Z He, X Zhao, H Li, P Wang - Proceedings of the 2015 …, 2016 - Springer
Electronic jamming is the key technology of electronic warfare, for which models and
simulation are studied on noise jamming deception jamming and chaff jamming. In the noise …

Modeling and analyzing interference signal in a complex electromagnetic environment

C Liu, R Wu, Z He, X Zhao, H Li, P Wang - EURASIP Journal on Wireless …, 2016 - Springer
Electronic jamming is the key technology of electronic countermeasure, for which models
and simulations are studied on noise jamming, deception jamming, and chaff jamming. In …

Bittransfer: Mitigating reactive jamming in electronic warfare scenarios

S Sciancalepore, R Di Pietro - IEEE Access, 2019 - ieeexplore.ieee.org
Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able
to disrupt any competing wireless communication in the target area. Reactive jamming …

Jamming technique-cover jamming

D Adamy - Journal of Electronic Defense, 1996 - go.gale.com
The last two" EW 101" columns have classified jamming as either" stand-off" or" self-
protection." Two other important classifications are" cover" and" deceptive." Cover jamming …

[引用][C] Planman structure-a strategy for compromise

LJ McKell, JW Jenkins - Expert Systems Review, 1989 - dl.acm.org
Planman structure-a strategy for compromise | Expert Systems Review skip to main content
ACM Digital Library home ACM home Google, Inc. (search) Advanced Search Browse About …

Introduction to a special session on EMC and information security

Y Hayashi, JG Yook - 2016 URSI Asia-Pacific Radio Science …, 2016 - ieeexplore.ieee.org
This paper introduces the special section on EMC and Information Security. As information
security becomes more important every day, safeguarding security at the physical level is as …