smart defense
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 3)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Fan Zhang ◽  
Yusu Huang

As emerging technologies in information security protection, trusted computing and blockchain can guarantee a safe and reliable operating environment and management mechanism in the Power Distribution IoT. Relying on the comprehensive evaluation algorithm of fuzzy mathematics set theory in this paper, a blockchain-based distributed decision-making and collaborative autonomy model for the power distribution IoT is built, and the “manageable and controllable, precise protection, visible and credible, and smart defense” security protection model is established to carry out trusted computing and privacy protection of computer blockchain IoT nodes, and the information security defense level of the distribution network is improved comprehensively.


2020 ◽  
Vol 20 (3) ◽  
pp. 187-195
Author(s):  
Hyochun Ahn ◽  
Kukjoo Kim ◽  
Hyeonsang Yang ◽  
Kyu Dok Hong ◽  
Young Jun Park

This study aims to derive the required operational capability for the defense drone system against hostile drones in national important facilities. For the Delphi survey, the panel comprises 30 experts related to the defense drone system as well as anti-aircraft operations. The first questionnaire investigates the considerations required for the operational capabilities, and then their agreements on each extracted consideration are analyzed statistically in the second to fourth questionnaire. Consequently, 15 final considerations are reclassified with five factors such as detecting, Enterprise data sharing, incapacitating, identifying and tracking, and universal supporting.


Author(s):  
Y. Danуk ◽  
S. Vdovenko

The growing role and importance of solving the problems of cybersecurity and cyber defense is due to the innovative development of information, electronic and cyber technologies, which are the driving force behind a number of trends in military affairs. Due to the formation and recognition of the artificial fifth space - cyberspace, as a separate area of struggle between states, including armed confrontation, issues of cybersecurity and cyber defense have become urgent in ensuring national security and defense of developed states, which pay special attention to the formation and development of cybersecurity and cyber defense systems as the main factor achievements of military-strategic superiority in ensuring national security and defense in modern variables and future conditions. The article analyzes the general principles of building cybersecurity and cyber defense systems of the advanced states of the world in the context of the possibility and expediency of introducing their experience in Ukraine; analysis of the conditions, current status and problematic issues of the formation of cybersecurity and cyber defense systems in Ukraine. In particular: the lack of basic theoretical and applied provisions for the formation of a cyber defense system; lack of a national military command and control agency in the field of cyber defense; the dispersed efforts of various military organizational structures in solving cybersecurity problems and the lack of formulated cyber defense tasks. The most rational option of creating systems and structures of cybersecurity and cyber defense of Ukraine with subsystems of education and science is proposed, which, in accordance with modern development trends, taking into account the military-political situation, national interests and legislation, will provide informational, cybernetic and cognitive superiority over the enemy and will contribute to the practical implementation of the concept of “smart defense” adopted in NATO countries.


2014 ◽  
Vol 38 (3) ◽  
pp. 323-328
Author(s):  
Kyo-Il Chung ◽  
So Yeon Lee ◽  
Sangjoon Park ◽  
Jonghyun Park ◽  
Sang-Cheol Han

2014 ◽  
Author(s):  
Stephen M. Saideman ◽  
David P. Auerswald ◽  
Stefanie von Hlatky
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document