Co-evolutionary Data Mining to Discover Rules for Fuzzy Resource Management
IDEAL '02 Proceedings of the Third International Conference on Intelligent Data Engineering and Automated Learning
Multi-agent Fuzzy Logic Resource Manager
IDEAL '02 Proceedings of the Third International Conference on Intelligent Data Engineering and Automated Learning
Virtex Implementation of Pipelined Adaptive LMS Predictor in Electronic Support Measures Receiver
FPL '01 Proceedings of the 11th International Conference on Field-Programmable Logic and Applications
Data Mining for Fuzzy Decision Tree Structure with a Genetic Program
IDEAL '02 Proceedings of the Third International Conference on Intelligent Data Engineering and Automated Learning
CFAR Adaptive threshold for ESM receiver with logarithmic amplification
Signal Processing
High Speed FPGA-Based Implementations of Delayed-LMS Filters
Journal of VLSI Signal Processing Systems
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Evolving fuzzy decision tree structure that adapts in real-time
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
Anti-jamming timing channels for wireless networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
Multi-resistant radar jamming using genetic algorithms
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
A model of pulse signals above 100 MHz in the electromagnetic environment
International Journal of Information and Communication Technology
Distributed jammer network: impact and characterization
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Application of blind source separation to time delay estimation in interference environments
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
Fuzzy logic resource manager: fuzzy rules and experiments
AI*IA'05 Proceedings of the 9th conference on Advances in Artificial Intelligence
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
Analysis and Evaluation of Jammer Interference in LTE
Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
Hi-index | 0.00 |
From the Publisher:Here's an advanced practitioner's guide to the latest concepts and threats associated with modern electronic warfare (EW). This new book identifies and explains the newest radar and communications threats, and provides EW and radar engineers, managers, and technical professionals with practical, "how-to" information on designing and implementing ECM and ECCM systems. Written by a world-renowned expert in radar and electronic warfare, the book helps you develop state-of-the-art ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates the latest ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other well-structured sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, jammer upgrading procedures, and much more.