Browsing by Title
Now showing items 433-452 of 2876
-
CWIX 2014 core enterprise services experimentation
(2014-11-14)This report covers the experiments conducted by the participants in the Service-Oriented Architecture (SOA) Focus Area at CWIX 2014. FFI participated in a subset of these experiments, as a preparation for a larger ... -
CWIX 2015 core experimentation
(2015-10-19)This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) Focus Area at CWIX 2015 and gives a brief overview of the full set of SOArelated experimentation. The report has ... -
CWIX 2016 core services experimentation
(2017-03-17)This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) focus area at CWIX 2016. This report gives a brief overview of the full set of SOA-related experimentation at ... -
Cyberdomenet, cybermakt og norske interesser
(2014-03-05)Formålet med denne rapporten er å belyse hvordan cyberdomenet og cybermakt er relevant for norske interesser i en globalisert verden. Denne kunnskapen skal bidra i prosjektets videre arbeid med Forsvarets mulige fremtidige ... -
Cyberoperasjoner i et statsperspektiv – utfordringer og analytiske verktøy for militær kontekst
(2023-06-30)FFI-prosjekt «Forsvarets bruk av det elektromagnetiske og digitale rom» har blant annet som formål å gjøre forsvarssektoren bedre i stand til å gjøre helhetlige vurderinger og forbedringer av cyberoperasjoner. Det gjelder ... -
Cybersecurity and cryptographic methods in unmanned systems - a study of the current state in unmanned aerial vehicles and similar systems
(2020-06-24)In this report, we present common attack methods against unmanned systems and the cryptographic solutions that are commonly implemented to address these issues. We also detail many concrete studies of unmanned aerial ... -
Cyberspace som slagmark : refleksjoner omkring internett som arena for terrorangrep
(2004)This report outlines a possible disabling attack against the Internet. The attack is described in scenario terms as an attack from a hostile group intent on causing severe damage to modern societies world wide. The main ... -
D2-3a: System simulator instruction manual
(2017-12-08)VHF Data Exchange System (VDES) is a future maritime communication system. Its development is coordinated by the International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA). The system has ... -
D2.1 Scenario template, existing CBRN scenarios and historical incidents
(2011)The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ... -
D2.2 Reference set of CBRN scenarios
(2012-08-03)The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ... -
D2.3A Critical event parameters
(2012-08-06)The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ... -
The Dalton quantum chemistry program system
(2014)Dalton is a powerful general-purpose program system for the study of molecular electronic structure at the Hartree–Fock, Kohn–Sham, multiconfigurational self-consistent-field, Møller–Plesset, configuration-interaction, and ... -
Damper models and their impact on shock response
(2022-10-26)Mechanical vibration and shocks may be devastating, in particular to military equipment. Therefore, vibration and shock damping are of crucial importance to military hardware. Vibrations can cause material fatigue. They ... -
Data acquisition software for Fabry-Perot based fiber Bragg grating interrogation hardware
(2000)This report documents the data acquisition software developed during project 711 “Fiberoptisk Skrogovervåkning” for interrogation of Fabry-Perot filter based fiber Bragg grating interrogation hardware. The report describes ... -
Data leakage from Android smartphones
(2012-06-06)We are in this report giving an overview of what information a smartphone is leaking through normal usage. Our experiment intercepted all traffic, both plain text and encrypted traffic. From this data we examined which ... -
Data loss prevention based on text classification in controlled environments
(2016)Loss of sensitive data is a common problem with potentially severe consequences. By categorizing documents according to their sensitivity, security controls can be performed based on this classification. However, errors ... -
Data-Driven Autocalibration for Swath Sonars
(2020-12-20)Sidelobes in swath sonar water column imagery can obscure targets of interest and create erroneous bottom detections. Differences between ideal and actual element responses limit the achievable sidelobe level for practical ... -
Data-driven behavior modeling for computer generated forces – a literature survey
(2017-12-01)Computer Generated Forces (CGFs) have been used within military simulation-based, training and decision support applications for decades. CGFs are autonomous or semi-autonomous entities that typically represent military ... -
Database for ikke-dødelige våpen : brukerveiledning
(2004)This publication is a user guide to and documentation for FFI's database for Non Lethal Weapon systems, ammunition, technologies and capabilities. The database also contains reference data such as documents, illustrations ... -
Datadistribusjon i divisjonens K2IS
(1997)