Now showing items 433-452 of 2869

    • CWIX 2015 core experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan; Brannsten, Marianne R. (2015-10-19)
      This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) Focus Area at CWIX 2015 and gives a brief overview of the full set of SOArelated experimentation. The report has ...
    • CWIX 2016 core services experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan; Lund, Ketil (2017-03-17)
      This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) focus area at CWIX 2016. This report gives a brief overview of the full set of SOA-related experimentation at ...
    • Cyberdomenet, cybermakt og norske interesser 

      Kveberg, Torbjørn; Johnsen, Siw Tynes (2014-03-05)
      Formålet med denne rapporten er å belyse hvordan cyberdomenet og cybermakt er relevant for norske interesser i en globalisert verden. Denne kunnskapen skal bidra i prosjektets videre arbeid med Forsvarets mulige fremtidige ...
    • Cyberoperasjoner i et statsperspektiv – utfordringer og analytiske verktøy for militær kontekst 

      Thuv, Aasmund; Enemo, Geir; Kveberg, Torbjørn (2023-06-30)
      FFI-prosjekt «Forsvarets bruk av det elektromagnetiske og digitale rom» har blant annet som formål å gjøre forsvarssektoren bedre i stand til å gjøre helhetlige vurderinger og forbedringer av cyberoperasjoner. Det gjelder ...
    • Cybersecurity and cryptographic methods in unmanned systems - a study of the current state in unmanned aerial vehicles and similar systems 

      Wiik, Jan Henrik (2020-06-24)
      In this report, we present common attack methods against unmanned systems and the cryptographic solutions that are commonly implemented to address these issues. We also detail many concrete studies of unmanned aerial ...
    • Cyberspace som slagmark : refleksjoner omkring internett som arena for terrorangrep 

      Johansen, Iver (2004)
      This report outlines a possible disabling attack against the Internet. The attack is described in scenario terms as an attack from a hostile group intent on causing severe damage to modern societies world wide. The main ...
    • D2-3a: System simulator instruction manual 

      Author::Olsen Øystein (2017-12-08)
      VHF Data Exchange System (VDES) is a future maritime communication system. Its development is coordinated by the International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA). The system has ...
    • D2.1 Scenario template, existing CBRN scenarios and historical incidents 

      Endregard, Monica; Breivik, Hanne; Heireng, Hege Schultz; Enger, Elin; Sandrup, Therese; Kelly, Dominic (2011)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...
    • D2.2 Reference set of CBRN scenarios 

      Endregard, Monica; Breivik, Hanne; Heireng, Hege Schultz; Sandrup, Therese; Fonteyne, Pierre-Alain; Eriksson, Håkan; Kelly, Dominic (2012-08-03)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...
    • D2.3A Critical event parameters 

      Breivik, Hanne; Endregard, Monica; Heireng, Hege Schultz; Bastings, Ingrid; Peters, Clara; Wevers, Jeroen (2012-08-06)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...
    • The Dalton quantum chemistry program system 

      Aidas, Kestutis; Angeli, Celestino; Bak, Keld L.; Bakken, Vebjørn; Bast, Radovan; Boman, Linus; Christiansen, Ove; Cimiraglia, Renzo; Coriani, Sonja; Dahle, Pål; Dalskov, Erik K.; Ekström, Ulf Egil; Enevoldsen, Thomas; Eriksen, Janus J.; Ettenhuber, Patrick; Fernández, Berta; Ferrighi, Lara; Fliegl, Heike; Frediani, Luca; Hald, Kasper; Halkier, Asger; Hattig, Christof; Heiberg, Hanne; Helgaker, Trygve; Hennum, Alf Christian; Hettema, Hinne; Hjertenæs, Eirik; Høst, Stine; Høyvik, Ida Marie; Iozzi, Maria Francesca; Jansik, Brannislav; Jensen, Hans-Jørgen Aa.; Jonsson, Dan Johan; Jørgensen, Poul; Kauczor, Johanna; Kirpekar, Sheela; Kjærgaard, Thomas; Klopper, Wim; Knecht, Stefan; Kobayashi, Rika; Koch, Henrik; Kongsted, Jacob; Krapp, Andreas; Kristensen, Kasper; Ligabue, Andrea; Lutnæs, Ola B.; Melo, Juan I.; Mikkelsen, Kurt V.; Myhre, Rolf Heilemann; Neiss, Christian; Nielsen, Christian B.; Norman, Patrick; Olsen, Jeppe; Olsen, Jogvan Magnus H.; Osted, Anders; Packer, Martin J.; Pawlowski, Filip; Pedersen, Thomas Bondo; Provasi, Patricio F.; Reine, Simen Sommerfelt; Rinkevicius, Zilvinas; Ruden, Torgeir A.; Ruud, Kenneth; Rybkin, Vladimir V.; Salek, Pawel; Samson, Claire C. M.; Sanchez de Meras, Alfredo; Saue, Trond; Sauer, Stephan P. A.; Schimmelpfennig, Bernd; Sneskov, Kristian; Steindal, Arnfinn Hykkerud; Sylvester-Hvid, Kristian O.; Taylor, Peter R.; Teale, Andrew M.; Tellgren, Erik; Tew, David P.; Thorvaldsen, Andreas J.; Thøgersen, Lea; Vahtras, Olav; Watson, Mark A.; Wilson, David J. D.; Ziolkowski, Marcin; Ågren, Hans (2014)
      Dalton is a powerful general-purpose program system for the study of molecular electronic structure at the Hartree–Fock, Kohn–Sham, multiconfigurational self-consistent-field, Møller–Plesset, configuration-interaction, and ...
    • Damper models and their impact on shock response 

      Andreassen, Øyvind (2022-10-26)
      Mechanical vibration and shocks may be devastating, in particular to military equipment. Therefore, vibration and shock damping are of crucial importance to military hardware. Vibrations can cause material fatigue. They ...
    • Data acquisition software for Fabry-Perot based fiber Bragg grating interrogation hardware 

      Sagvolden, Geir (2000)
      This report documents the data acquisition software developed during project 711 “Fiberoptisk Skrogovervåkning” for interrogation of Fabry-Perot filter based fiber Bragg grating interrogation hardware. The report describes ...
    • Data leakage from Android smartphones 

      Øverlier, Lasse (2012-06-06)
      We are in this report giving an overview of what information a smartphone is leaking through normal usage. Our experiment intercepted all traffic, both plain text and encrypted traffic. From this data we examined which ...
    • Data loss prevention based on text classification in controlled environments 

      Kongsgård, Kyrre Wahl; Nordbotten, Nils Agne; Mancini, Federico; Engelstad, Paal E. (2016)
      Loss of sensitive data is a common problem with potentially severe consequences. By categorizing documents according to their sensitivity, security controls can be performed based on this classification. However, errors ...
    • Data-Driven Autocalibration for Swath Sonars 

      Lønmo, Tor Inge Birkenes; Austeng, Andreas; Hansen, Roy Edgar (2020-12-20)
      Sidelobes in swath sonar water column imagery can obscure targets of interest and create erroneous bottom detections. Differences between ideal and actual element responses limit the achievable sidelobe level for practical ...
    • Data-driven behavior modeling for computer generated forces – a literature survey 

      Author::Løvlid, Rikke Amilde; Author::Luotsinen, Linus J.; Author::Kamrani, Farzad; Author::Toghiani-Rizi, Babak (2017-12-01)
      Computer Generated Forces (CGFs) have been used within military simulation-based, training and decision support applications for decades. CGFs are autonomous or semi-autonomous entities that typically represent military ...
    • Database for ikke-dødelige våpen : brukerveiledning 

      Arnesen, Odd Harry (2004)
      This publication is a user guide to and documentation for FFI's database for Non Lethal Weapon systems, ammunition, technologies and capabilities. The database also contains reference data such as documents, illustrations ...
    • Datadistribusjon i divisjonens K2IS 

      Farsund, Bodil Hvesser; Jensvoll, Audun; Sander, Jostein (1997)
    • Datainnsamling for analyser av sosiale medier i en totalforsvarssammenheng – metoder og implikasjoner 

      Rosvold, Gard-Inge; Bergh, Arild (2022-07-04)
      Nasjonale trusselvurderinger i 2022 viser til en økning av statlige aktørers bruk av sosiale me-dier for å spre desinformasjon og utøve påvirkning for å skade demokratiske land. Det er også en markant økning i ikke-statlige ...