Now showing items 248-267 of 1943

    • Counter biological and chemical terrorism - WP8000: conclusions and recommendations 

      Endregard, Monica; Bjerke, Audun; Dugauquier, Christian; Dhermain, Joel; Giovanni, Petronio; Ybarra, Carmen; Bueno, Inma; Engman, Lena Karlsson (2009)
      This report constitutes an unclassified summary of the main results and conclusions of the European Defence Agency project “Counter Biological and Chemical Terrorism”, EDA-0156-GEM3-ERG. The overall objective has been is ...
    • Counterinsurgency - when theory meets reality - seminar report 

      Ravndal, Jacob Aasland (2009)
      This report is the end-product of a one-day seminar on counterinsurgency (COIN) arranged by the Norwegian MNE-6 Working Group. Hence, the majority of arguments presented in the report are primarily based on viewpoints ...
    • Counterinsurgency Field Manual 3-24 and operations 

      Nyhamar, Tore (2009)
      The purpose of this report is fourfold. The first is to highlight the key tenets of FM 3-24. The idea that sets counterinsurgency apart from conventional military operations – that it is more important to secure the host ...
    • Cracking mechanisms in ceramic armor – analytical solutions and finite element simulations 

      Jakobsen, Martin Fonnum (2023-12-20)
      The subject of this report is the physics governing ballistic impact on ceramic plates. The report has several goals: • Develop FFI’s basic knowledge of ballistic impact phenomena. • Provide a general literature review ...
    • Creating computational meshes from geographical information-system data for urban environments a general and robust methodology 

      Author::Fossum, Hannibal E.; Author::Helgeland, Anders (2017-09-21)
      The present report details appropriate methodology and choice of parameters for the conversion of graphical information-system data into computational meshes suitable for computational fluid dynamics (CFD) simulations. ...
    • Critical diameter RDX/GAP propellant 

      Author::Nevstad, Gunnar Ove (2018-03-20)
      To type qualify the solid propellant D-07 according to the STANAG 4170 and the accompanying AOP-7, critical diameter has been determined. Two different methods have been applied. First, casted conical test items were ...
    • Cross-domain access control in a military SOA 

      Nordbotten, Nils Agne (2009)
      A service-oriented architecture provides the advantage of facilitating integration and information exchange between different administrative domains (e.g., between the nations within a coalition). In order to support ...
    • Cross-domain communication using an XMPP chat guard 

      Author::Haakseth, Raymond; Author::Brønstad, Oddvar; Author::Jonsson, Øyvind; Author::Kristiansen, Bengt; Author::Nordbotten, Nils Agne (2017-09-08)
      In current and future military operations the capability to communicate, distribute and share information is vital. Information superiority is achieved through the gathering, processing and sharing of data from sensors ...
    • Crowd dynamics modelling : a literature study 

      Børve, Steinar (2014-01-20)
      The dynamics of human crowds is an interesting, but highly complex topic, and phenomena have been observed ranging from well-organized structure formation leading to quasi steady-state equilibrium to violent and turbulent ...
    • Crowds2D - a new, robust crowd dynamics simulation model 

      Børve, Steinar (2016-01-13)
      The Norwegian Armed Forces have over the last few years given priority to the procurement of less-lethal weapons (LLW) for use in certain scenarios. The purpose of FFI project 1255 has therefore been to support the armed ...
    • CWIX 2014 core enterprise services experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan (2014-11-14)
      This report covers the experiments conducted by the participants in the Service-Oriented Architecture (SOA) Focus Area at CWIX 2014. FFI participated in a subset of these experiments, as a preparation for a larger ...
    • CWIX 2015 core experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan; Brannsten, Marianne R. (2015-10-19)
      This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) Focus Area at CWIX 2015 and gives a brief overview of the full set of SOArelated experimentation. The report has ...
    • CWIX 2016 core services experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan; Lund, Ketil (2017-03-17)
      This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) focus area at CWIX 2016. This report gives a brief overview of the full set of SOA-related experimentation at ...
    • Cyberdomenet, cybermakt og norske interesser 

      Kveberg, Torbjørn; Johnsen, Siw Tynes (2014-03-05)
      Formålet med denne rapporten er å belyse hvordan cyberdomenet og cybermakt er relevant for norske interesser i en globalisert verden. Denne kunnskapen skal bidra i prosjektets videre arbeid med Forsvarets mulige fremtidige ...
    • Cyberoperasjoner i et statsperspektiv – utfordringer og analytiske verktøy for militær kontekst 

      Thuv, Aasmund; Enemo, Geir; Kveberg, Torbjørn (2023-06-30)
      FFI-prosjekt «Forsvarets bruk av det elektromagnetiske og digitale rom» har blant annet som formål å gjøre forsvarssektoren bedre i stand til å gjøre helhetlige vurderinger og forbedringer av cyberoperasjoner. Det gjelder ...
    • Cybersecurity and cryptographic methods in unmanned systems - a study of the current state in unmanned aerial vehicles and similar systems 

      Wiik, Jan Henrik (2020-06-24)
      In this report, we present common attack methods against unmanned systems and the cryptographic solutions that are commonly implemented to address these issues. We also detail many concrete studies of unmanned aerial ...
    • Cyberspace som slagmark : refleksjoner omkring internett som arena for terrorangrep 

      Johansen, Iver (2004)
      This report outlines a possible disabling attack against the Internet. The attack is described in scenario terms as an attack from a hostile group intent on causing severe damage to modern societies world wide. The main ...
    • D2-3a: System simulator instruction manual 

      Author::Olsen Øystein (2017-12-08)
      VHF Data Exchange System (VDES) is a future maritime communication system. Its development is coordinated by the International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA). The system has ...
    • D2.1 Scenario template, existing CBRN scenarios and historical incidents 

      Endregard, Monica; Breivik, Hanne; Heireng, Hege Schultz; Enger, Elin; Sandrup, Therese; Kelly, Dominic (2011)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...
    • D2.2 Reference set of CBRN scenarios 

      Endregard, Monica; Breivik, Hanne; Heireng, Hege Schultz; Sandrup, Therese; Fonteyne, Pierre-Alain; Eriksson, Håkan; Kelly, Dominic (2012-08-03)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...