Now showing items 255-274 of 1943

    • Cross-domain communication using an XMPP chat guard 

      Author::Haakseth, Raymond; Author::Brønstad, Oddvar; Author::Jonsson, Øyvind; Author::Kristiansen, Bengt; Author::Nordbotten, Nils Agne (2017-09-08)
      In current and future military operations the capability to communicate, distribute and share information is vital. Information superiority is achieved through the gathering, processing and sharing of data from sensors ...
    • Crowd dynamics modelling : a literature study 

      Børve, Steinar (2014-01-20)
      The dynamics of human crowds is an interesting, but highly complex topic, and phenomena have been observed ranging from well-organized structure formation leading to quasi steady-state equilibrium to violent and turbulent ...
    • Crowds2D - a new, robust crowd dynamics simulation model 

      Børve, Steinar (2016-01-13)
      The Norwegian Armed Forces have over the last few years given priority to the procurement of less-lethal weapons (LLW) for use in certain scenarios. The purpose of FFI project 1255 has therefore been to support the armed ...
    • CWIX 2014 core enterprise services experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan (2014-11-14)
      This report covers the experiments conducted by the participants in the Service-Oriented Architecture (SOA) Focus Area at CWIX 2014. FFI participated in a subset of these experiments, as a preparation for a larger ...
    • CWIX 2015 core experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan; Brannsten, Marianne R. (2015-10-19)
      This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) Focus Area at CWIX 2015 and gives a brief overview of the full set of SOArelated experimentation. The report has ...
    • CWIX 2016 core services experimentation 

      Bloebaum, Trude H.; Johnsen Frank Trethan; Lund, Ketil (2017-03-17)
      This report covers the experiments conducted by the participants in the Service Oriented Architecture (SOA) focus area at CWIX 2016. This report gives a brief overview of the full set of SOA-related experimentation at ...
    • Cyberdomenet, cybermakt og norske interesser 

      Kveberg, Torbjørn; Johnsen, Siw Tynes (2014-03-05)
      Formålet med denne rapporten er å belyse hvordan cyberdomenet og cybermakt er relevant for norske interesser i en globalisert verden. Denne kunnskapen skal bidra i prosjektets videre arbeid med Forsvarets mulige fremtidige ...
    • Cyberoperasjoner i et statsperspektiv – utfordringer og analytiske verktøy for militær kontekst 

      Thuv, Aasmund; Enemo, Geir; Kveberg, Torbjørn (2023-06-30)
      FFI-prosjekt «Forsvarets bruk av det elektromagnetiske og digitale rom» har blant annet som formål å gjøre forsvarssektoren bedre i stand til å gjøre helhetlige vurderinger og forbedringer av cyberoperasjoner. Det gjelder ...
    • Cybersecurity and cryptographic methods in unmanned systems - a study of the current state in unmanned aerial vehicles and similar systems 

      Wiik, Jan Henrik (2020-06-24)
      In this report, we present common attack methods against unmanned systems and the cryptographic solutions that are commonly implemented to address these issues. We also detail many concrete studies of unmanned aerial ...
    • Cyberspace som slagmark : refleksjoner omkring internett som arena for terrorangrep 

      Johansen, Iver (2004)
      This report outlines a possible disabling attack against the Internet. The attack is described in scenario terms as an attack from a hostile group intent on causing severe damage to modern societies world wide. The main ...
    • D2-3a: System simulator instruction manual 

      Author::Olsen Øystein (2017-12-08)
      VHF Data Exchange System (VDES) is a future maritime communication system. Its development is coordinated by the International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA). The system has ...
    • D2.1 Scenario template, existing CBRN scenarios and historical incidents 

      Endregard, Monica; Breivik, Hanne; Heireng, Hege Schultz; Enger, Elin; Sandrup, Therese; Kelly, Dominic (2011)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...
    • D2.2 Reference set of CBRN scenarios 

      Endregard, Monica; Breivik, Hanne; Heireng, Hege Schultz; Sandrup, Therese; Fonteyne, Pierre-Alain; Eriksson, Håkan; Kelly, Dominic (2012-08-03)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...
    • D2.3A Critical event parameters 

      Breivik, Hanne; Endregard, Monica; Heireng, Hege Schultz; Bastings, Ingrid; Peters, Clara; Wevers, Jeroen (2012-08-06)
      The overall aim of the project “Preparedness and Resilience Against CBRN Terrorism using Integrated Concepts and Equipment” (PRACTICE) is to improve the ability to respond to and recover from a Chemical (C), Biological ...
    • Damper models and their impact on shock response 

      Andreassen, Øyvind (2022-10-26)
      Mechanical vibration and shocks may be devastating, in particular to military equipment. Therefore, vibration and shock damping are of crucial importance to military hardware. Vibrations can cause material fatigue. They ...
    • Data acquisition software for Fabry-Perot based fiber Bragg grating interrogation hardware 

      Sagvolden, Geir (2000)
      This report documents the data acquisition software developed during project 711 “Fiberoptisk Skrogovervåkning” for interrogation of Fabry-Perot filter based fiber Bragg grating interrogation hardware. The report describes ...
    • Data leakage from Android smartphones 

      Øverlier, Lasse (2012-06-06)
      We are in this report giving an overview of what information a smartphone is leaking through normal usage. Our experiment intercepted all traffic, both plain text and encrypted traffic. From this data we examined which ...
    • Data-driven behavior modeling for computer generated forces – a literature survey 

      Author::Løvlid, Rikke Amilde; Author::Luotsinen, Linus J.; Author::Kamrani, Farzad; Author::Toghiani-Rizi, Babak (2017-12-01)
      Computer Generated Forces (CGFs) have been used within military simulation-based, training and decision support applications for decades. CGFs are autonomous or semi-autonomous entities that typically represent military ...
    • Database for ikke-dødelige våpen : brukerveiledning 

      Arnesen, Odd Harry (2004)
      This publication is a user guide to and documentation for FFI's database for Non Lethal Weapon systems, ammunition, technologies and capabilities. The database also contains reference data such as documents, illustrations ...
    • Datadistribusjon i divisjonens K2IS 

      Farsund, Bodil Hvesser; Jensvoll, Audun; Sander, Jostein (1997)