Oxford Index Search Results

You are looking at 1-20 of 84 items for:

electronic countermeasures x clear all

electronic countermeasures

Overview page. Subjects: Warfare and Defence.

Actions taken to deny or degrade the enemy's ability to effectively use the electromagnetic spectrum against friendly forces.

See overview in Oxford Index

electronic countermeasures

Overview page. Subjects: Warfare and Defence.

Actions taken to deny or degrade the enemy's ability to effectively use the electromagnetic spectrum against friendly forces.

See overview in Oxford Index

electronic countermeasures

in The Oxford Essential Dictionary of the U.S. Military

January 2001; p ublished online January 2002 .

Reference Entry. Subjects: Military History. 20 words.

actions taken to deny or degrade the enemy's ability to effectively use the electromagnetic spectrum against friendly forces.

ECM

in The Oxford Essential Dictionary of the U.S. Military

January 2001; p ublished online January 2002 .

Reference Entry. Subjects: Military History. 4 words.

abbr. electronic countermeasures.

Raven

in The Oxford Essential Dictionary of the U.S. Military

January 2001; p ublished online January 2002 .

Reference Entry. Subjects: Military History. 53 words.

EF-111A a two-seat specialized tactical jamming aircraft designed to provide electronic countermeasures. It has three operational modes:

a stand-off, remaining

Prowler

in The Oxford Essential Dictionary of the U.S. Military

January 2001; p ublished online January 2002 .

Reference Entry. Subjects: Military History. 64 words.

EA-6B an aircraft developed from the Intruder (EA-6A) and designed to provide electronic countermeasures (ECMs) and an important component of

blank

Overview page. Subjects: Warfare and Defence.

A cartridge containing gunpowder but no bullet, used for training or as a signal.

v.

cover up, obscure, or cause to appear blank or empty: electronic countermeasures blank...

See overview in Oxford Index

Prowler

Overview page. Subjects: Warfare and Defence.

EA-6B an aircraft developed from the Intruder (EA-6A) and designed to provide electronic countermeasures (ECMs) and an important component of the modern carrier air wing. It carries a crew...

See overview in Oxford Index

Raven

Overview page. Subjects: Warfare and Defence.

EF-111A a two-seat specialized tactical jamming aircraft designed to provide electronic countermeasures. It has three operational modes:

a stand-off, remaining in its own airspace...

See overview in Oxford Index

Canberra

Overview page. Subjects: Warfare and Defence.

B-57 a twin-jet aircraft used by the Air Force for more than twenty-five years, starting in the Korean War. It was a nuclear and conventional weapons platform and also used for...

See overview in Oxford Index

A practical approach to achieve private medical record linkage in light of public resources

Mehmet Kuzu, Murat Kantarcioglu, Elizabeth Ashley Durham, Csaba Toth and Bradley Malin.

in Journal of the American Medical Informatics Association

March 2013; p ublished online July 2012 .

Journal Article. Subjects: Medical Statistics and Methodology; Bioinformatics and Computational Biology; Biomathematics and Statistics. 6568 words.

Abstract

Objective Integration of patients' records across resources enhances analytics. To address privacy concerns, emerging strategies such...

War Without Chance

David Betz.

in Carnage and Connectivity

November 2015; p ublished online May 2016 .

Chapter. Subjects: International Relations. 7261 words.

This chapter traces the efforts of armed forces to eliminate chance in warfare through the use of electronic systems and information technology. It explains why these efforts have proved...

Go to »  abstract

Information Security and Patents

Greg R. Vetter.

in Harboring Data

October 2009; p ublished online June 2013 .

Chapter. Subjects: Intellectual Property Law. 11302 words.

This chapter discusses the strategic concerns companies face in deciding whether to patent information security methods. It argues that the full promise of cryptography for information...

Go to Stanford University Press »  abstract

Signaling with Secrets

Brendan Rittenhouse Green and Austin G. Long.

in Cross-Domain Deterrence

April 2019; p ublished online July 2019 .

Chapter. Subjects: International Relations. 12483 words.

How do you credibly communicate a threat that you cannot reveal? This problem is endemic for modern space and cyberspace capabilities, but the challenge of secrecy constraints in...

Go to »  abstract

Coded Communications (Encryption)

Johann-Christoph Woltag.

Reference Entry. Subjects: Public International Law; International Law; Law. 2500 words.

Go to »  abstract

Cyber Operations as Nuclear Counterproliferation Measures

Marco Roscini.

in Journal of Conflict and Security Law

April 2014; p ublished online January 2014 .

Journal Article. Subjects: Public International Law. 12196 words.

Focusing on recent malware that allegedly targeted Iran’s nuclear programme, this article discusses the legality of inter-state cyber operations as measures to prevent the proliferation of...

Humanitarian Financial Intervention

Evan J. Criddle.

in European Journal of International Law

May 2013; p ublished online June 2013 .

Journal Article. Subjects: Public International Law. 16581 words.

Over the past several decades, states have used international asset freezes with increasing frequency as a mechanism for promoting human rights abroad. Yet the international law governing...

Kornegay, Wade M.

Charles W. Jr. Carey.

in African American National Biography

January 2006 .

Reference Entry. Subjects: History. 685 words.

physicist, was born in Mount Olive, North Carolina, to Gilbert and Estelle Kornegay, farmers. By the time he reached age six, both of his parents had died and he had gone to live with...

Forum for Chinese Young Scholars and Ph.D. Candidates of International Law

Zhixiong HUANG, Jiying SONG and Li LIU.

in Chinese Journal of International Law

March 2007; p ublished online March 2007 .

Journal Article. Subjects: International Law. 3023 words.

Abstract

On 27–28 October 2006, Wuhan University Law School, the Institute of International Law and Chinese Society of International Law (CSIL) co-sponsored...

Cyber Security without Cyber War

Mary Ellen O’Connell.

in Journal of Conflict and Security Law

July 2012; p ublished online August 2012 .

Journal Article. Subjects: Public International Law. 10091 words.

Which government agency should have primary responsibility for the Internet? The USA seems to have decided this question in favour of the military—the US military today has the largest...