Logo des Repositoriums
 

Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications

dc.contributor.authorOpitz, Felix
dc.contributor.authorDästner, Kaeye
dc.contributor.authorKausch, Thomas
dc.contributor.editorHerzog, Otthein
dc.contributor.editorRödiger, Karl-Heinz
dc.contributor.editorRonthaler, Marc
dc.contributor.editorKoschke, Rainer
dc.date.accessioned2019-05-15T09:04:51Z
dc.date.available2019-05-15T09:04:51Z
dc.date.issued2007
dc.description.abstractThe asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of interest in various environments: air respectively maritime traffic, air defence, force protection in out of area missions, harbour protection, coastal surveillance, or the security of naval platforms operating in critical environments, like littoral. A vital factor in anti asymmetric warfare is to ensure own information superiority. This leads to new requirements and very new concepts for design, implementation and integration of the information fusion and the visualisation of the results.en
dc.identifier.isbn978-3-88579-206-1
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/22472
dc.language.isoen
dc.publisherGesellschaft für Informatik e. V.
dc.relation.ispartofInformatik 2007 – Informatik trifft Logistik – Band 2
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-110
dc.titleTracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applicationsen
dc.typeText/Conference Paper
gi.citation.endPage164
gi.citation.publisherPlaceBonn
gi.citation.startPage160
gi.conference.date24.-27. September 2007
gi.conference.locationBremen
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
160.pdf
Größe:
865.47 KB
Format:
Adobe Portable Document Format