• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 596
  • 143
  • 34
  • 33
  • 28
  • 24
  • 12
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 6
  • 4
  • Tagged with
  • 1126
  • 252
  • 209
  • 146
  • 133
  • 119
  • 112
  • 112
  • 104
  • 101
  • 98
  • 95
  • 83
  • 82
  • 79
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

From sticks and stones to zeros and ones the development of computer network operations as an element of warfare : a study of the Palestinian-Israeli cyberconflict and what the United States can learn from the "Interfada"

Wrona, Jacqueline-Marie Wilson. 09 1900 (has links)
The Palestinian-Israeli Cyberconflict erupted in 2000, when Israeli hackers crippled the prime website of Hezbollah by mobilizing pro-Israeli supporters to "bomb" the site with automated floods of electronic mail. In retaliation, Hezbollah rallied pro-Arab supporters for a counter-attack, which soon downed the main Israeli government website and the Israeli Foreign Ministry site. Attacks involving website defacements, denial-of-service, viruses, and Trojan horses occurred by both parties for a span of months, effectively shutting down websites, disrupting Internet service and e-commerce. A study and analysis of the utilization and effects of Computer Network Operations (CNO) between pro-Israeli and pro-Palestinian actors during the al-Aqsa Intifada may highlight current trends in warfare, support the notion that information may level the battlefield, and provide the United States with the means to better protect itself against such attacks in the future. This thesis seeks to collect, classify, analyze, define, and resolve IO/IW; the utilization and effects of CNO during the Al-Aqsa Intifada, and how such analysis can be applied to United States national security.
122

Integrated swarming operations for air base defense applications in irregular warfare

Gray, Ron 06 1900 (has links)
For decades our military has been designed and funded as a conventionally superior force on the battlefield employing the most devastating and advanced weapon systems the world has ever seen (World, War I, II, Operation Desert Storm, and Phase I of Operation Iraqi Freedom). However, in low intensity conflicts (LICs) or irregular warfare (IW) campaigns, U.S. forces are faced with an irregular enemy, one that does not choose to fight our forces directly but rather through unconventional or indirect methods. For over 60 years, the Department of Defense has had an appalling record of protecting its air bases and personnel while deployed around the world in support of low intensity conflicts. However, the way the military defends and protects these air bases still revolves around a Cold War threat, a conventional threat. The strategy of global power projection and forward presence are the cornerstone to U.S. defense. To enhance combat capabilities in the Air Force and to defeat irregular warfare (IW) forces in any environment, the answer lies within the concept of Integrated Swarming Operations (ISO); the complete integration of a highly trained security force, skilled in the employment of successful counterinsurgency tactics, techniques, and procedures (TTPs), with today's most sophisticated Command, Control, Communications, Computer and Intelligence, Surveillance, and Reconnaissance (C4ISR) platforms into a battlefield swarm. In doing so, ISO allows security forces to achieve their three critical air base defense Mission Essential Tasks (METs) of 1) tactical ISR, 2) intercepting the threat, and 3) application of force as well as the Air Force's Integrated Base Defense (IBD) Objectives of "See First, Understand First, and Act First." / US Air Force (USAF) author.
123

Implementation of a modular Fly away Kits (FLAK) for C4ISR in order to counter asymmetric threats in the coalition riverine and maritime theatres

Hochstedler, Robert A. 06 1900 (has links)
This research analyzes the design and implementation of a Maritime Command, Control, Computer, and Communications for Intelligence, Surveillance, and Reconnaissance (C4ISR) fly away kit (FLAK) in order to combat asymmetric threats in the coalition maritime environment. This FLAK will be modular, adaptable, scalable, and secure end to end, composed of routable networks, and built entirely from commercial off the shelf technologies (COTS). Basing measures of effectiveness (MOE) on the recently published Quadrennial Defense Report (QDR) and the Numbered Fleet Commanders Communication Message, these kits will be tested with the goal of fulfilling thirteen of the fifteen high priority short-falls in the modern United States CIV-MIL and Coalition Forces' abilities to conduct multiple missions in the current brown (riverine), green (littoral), and blue (deep water) operational theatres. The Maritime FLAK will be designed with the intent of increasing the US forward presence and extending the C4ISR into restricted maritime theatres. Since US forces cannot intervene directly into regions like the Straits of Malacca, but can support coalition forces through advisors and technological adaptations, modular solutions to extend C4ISR into these maritime territories are needed. Furthermore, due to the adaptability and scalability of the technologies to be implemented into the maritime FLAK, these completed kits will be able to be used by the recently formed Naval Expeditionary Combat Command (NECC) in current operations in the Global War on Terrorism. / US Navy (USN) author.
124

The fallacy of single source fire support

Aitken, David M. 06 1900 (has links)
Approved for public release; distribution is unlimited / This thesis examines the reliance on air power for fire support by light forces and whether other fire support assets could perform these missions better. By studying the historical evolution of fire support, air power and small wars doctrine, patterns emerge in how these developments interrelate. These patterns have led to a system that does not take advantage of some of the capabilities of other fire support assets, mainly artillery and mortars. The case of Operation Enduring Freedom, in Afghanistan, highlights how light forces have come to depend on airpower. Could other forms of fire support have provided coverage that would have been more effective than the air support received? Light forces need to be aware that they have more choices for fire support than calling in air strikes and that artillery and mortars provide capabilities that air power cannot currently duplicate. Afghanistan demonstrated that artillery remains relevant. In a very permissive environment with few competing missions, there were times when air power could not provide the needed fire support to the ground maneuver forces. / Major, United States Army
125

High altitude warfare: the Kargil Conflict and the future

Acosta, Marcus P. 06 1900 (has links)
Approved for public release, distribution is unlimited / The unique combination of thin air, freezing temperatures, and mountainous terrain that forms the high altitude environment has resisted advances in military technology for centuries. The emergence of precision warfare has altered the nature of warfare on most of the world's surface, yet has not significantly changed the conduct of ground combat at high altitude. The tactics that lead to victory on the high altitude battlefield have remained constant over time. This thesis examines the impact of the high altitude environment on soldiers, their weapons, and military operations, and identifies the lessons of the 1999 Kargil Conflict that are relevant to future high altitude combat. Combat at altitudes approaching 18,000 feet (5,485 m) above sea level between India and Pakistan at Kargil illustrates the timeless nature of high altitude warfare. U.S. combat experiences in the mountains of Afghanistan in 2002 parallel those of the combatants at Kargil despite the overwhelming technological advantage of U.S. forces. Trained and wellequipped light infantry is the only force capable of decisive maneuver in mountainous terrain. Heavy volumes of responsive firepower, in concert with bold maneuver, determine victory. Artillery, rather than air power, remains the preferred source of firepower to support ground maneuver. / Captain, United States Army
126

The Philippine Insurrection the U.S. Navy in a military operation other than war, 1899-1902

Carlson, Ted W. 12 1900 (has links)
Approved for public release; distribution in unlimited. / U.S. naval doctrine has been dominated by the Mahanian concept of massing large capital ships for over one hundred years. Yet, it was a Cyclone-class patrol craft, a USCG cutter, and an Australian frigate that pushed up the Khor-Abd-Allah waterway and opened up the port of Umm Qasr, Iraq, during the Second Gulf War. They continue to protect it and the surrounding oil infrastructure from attack from insurgents and terrorists today. With the navy's current interest in transformation, the question arises, is the navy as presently configured well suited for today's threats? This thesis explores the question of how should the navy meet threats to national interests. This is accomplished through historical analysis of an event that is similar to the situation today: The Philippine Insurrection (1899-1902). This episode showcases the shortcomings of the navy's conventional approach to military operations other than war, and the need for change. In today's asymmetric environment, the past provides insight into effective means for handling these types of threats. This thesis concludes that the navy needs to diversify itself to incorporate different ship platforms, platforms that incorporate the utility of old with the technology of new. / Lieutenant, United States Navy
127

Why the weak win wars a study of the factors that drive strategy in asymmetric conflict /

Hartigan, Jake. January 2009 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Rothstein, Hy. Second Reader: Blanken, Leo. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: Strategy, asymmetric warfare, unconventional warfare, Arreguin-Toft, probability of victory, institutional predisposition, Afghanistan. Includes bibliographical references (p. 77-82). Also available in print.
128

ASW fusion on a PC /

Mann, Joelle J. January 2004 (has links) (PDF)
Thesis (M.S. in Applied Science (Operations Research))--Naval Postgraduate School, June 2004. / Thesis advisor(s): Alan Washburn. Includes bibliographical references (p. 49-50). Also available online.
129

Ground maneuver and air interdiction a matter of mutual support at the operational level of war /

Egginton, Jack B. January 1900 (has links)
Thesis--School of Advanced Airpower Studies, Maxwell Air Force Base, Ala., 1992-93. / Title from title screen (viewed Oct. 21, 2003). "August 1994." Includes bibliographical references.
130

Adaptive command and control of theater airpower

Gerber, David K. January 1900 (has links)
Thesis--School of Advanced Airpower Studies, Maxwell Air Force Base, Ala., 1996-97. / Title from title screen (viewed Oct. 22, 2003). "March 1999." Includes bibliographical references.

Page generated in 0.0414 seconds