What are the Roles of Electronic and Cyber Warfare in Cognitive Radio Security?

被引:0
|
作者
Scott, Amber [1 ]
Hardy, T. J. [1 ]
Martin, Richard K. [1 ]
Thomas, Ryan W. [1 ]
机构
[1] USAF, Inst Technol, Dept Elect & Comp Engn, Wright Patterson AFB, OH 45433 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, Electronic Warfare (EW) and Cyber Warfare (CW) have been viewed as independent, disparate disciplines. However, they are often trying to accomplish similar tasks, and thus may be viewed as two sides of the same coin. When both the attacher and defender employ cognitive techniques, the edge may go to the side that integrates techniques from both EW and CWo In this paper, we examine two case studies in radio security. We examine what happens when the attacker is cognitive, and consider cognitive EW/CW approaches to defend against the attacks.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Cognitive Electronic Warfare (EW) as a Training Aid
    du Plessis, Warren P.
    Osner, Nicholas R.
    [J]. EURAD 2020 THE 17TH EUROPEAN RADAR CONFERENCE, 2021,
  • [32] The Enlightenment of Nine Classical Cyber Warfare to the National Cyberspace Security Strategy
    Pan Xiang
    Xu Tianye
    Xiao Zhiting
    Guo Xuan
    [J]. ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 695 - 703
  • [33] Understanding security policies in the cyber warfare domain through system dynamics
    Armenia, Stefano
    Cardazzone, Alessandro
    Carlini, Camillo
    [J]. 4th International Defense and Homeland Security Simulation Workshop, DHSS 2014, 2014, : 27 - 32
  • [34] Cyber Security and Portability of Electronic Medical Records
    Burgner, Daniel E.
    Wahsheh, Luay A.
    Graham, Jonathan M.
    Hsieh, George
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (06): : 355 - 365
  • [35] Cyber security: what are we talking about?
    Furnell S.
    Collins E.
    [J]. Computer Fraud and Security, 2021, 2021 (07): : 6 - 11
  • [36] A Novel Cognitive Jamming Architecture for Heterogeneous Cognitive Electronic Warfare Networks
    Ren, Yongji
    Li, Bingrong
    Wang, Haibin
    Xu, Xiaofeng
    [J]. INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 97 - 104
  • [37] What are the Metrics of Cyber Warfare? How Does one Measure Success?
    Armistead, Leigh
    Starsman, Scott
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 19 - 25
  • [38] Security and Resilience in Cognitive Radio Networks
    Angelakis, Vangelis
    Askoxylakis, Ioannis
    Fowler, Scott
    Gundlegard, David
    Traganitis, Apostolos
    Yuan, Di
    [J]. ERCIM NEWS, 2011, (85): : 48 - 49
  • [39] Cognitive radio network security: A survey
    Parvin, Sazia
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    Han, Song
    Tian, Biming
    Chang, Elizabeth
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1691 - 1708
  • [40] A Review on Security Threats in Cognitive Radio
    Banerjee, Abhinaba
    Das, Sushanta
    [J]. 2014 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2014,