Search Results

1 - 7 of 7 items :

  • Military History x
Clear All
Non-State Actors in Cyberspace Operations

References [1] Amorosi, D., “Chinese State of Denial,” Infosecurity, Vol 8 Issue 6, Elsevier, Nov.-Dec. 2011. [2] Andress, J. and Winterfeld, S., “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners,” Elsevier, 2011, p. 199. [3] Applegate, S. D., “Cybermilitias and Political Hackers: Use of Irregular Forces in cyberwarfare,” IEEE Security & Privacy, Volume 9, Issue 5, Sep.-Oct. 2011. [4] Arquilla, J. and Ronfeldt D. F., “Networks and Netwars: The Future of Terror, Crime, and

Open access
A Two Person Zero Sum Game Oriented to Integration of Objectives

-654. Hillier F.S. and Liberman G.J. (2001). Introduction to Operation Research. McGraw Hill,7th Ed: New York, 726. Hämäläinen J., Sormunen J., Rantapelkonen J., Nikkarila J-P. (2014).Wargame as a combined method of qualitative and quantitative studies, Journal Of Military Studies, 5(1):1-18. Kaufmann A. and Gupta M.M. (1991). Introduction to Fuzzy Arithmetic: Theory and Applications, Van Nostrand Reinhold: New York, 74-84. Law W.W. and Pan S.Y. (2008). Game theory and educational policy: Private education legislation in China

Open access
Narrative approach to the art of war and military studies - Narratology as military science research paradigm

-Narratives; Narrating, resisting, making sense. Studies in Narrative, Volume 4: 33-38. Philadelphia: John Benjamin Publishing Company. Rimmon-Kenan, Shlomith (1983). Narrative Fiction: Contemporary Poetics. London and New York: Methuen. Sawyer, Ralph D. ed. (1993). The Seven Military Classics of Ancient China. Boulder: Westview Press. Todorov, Tzvetan (1981). Introduction to Poetics. Minneapolis: University of Minnesota Press. Triandafillov, Vladimir K. (1994). The Nature of the Operations of Modern Armies

Open access
An Analysis of North Korea’s Satellite Launches

retrieves North Korean Unha-3 Rocket debris. Retrieved January 8, 2013, from spaceflight101: CGWIC (2011). User's manual. Retrieved November 20, 2012, from China Great Wall Industry Corporation: Christy, R. (2012a, April). Unha 3/ Kwangmyongsong 3 Launch failure. Retrieved May 10, 2012, from Zarya: Christy, R. (2012b, December

Open access
Bayesian belief network for assessing impact of factors on army’s lean–agile replenishment system

.1080/07408170490487759 Hopp W. J. Van Oyen M. P. 2004 Agile workforce evaluation: a framework for cross-training and coordination IIE Transactions 36 10 919 940 Hou, Y., Guo, W., & Zhu, Z. (2010). Threat assessment based on variable parameter dynamic Bayesian network. In: Proceedings of the 29th Chinese Control Conference , Beijing, China. Hou Y. Guo W. Zhu Z. 2010 Threat assessment based on variable parameter dynamic Bayesian network Proceedings of the 29th Chinese Control Conference Beijing China Hudson, L. D., Ware, B. S., Laskey, K. B., & Mahoney, S. M. (2001). An application of

Open access
Predictors of Gaming Behavior among Military Peacekeepers – Exploring the Role of Boredom and Loneliness in Relation to Gaming Problems

. Murphy J.S. Horn D. B. 2010 Are soldiers gamers? Videogame usage among soldiers and implications for the effective use of serious videogames for military training Military Psychology 22 143 157 Qin, H., Rao, P. L., & Zong, H. Q. (2007). A study of factors leading to online game addiction. Chinese Journal of Clinical Psychology, 15 , pp. 155-160. Qin H. Rao P.L. Zong H. Q. 2007 A study of factors leading to online game addiction Chinese Journal of Clinical Psychology 15 155 160 Rehbein, F., Kleimann, M., & Mössle, T. (2010). Prevalence and

Open access