期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
空间电子对抗技术的现状及发展趋势 被引量:5
1
作者 齐胜利 卢占坤 《电子对抗》 2003年第4期6-9,共4页
从空间电子对抗技术的三个方面:空间电子情报侦察保障技术、空间电子攻击技术和空间电子防御技术入手,结合当前各国的航天、电子技术发展状况,对空间电子对抗技术的现状和发展趋势进行了较为深入、详细的论述。
关键词 空间电子对抗 现状 发展趋势 空间电子情报侦察保障技术 电子攻击 电子防御
下载PDF
多谱传感器预警系统及其关键技术 被引量:1
2
作者 刘刚 《四川兵工学报》 CAS 2001年第1期37-40,共4页
对采用多频谱多传感器系统来探测低空飞行的巡航导弹、武装直升机的基本原理、构成及其数据融合、通信技术等关键技术作了简要介绍。
关键词 多传感器 预警 数据融合 多频谱 军事 电子情报技术
下载PDF
电子对抗技术的发展和创新
3
作者 曹永秋 《现代通信》 1993年第1期6-7,共2页
关键词 电子对抗 发展 电子情报技术
原文传递
日芯片业集团100亿日元研发先进制程
4
《集成电路应用》 2005年第8期12-12,共1页
日本电子情报技术产业协会(JEITA)日前表示,日本一芯片制造商集团计划在未来五年,每年投资100亿日元(9,000万美元)研发先进的芯片制造技术。
关键词 芯片 制造技术 芯片业集团 日本电子情报技术产业协会
下载PDF
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat
5
作者 Robert Brumnik Sergii Kavun 《Computer Technology and Application》 2015年第1期45-56,共12页
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in... Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony. 展开更多
关键词 Intelligence and counterintelligence activities electronic spy devices detection methods netwar counterterrorism.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部