skip to main content
Skip header Section
Electronic Warfare in the Information AgeJuly 1999
Publisher:
  • Artech House, Inc.
  • 685 Canton St. Norwood, MA
  • United States
ISBN:978-0-89006-526-6
Published:01 July 1999
Pages:
614
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher: Here's an advanced practitioner's guide to the latest concepts and threats associated with modern electronic warfare (EW). This new book identifies and explains the newest radar and communications threats, and provides EW and radar engineers, managers, and technical professionals with practical, "how-to" information on designing and implementing ECM and ECCM systems. Written by a world-renowned expert in radar and electronic warfare, the book helps you develop state-of-the-art ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates the latest ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other well-structured sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, jammer upgrading procedures, and much more.

Cited By

  1. Wang Y, Zhang T, Kong L and Ma Z (2023). A Stochastic Simulation Optimization-Based Range Gate Pull-Off Jamming Method, IEEE Transactions on Evolutionary Computation, 27:3, (580-594), Online publication date: 1-Jun-2023.
  2. Jawad M and Zeeshan M (2019). A novel algorithm for frequency de-hopping in radars using agile bandpass sampling for electonic support measurement, Telecommunications Systems, 73:3, (443-454), Online publication date: 1-Mar-2020.
  3. Kang H, Sung Y, Kwon H, Yoon S and Choi S (2018). An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development, Security and Communication Networks, 2018, (10), Online publication date: 1-Jan-2018.
  4. Kuzdeba S, Radlbeck A and Anderson M Performance Metrics for Cognitive Electronic Warfare - Electronic Support Measures MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), (1-9)
  5. ACM
    Dhagat R and Jagtap P An Approach Used In Wireless Network to Detect Denial of Service Attack Proceedings of the ACM Symposium on Women in Research 2016, (4-6)
  6. ACM
    Xiao J, Wang X, Guo Q, Long H and Jin S Analysis and Evaluation of Jammer Interference in LTE Proceedings of the Second International Conference on Innovative Computing and Cloud Computing, (46-50)
  7. Liu H, Liu Z, Chen Y and Xu W (2011). Determining the position of a jammer using a virtual-force iterative approach, Wireless Networks, 17:2, (531-547), Online publication date: 1-Feb-2011.
  8. Jiang X, Hu W, Zhu S and Cao G Compromise-resilient anti-jamming for wireless sensor networks Proceedings of the 12th international conference on Information and communications security, (140-154)
  9. Jiang X, Hu W, Zhu S and Cao G Compromise-Resilient Anti-jamming for Wireless Sensor Networks Information and Communications Security, (140-154)
  10. ACM
    Law Y, Palaniswami M, Hoesel L, Doumen J, Hartel P and Havinga P (2009). Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols, ACM Transactions on Sensor Networks, 5:1, (1-38), Online publication date: 1-Feb-2009.
  11. Fitch P (2008). A model of pulse signals above 100 MHz in the electromagnetic environment, International Journal of Information and Communication Technology, 1:3/4, (259-279), Online publication date: 1-Mar-2008.
  12. ACM
    Moen H and Kristoffersen S Multi-resistant radar jamming using genetic algorithms Proceedings of the 10th annual conference on Genetic and evolutionary computation, (1595-1602)
  13. ACM
    Xu W, Trappe W and Zhang Y (2008). Defending wireless sensor networks from radio interference through channel adaptation, ACM Transactions on Sensor Networks, 4:4, (1-34), Online publication date: 1-Aug-2008.
  14. ACM
    Xu W, Trappe W and Zhang Y Anti-jamming timing channels for wireless networks Proceedings of the first ACM conference on Wireless network security, (203-213)
  15. ACM
    Xu W, Trappe W and Zhang Y Channel surfing Proceedings of the 6th international conference on Information processing in sensor networks, (499-508)
  16. Huang G, Yang L and He Z Application of blind source separation to time delay estimation in interference environments Proceedings of the Second international conference on Advances in neural networks - Volume Part II, (496-501)
  17. Smith J Fuzzy logic resource manager Proceedings of the 9th conference on Advances in Artificial Intelligence, (564-575)
  18. ACM
    Smith J Evolving fuzzy decision tree structure that adapts in real-time Proceedings of the 7th annual conference on Genetic and evolutionary computation, (1737-1744)
  19. ACM
    Xu W, Trappe W, Zhang Y and Wood T The feasibility of launching and detecting jamming attacks in wireless networks Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (46-57)
  20. Yi Y, Woods R, Ting L and Cowan C (2005). High Speed FPGA-Based Implementations of Delayed-LMS Filters, Journal of VLSI Signal Processing Systems, 39:1-2, (113-131), Online publication date: 1-Jan-2005.
Contributors

Recommendations