Network vulnerabilities are an increasingly common issue in today’s highly complex computing environments. With exploit attacks appearing faster than ever before, it has become significantly more challenging for organizations to protect against attacks. Only if users could discover these vulnerabilities in their network and proactively get ready before attackers take action, can the losses …
Read More »TimeLine Layout
January, 2023
-
5 January
DARPA Report Finds Vulnerabilities in Blockchain Crypto Transactions
Distributed ledger technologies commonly known as the blockchain, refer to software that stores information on a secure, decentralized network where users need specific cryptographic keys to decrypt and access data. Cryptocurrencies, such as the popular Bitcoin, are networks built on the blockchain, a financial ledger formatted in a sequence of …
Read More » -
5 January
Modeling and Simulation are critical enablers for military training, analysis, decision-making and capability development
Conflicts unfold at an unprecedented rate and things can change in days if not hours, the amount of data available is overwhelming in both volume and complexity. We need new tools to make sense of it all. This is against a backdrop of rising costs and financial pressures, and so …
Read More » -
4 January
Threat of Quantum computer to Blockchain , Researchers propose Quantum Resistant Ledger (QRL) and Quantum blockchain
Blockchain, is a growing list of records, called blocks, which are linked using cryptography. Blockchains which are readable by the public are widely used by cryptocurrencies. Private blockchains have been proposed for business use. Blockchain a transformative decentralized digital currency, a secure payment platform free from government interference, is being considered …
Read More » -
3 January
Rise of Narco-Terrorism require new Contraband detector technologies
Narco-terrorism is a term that explains drug trafficking cartels/organized crime groups which resort to terrorism to achieve their aims. These terrorist organizations engage in drug trafficking activity to fund their operations and gain recruits and expertise. Such organizations include FARC, ELN, AUC in Colombia, PCP-SL in Peru, Hamas, Hezbollah, and …
Read More » -
3 January
Militaries deploying all terrain air-transportable light tanks with long-range, cyber-resilient, precision, direct-fire capability
Since the creation of the main battle tank during World War I, there has been a constant arms race between the development of anti-armor weapons and vehicle protection systems, however “Weapons’ ability to penetrate armor, however, has advanced faster than armor’s ability to withstand penetration”. The traditional protection technique depends on …
Read More » -
2 January
High intensity warfare (HIW) and High Intensity Conflict (HIC) weapons and technologies
High-Intensity Warfare (HIW) or High-Intensity Conflict (HIC) refers to state vs state conflict with a modern, peer adversary – as envisioned during the Cold War period. As the name implies, the tempo of operations is greater, and the concentration of forces and firepower is also substantially greater. High-intensity war is …
Read More » -
1 January
International cyber diplomacy and security
Information and communication technology present new challenges to international affairs.The scale and speed of technological advancements in cyberspace are unprecedented. As the fourth industrial revolution dawns, bringing with it the reality of big data, artificial intelligence, and quantum technology, the world is entering a new level of more sophisticated hypoconnectivity, …
Read More »
December, 2022
-
31 December
Wireless and Satellite Network testing tools QXDM, Speedtest, xcal/qualipoc, drive-test tools
5G will enable a new set of services, not only for human users but also for industrial and automotive purposes. Key factors for acceptance and use are ultra-high reliability and real-time interaction capability. For those future applications, it is key to measure and rate the interactivity of a network and …
Read More » -
29 December
Network simulation Software for Wireless Networks including 5G
In computer network research, network simulation is a technique whereby a software program replicates the behavior of a real network. A network simulator is a software program that can predict the performance of a computer network or a wireless communication network. Since communication networks have become too complex for …
Read More »
International Defense Security & Technology Your trusted Source for News, Research and Analysis