<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://digital.lib.ueh.edu.vn/handle/UEH/69622">
    <title>DSpace Collection:</title>
    <link>https://digital.lib.ueh.edu.vn/handle/UEH/69622</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://digital.lib.ueh.edu.vn/handle/UEH/69627" />
        <rdf:li rdf:resource="https://digital.lib.ueh.edu.vn/handle/UEH/69626" />
        <rdf:li rdf:resource="https://digital.lib.ueh.edu.vn/handle/UEH/69625" />
        <rdf:li rdf:resource="https://digital.lib.ueh.edu.vn/handle/UEH/69624" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-17T03:27:39Z</dc:date>
  </channel>
  <item rdf:about="https://digital.lib.ueh.edu.vn/handle/UEH/69627">
    <title>Defence innovation and the 4th industrial revolution in Russia</title>
    <link>https://digital.lib.ueh.edu.vn/handle/UEH/69627</link>
    <description>Title: Defence innovation and the 4th industrial revolution in Russia
Author(s): Katarzyna Zysk
Abstract: Russia is pursuing select 4th Industrial Revolution (4IR) technologies in a drive to rapidly close the capability gaps with rivals. The transformation of warfare these technologies portend could also make Russia more vulnerable. Joining the ‘tech-nological race’ seems therefore less of a choice than an existential necessity.&#xD;
Constrained by structural problems and lacking the resources of the US and China, however, Russia has so far struggled to leverage its ambitions within the 4IR. Yet it has also shown the ability to experiment with 4IR technologies, includ-ing hypersonics and AI, to amplify existing symmetric and asymmetric capabil-ities, and create interconnected systems that may provide critical advantages.</description>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://digital.lib.ueh.edu.vn/handle/UEH/69626">
    <title>Design of a framework of military defense system for governance of geoinformation</title>
    <link>https://digital.lib.ueh.edu.vn/handle/UEH/69626</link>
    <description>Title: Design of a framework of military defense system for governance of geoinformation
Author(s): Rafael Jardim; Marcos dos Santos; Edgard Neto; Fernando Martins Muradas; Bruna Santiago; Miguel Moreira
Abstract: A defense system for geoinformation governance must be able to manage geographic information related to national security. A Geographic Information System (GIS) is useful for the defense of the country, as in the case of monitoring the spread of COVID-19, enabling authorities to make decisions based on data (data-driven). The difficulty in developing a GIS for defense is that the system requires specific functionalities from military organizations and is fault-tolerant. A case study was conducted based on requirements engineering ISO/IEC/IEEE 29148:2018, to promote common understanding among all stakeholders, design a framework of GIS for defense, capable of isolating demands in a system developed in modules individualized. The system validation was demonstrated by obtaining the prototype of a tool of the defense system for geoinformation governance. The system framework is composed of input data, migrator, operational core, solver, output bus, geoportal, and external accessors. The application is under development and already has features such as tracing routes and identifying troop access.</description>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://digital.lib.ueh.edu.vn/handle/UEH/69625">
    <title>Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone</title>
    <link>https://digital.lib.ueh.edu.vn/handle/UEH/69625</link>
    <description>Title: Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
Author(s): Yongho Ko; Jiyoon Kim; Daniel Gerbi Duguma; Philip Virgil Astillo; lsun You; Giovanni Pau
Abstract: Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military,&#xD;
aerospace, reconnaissance, agriculture, and many more. The development and implementation&#xD;
of these devices have become vital in terms of usability and reachability. Unfortunately, as they&#xD;
become widespread and their demand grows, they are becoming more and more vulnerable to&#xD;
several security attacks, including, but not limited to, jamming, information leakage, and spoofing.&#xD;
In order to cope with such attacks and security threats, a proper design of robust security protocols&#xD;
is indispensable. Although several pieces of research have been carried out with this regard, there&#xD;
are still research gaps, particularly concerning UAV-to-UAV secure communication, support for&#xD;
perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it&#xD;
is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV&#xD;
communication protocol, specifically in the military setting. More importantly, a security protocol&#xD;
(with two sub-protocols), that serves in securing the communication between UAVs, and between&#xD;
a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security&#xD;
requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure&#xD;
military communication. The proposed protocol is formally and thoroughly verified by using the&#xD;
BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation&#xD;
and implementation of the protocol on a real UAV. From the security and performance evaluation, it&#xD;
is indicated that the proposed protocol is superior compared to other related protocols while meeting&#xD;
confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect&#xD;
backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and&#xD;
D2D (Drone-to-Drone) security.</description>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://digital.lib.ueh.edu.vn/handle/UEH/69624">
    <title>Exploiting High Millimeter Wave Bands for Military Communications, Applications, and Design</title>
    <link>https://digital.lib.ueh.edu.vn/handle/UEH/69624</link>
    <description>Title: Exploiting High Millimeter Wave Bands for Military Communications, Applications, and Design
Author(s): JAMES F. HARVEY; MICHAEL B. STEER; THEODORE S. RAPPAPORT
Abstract: Military communications networks can leverage much of the millimeter-wave (mm-wave) technology being investigated and developed for 5G cellular but require special attention to the unique military requirements. This paper highlights the special communications’ requirements of specific military local area networks and discusses how higher band mm-wave technology can contribute to high data rates and simultaneously achieve covertness. Adaptive tuning for varying atmospheric absorption meets the military requirements for quickly adjusting covert communication zones to accommodate potentially rapid movements of network nodes, dynamic output power constraints, and changing environmental conditions.</description>
    <dc:date>2019-01-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

