Radar signal processing

Electronic counter-countermeasure

Electronic counter-countermeasures (ECCM) is a part of electronic warfare which includes a variety of practices which attempt to reduce or eliminate the effect of electronic countermeasures (ECM) on electronic sensors aboard vehicles, ships and aircraft and weapons such as missiles. ECCM is also known as electronic protective measures (EPM), chiefly in Europe. In practice, EPM often means resistance to jamming. A more detailed description defines it as the electronic warfare operations taken by a radar to offset the enemy's countermeasure. (Wikipedia).

Video thumbnail

Electronic measurement equipment and multimeters - Part 1

In this video series I show different measurement equipment (multimeters, etc) and why / how I use them. In later videos I'll explore different features and highlight pro's and con's. A list of my multimeters can be purchased here: http://astore.amazon.com/m0711-20?_encoding=UTF8&node=

From playlist Electronic Measurement Equipment

Video thumbnail

Solar power monitoring and logging solution - Part 1

I put together a "cheap" solution to monitor and log power from my test solar system.

From playlist Electronic Measurement Equipment

Video thumbnail

Electronic measurement equipment and multimeters - Part 2:Clamp meter

A list of my multimeters can be purchased here: http://astore.amazon.com/m0711-20?_encoding=UTF8&node=5 In this video series I show different measurement equipment (multimeters, etc) and why / how I use them. In later videos I'll explore different features and highlight pro's and con's

From playlist Electronic Measurement Equipment

Video thumbnail

Cancer in home from electric currents (phone, appliances etc)!!!

In this video i show the emf counter and the danger from electromagnetic fields. A very handy, inexpensive, and compact electric field & electromagnetic radiation meter. This measurement device is ideal for people that have health concerns regarding electric fields and EMF, or for identify

From playlist ELECTROMAGNETISM

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Digital Signatures: Part 1

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Time Interval Counter

This is yet another useful tool for engineers, described by J. Lowe from NIST. Engineers can compare the accuracy of clocks and troubleshoot instruments using the time frequency counter. This video is appendix II.B.v3 and is part of the Universe of Instrumentation Program.

From playlist Universe of Instrumentation Series

Video thumbnail

23C3: Information Operations

Speaker: Sebastian Schroeder Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnera

From playlist 23C3: Who can you trust

Video thumbnail

Digital Signatures: Part 2

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

The US President's $2,614 Per Minute Transport System

Check out Squarespace: http://squarespace.com/wendover Use the code "Wendover" for 10% off your order Support Wendover Productions on Patreon: https://www.patreon.com/wendoverproductions Get a Wendover Productions t-shirt for $20: https://store.dftba.com/products/wendover-productions-s

From playlist All Videos

Video thumbnail

CERIAS Security: Semantic Attacks and Security 4/6

Clip 4/6 Speaker: Paul Thompson · Dartmouth College Attacks on computer and other networked systems can be categorized as physical, syntactic and semantic. Physical attacks seek to destroy hardware, while syntactic attacks, such as computer worms and viruses, target the network infras

From playlist The CERIAS Security Seminars 2006

Video thumbnail

30C3: Security of the IC Backside (DE - translated)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speaker: nedos In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocol

From playlist 30C3

Video thumbnail

30C3: Security of the IC Backside (EN)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speaker: nedos In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocol

From playlist 30C3

Video thumbnail

CGSR | The Future of BioSecurity: a DOD Perspective

Abstract: In the last two years, whenever the topic of biodefense and readiness comes up, a discussion of COVID-19, its origin and its impact, often takes center stage, and while this certainly provides a valuable case study in evaluating biodefense capabilities and maintaining operations,

From playlist Center for Global Security Research

Video thumbnail

DEFCON 18: Build a Lie Detector Beat a Lie Detector 3/3

Speaker: RAIN THE NEURONUMEROUS GROUP J03B34R SYSTEM ANALYST Everyone seems to be acquainted with the idea that the polygraph is fallible and that there a million tricks that can supposedly be used to beat it, but how can you really know for sure? One way would be if you pieced togethe

From playlist DEFCON 18-1

Video thumbnail

CERIAS Security: Quantitative Risk Assessment of Software Security and Privacy 1/6

Clip 1/6 Speaker: Mehmet Sahinoglu · Auburn University at Montgomery, AL The need for information security is undeniable and self-evident. The pervasiveness of this critical topic requires primarily risk assessment and management through quantitative means. To conduct an assessment; repea

From playlist The CERIAS Security Seminars 2009

Video thumbnail

America's Most Iconic Fighter Jets | The West's Land-based Fighters & Bombers | Spark

This documentary features the West's most modern and powerful land-based fighters and bombers of the late 1980s. The program features Britain's Harrier, the Panavia Tornado ADV, the Sepecat Jaguar, Mirage 2000, Sweden's Saab Viggen, and Israel's Kfir fighter. From the USAF comes the B-52 S

From playlist Spark Top Docs

Video thumbnail

DEFCON 15: The Church of WiFi Presents: Hacking Iraq

Speaker: Michael Schearer "theprez98" What in the world is a U.S. Navy officer (a Naval Flight Officer, no less) doing in the middle of Iraq? Electronic warfare, of course! The Church of WiFi presents an unclassified presentation of theprez98's experiences during his 9-month tour in Iraq.

From playlist DEFCON 15

Video thumbnail

Solar power monitoring and logging solution - Part 2

Using Excel to graph the output from the multimeters...

From playlist Electronic Measurement Equipment

Related pages

Signals intelligence | Frequency | Chirp | Pulse compression