2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS) 2014
DOI: 10.1109/ursigass.2014.6929517
|View full text |Cite
|
Sign up to set email alerts
|

Brief historical review and bibliography for Intentional Electromagnetic Interference (IEMI)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 1 publication
0
17
0
Order By: Relevance
“…Water originates from a raw water source (node 1) and is siphoned into a treatment plant (node 3) where it is cleaned for drinking purposes. From there, water runs further down a slope to a pumping station (node 5) and is pumped to a small town of water users, the consumers (nodes [6][7][8][9][10][11][12][13][14]. The town has a looped or grid network, allowing the water to circulate through a primary feeder (the links between the consumer nodes).…”
Section: High-level System Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Water originates from a raw water source (node 1) and is siphoned into a treatment plant (node 3) where it is cleaned for drinking purposes. From there, water runs further down a slope to a pumping station (node 5) and is pumped to a small town of water users, the consumers (nodes [6][7][8][9][10][11][12][13][14]. The town has a looped or grid network, allowing the water to circulate through a primary feeder (the links between the consumer nodes).…”
Section: High-level System Descriptionmentioning
confidence: 99%
“…This is done by identifying the transportation resources required to deploy each source within each zone; both resources needed to carry the sources and infiltrate barriers with sources of different categories. Once the resource vectors allowing each attack, R t,s,z , are identified, the minimum resource vectors R * t,s,z are identified according to Equation (8).…”
Section: Minimum Resource Vectors That Allow Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Even though it is of special importance that the automation and control of these infrastructures is robust against electromagnetic attacks they are strikingly often based on commercial-of-the-shelf (COTS) equipment fulfilling no more than basic civil EMC specifications. Hence the need for protection against IEMI has grown radically [1], [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…In parallel with these continuous wave analyses, some researchers started to introduce ways to assess shielding performance in transient conditions [6,7,8,9], issue that became really a decisive key-point in protecting apparatus and systems against the emerging threats due to intentional EMI [10,11]. All these approaches face with the irreconcilable need of the conciseness, which is the main feature of any figure of merit, and that of the completeness of information, necessary to predict whether the protected device will continue to function under prescribed external conditions.…”
Section: Introductionmentioning
confidence: 99%