首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对雷达网欺骗干扰问题,首先讨论了雷达网数据关联处理方法薄弱环节,给出了可以欺骗雷达网的假目标应该满足的条件,然后分析对空情报雷达网密集假目标干扰的产生机理和作用机理,为产生高逼真的假目标,将空间分布转化为非线性最优化问题。当进行多干扰机协同干扰时,将干扰机功率资源在空间的分配问题转化为非线性规划问题。仿真研究了对网络化雷达的假目标欺骗干扰效果以及影响干扰效果的因素,该结果可为对空情报雷达网电子对抗提供理论指导。  相似文献   

2.
雷达欺骗干扰的特征提取和综合感知是雷达抗干扰的前提条件,也是雷达抗欺骗干扰工作流程中的难点问题。从干扰机无意调制的细微特征、信号起伏特性、极化特征、动力学特性、微多普勒特征、组网雷达特性、多尺度分解特征、多域变换特性等方面综述了雷达欺骗干扰特征提取和综合感知方法的研究进展,总结了各种欺骗干扰感知方法的约束条件、运算量和识别性能,最后,指出了目前雷达欺骗干扰的特征提取和综合感知技术存在的问题以及未来的发展方向。  相似文献   

3.
为了解决敌方释放箔条干扰我方防空反击任务或者敌方舰船设置角反射器阵列干扰我方对海目标打击任务中的雷达抗干扰问题,提出了一种基于雷达一维距离像的稀疏表达的无源假目标识别的方法。首先,分别利用大量关注目标和无源欺骗干扰的雷达一维距离像数据进行稀疏字典学习,分别得到目标和干扰的稀疏字典;然后利用两种稀疏字典分别对未知的雷达一维距离像信号进行稀疏表达;最后分别计算两种稀疏字典对未知信号稀疏表达的重构误差,利用重构误差比值识别目标和干扰类别。仿真结果表明,在目标与无源假目标干扰的回波不混叠、目标与干扰噪声比3 dB条件下,识别无源假目标欺骗干扰的准确率超过90%,证明了该方法抗无源假目标干扰的有效性。  相似文献   

4.
提出了基于有源照射箔条云对雷达速度波门进行拖引干扰的复合干扰方法。该方 法运用机载电子干扰设备接收、转发敌方雷达发射的信号并照射到箔条云上,箔条云对干扰 信号二次辐射,被敌方雷达接收,形成具有和载机相似径向速度的假目标,起到诱骗干扰作 用。建立了复合干扰对速度跟踪系统进行干扰的相关模型,并进行了仿真实验,仿真结 果表明,利用该方法对敌机测速跟踪系统进行干扰具有可行性。  相似文献   

5.
全球卫星导航系统(Global Navigation Satellite System,GNSS)转发式欺骗干扰具有系统搭建容易、干扰实施方便、成本低等优点,目前已成为一种重要的GNSS欺骗方式。针对多峰值抗转发欺骗干扰检测算法,提出一种针对目标接收机GNSS时钟的转发式欺骗干扰方法。相比于传统转发式欺骗的各通道卫星信号时延一致的特点,该方法根据待欺骗接收机和转发式欺骗源的位置计算各卫星通道转发时延,使待欺骗目标接收到的GNSS欺骗信号的时延为伪码周期整数倍,并随时间自适应动态调整转发时延,使得欺骗检测失效,进一步欺骗静态目标接收机的GNSS时钟。模拟实验和仿真实验验证了该转发式欺骗方法的有效性。  相似文献   

6.
针对实施机载合成孔径雷达(SAR)假目标欺骗干扰所需引导参数存在测量误差的问题,首先,分析了假目标欺骗干扰调制信号模型,并给出了干扰信号所需侦察参数;然后,分析了机载平台与信号参数误差对假目标的位置、幅度及分辨率的影响,指出了假目标在SAR图像中的“折叠”现象,并分析了产生原因;最后,对参数误差的影响进行了定量仿真分析。理论分析与仿真结果表明,SAR的定位误差与假目标的成像位置偏移量大致呈线性关系。当速度误差为2%、方位向定位误差为100 m时,假目标的方位向分辨率降低约1倍。  相似文献   

7.
电子战是现代战争的重要组成部分。假雷达目标欺骗和反欺骗是电子战的一部分。前不久我国首次发现了假雷达目标的严重干扰,引起我国的重视。本文论述了假雷达目标欺骗与反欺骗的原理及方法。  相似文献   

8.
从噪声干扰的原理出发,详细地分析了噪声干扰信号的产生并推导出干扰条件下的雷达最大作用距离的求解公式。仿真了目标和干扰机接收的信号强度随距离而变化的特征以及干扰有效辐射功率密度对雷达探测能力影响的相对效果。  相似文献   

9.
针对卫星导航转发式欺骗干扰中转发信号存在负延时需求而工程上又无法实现的问题,提出了一种负延时补偿方法。该方法根据预设欺骗位置,通过转发式欺骗干扰延时算法,获得各卫星信号通道所需转发延时量;然后基于接收机钟差最小化原则选取最优的延时修正量添加到所有通道的转发信号中。理论分析和仿真结果表明,该方法不影响接收机的定位结果,消除了负延时无法实现的问题对转发式欺骗干扰的限制。  相似文献   

10.
针对战机实施有源干扰时的射频隐身问题,分析了现有干扰功率 评估准则的不足,在雷达信号检测模型和侦察截获概率模型的基础上,讨论了“有效干扰” 对干扰功率的需求和射频隐身对干扰功率的限制,提出将有效干扰条件下的侦察截获概率作 为干扰信号的射频隐身特性表征因子,最后提出了一种结合目标雷达类型、接收信号功率以 及本机RCS起伏等因素的干扰功率自适应控制方法。通过对固定功率干扰与不同压制系数下 自适应功率干扰时雷达检测概率和侦察截获概率的仿真,表明自适应功率控制能够节约干扰 功率,在有效干扰的同时提高干扰的射频隐身能力。  相似文献   

11.
Criminals often falsify their identities intentionally in order to deter police investigations. In this paper we focus on uncovering patterns of criminal identity deception observed through a case study performed at a local law enforcement agency. We define criminal identity deception based on an understanding of the various theories of deception. We interview a police detective expert and discuss the characteristics of criminal identity deception. A taxonomy for criminal identity deception was built to represent the different patterns that were identified in the case study. We also discuss methods currently employed by law enforcement agencies to detect deception. Police database systems contain little information that can help reveal deceptive identities. Thus, in order to identify deception, police officers rely mainly on investigation. Current methods for detecting deceptive criminal identities are neither effective nor efficient. Therefore we propose an automated solution to help solve this problem.  相似文献   

12.
程佳  王子纲 《中国科技财富》2008,(7):155-155,144
网络欺骗技术是计算机网络中最主要的安全攻击之一。本文描述并分析了几种常用的欺骗技术,对我们构建网络安全系统有一定的指导作用。  相似文献   

13.
程佳  王子纲 《中国科技财富》2008,(6):141-141,140
网络欺骗技术是计算机网络中最主要的安全攻击之一。本文描述并分析了几种常用的欺骗技术,对我们构建网络安全系统有一定的指导作用。  相似文献   

14.
This paper uses an information-processing model of deception detection to understand the reasons underlying Internet consumers' success and failure at detecting forms of intentional deception that occur on the Internet. Eighty MBA students visited either a real commercial site or a deceptive copycat (page-jacking) site. The deceptive site was identical to the clean site except that it contained six deceptive manipulations (e.g., forged favorable quotes from authoritative sources). This study compares the information processing behavior of four groups of subjects: those who detected the deception, those who missed it, those who correctly identified the real site as non-deceptive, and those who incorrectly believed that the real site was deceptive. It was found that (1) priming subjects to generate the hypothesis of deception weakly facilitates detection success, (2) competence at evaluating the hypothesis of deception is a strong differentiator between successful and unsuccessful detectors, and (3) successful detectors rely on assurance cues and heavily discount trust cues. Unsuccessful detectors do the opposite.  相似文献   

15.
The detection of deception is a promising but challenging task. A systematic discussion of automated Linguistics Based Cues (LBC) to deception has rarely been touched before. The experiment studied the effectiveness of automated LBC in the context of text-based asynchronous computer mediated communication (TA-CMC). Twenty-seven cues either extracted from the prior research or created for this study were clustered into nine linguistics constructs: quantity, diversity, complexity, specificity, expressivity, informality, affect, uncertainty, and nonimmediacy. A test of the selected LBC in a simulated TA-CMC experiment showed that: (1) a systematic analysis of linguistic information could be useful in the detection of deception; (2) some existing LBC were effective as expected, while some others turned out in the opposite direction to the prediction of the prior research; and (3) some newly discovered linguistic constructs and their component LBC were helpful in differentiating deception from truth.  相似文献   

16.
When attempting to portray the attractiveness of a brand vis-à-vis its competitors, an ad may make global claims about superiority or specific claims about one or more attributes. A special case of latter is the piecemeal ad in which the advertised brand is compared to a competitor on one attribute, a different competitor on a second attribute, another competitor on a third attribute, and so on. The present research demonstrates the effectiveness of this technique and explores the parameters of its influence. We find that piecemeal messages are persuasive because they make seemingly strong claims in a believable manner. Consumer skepticism appears to arise only when conditions for scrutiny are very favorable.  相似文献   

17.
In a recent paper that appeared in this journal Fritz Allhoff addresses the morality of bluffing in negotiations1. He focuses on cases in which people misstate their reservation price in negotiations, e.g., suppose that I am selling a house and tell a prospective buyer that $300,000 is absolutely the lowest price that I will accept, when I know that I would be willing to accept as little as $270,000 for the house rather than continue to try to sell it. Allhoff criticizes my (qualified) defense of bluffing in my paper Second Thoughts on Bluffing,2 and offers what he takes to be a more plausible defense of bluffing. Allhoffs criticisms rest on several serious misinterpretations of my views. He ascribes to me several arguments that I dont make. He also attributes to me an unqualified defense of bluffing that I explicitly reject. I briefly document this in Section 1. In Sections 2 and 3 I explain and criticize Allhoffs positive views about bluffing and the morality of bluffing.Thomas Carson is professor of philosophy at Loyola University Chicago. He is the author of Value and the Good Life and The Status of Morality. He is the co-editor of Moral Relativism and Morality and the Good Life. He is the author of numerous papers on ethical theory and business ethics and is a member of the editorial board of Business Ethics Quarterly and Journal of Business Ethics. He is currently working on a book entitled Lying and Deception: Theory and Practice.  相似文献   

18.
As businesses become more global, the opportunities for employees to work with individuals from different cultures increase. Research in cross-cultural interactions has increased in response to such changes. This research study considers employee attitudes and perceived organizational support for the use of deception within the work environment. In this study, two types of deception have been considered; deception for personal gain and deception for the organization's benefit. The reported likelihood for committing these two types of deception for United States and Israeli employees was gathered. The results indicate that United States employees are more likely to deceive others for personal gain than the Israeli employees. In addition, the results indicate that United States employees were more likely to perceive organizational support for the use of deception for personal gain than were the Israeli employees. No differences between the two samples were found for personal or organizational support for deception for the organization's benefit. Differences are explained using Hofstede's (1991) theory of international cultures.  相似文献   

19.
This article investigates if and how negotiators' self-efficacy beliefs affect their use of deception in negotiation. Specifically, we propose that self-efficacy can be interpreted as a threat to self-concept, which encourages individuals to temporarily bypass self-regulatory obstacles by morally disengaging their cognitive moral filters, thereby enabling them to use deception in negotiation. We test our hypotheses in three independent experimental studies involving an interactive negotiation simulation, totalizing 460 participants. We find that negotiators with low self-efficacy regarding their negotiation abilities are more likely to use deception than those with high self-efficacy beliefs. Furthermore, we find that moral disengagement mediates the effects of self-efficacy on deception. Our findings suggest that self-efficacy plays a key role in shaping negotiators' ethical behaviors and we identify the psychological mechanism underlying this relationship.  相似文献   

20.
Sun Tzu's text of The Art of War remains a bestsellingand oft-referenced practioner's book. However, its generalizabilityto the current business environment is questionable. This reviewexamines two central tenets of the book – warfare anddeception – and critiques their relevance in lightof current business practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号