Table of Tables
SECTION 1: Counter-UAS (C-UAS) Operations as a Concept
Chapter 1: The Role of Information Technology
Table 1-1 UAS, C-UAS and CC-UAS Operations Relationships
SECTION 2: C-UAS Technologies and Processes
Chapter 4: Planning for Resiliency and Robustness
Table 4-1 Summary of Resiliency and Robustness
Table 4-2 Attributes v Time
Chapter 5: Surveillance and Reconnaissance
Table 5-1 Drone Capability Diversity
Table 5-2 Threat Detection Tools
Table 5-3 Airspace and Altitude Definitions
Table 5-4 UAVs Classification According to U.S. DoD
Table 5-5 NATO UAS Classification
Chapter 9: Non- Kinetic: Military Avionics, EW, CW, DE, SCADA Defenses
Table 9-1 MPA Roles and Tasks
Table 9-2 Typical Maritime Patrol Aircraft Platform Architecture
Table 9-3 Battlespace Dimensions
Table 9-4 Thermal Properties of Common Materials
Table 9-5 Energy losses in Propagation
Table 9-6 UAS Automation Scale
Table 9-7 UAS Collaboration
Table 9-8 Commercial sUAS Parameters
Table 9-9 Typical Sensor Coordinate Systems
Table 9-10 Standard Sensor Parameters
Table 9-11 Common components found in UAS autopilots
Table 9-12 SCADA Functions
Table 9-13 Examples of SCADA Design Vulnerabilities
Table 9-14 Common Attack Vectors
Table 9-15 Types of Jamming
SECTION 3: Counter C-UAS
Chapter 10: When the Other Side Fights Back – Cyberwarfare, Direct Energy Weapons, Acoustics, Integrating C-UAS into Planning
Table 10-1 Comparison of EW and CW Functions in legacy terms
Table 10-2 Parameters , Units affecting Target Response and Damage
Table 10-3 Quantities Used to Characterize Particle Beams (PB)
SECTION 4: Legal and Administrative Issues
Chapter 12: C-UAS Regulation, Legislation & Litigation from A Global Perspective
Table 12-1 C-UAS Federal Laws
Table 12-2 C-UAS State Laws
Table 12-3 C-UAS Laws United Kingdom, Russian Federation, Australia