Abbreviations and Acronyms
ABBREVIATIONS: ACRONYMS [REV 91A] 01232021 C1 – C10
The following terms are common to the UAS / UUV industries, defense / airline / marine industries / general literature, conferences on UAS/UAV/Drone/UUV systems and / or specific to Professor Nichols’ five (5) textbooks in the series on UAS / drones / UAV / UUVs.
A-STAR Heuristic search algorithm discussed in chapter 9.
A2 / AD Anti-access / Area Denial
A /Aref Amplitudes of source and reference points, see Eq-20-6,7.
AA Anti-aircraft / Adaptive Antennas
AAA Anti-aircraft artillery
AAIB Air Accidents Investigation Board
AAM Air-to-air missile
AAV Autonomous air vehicle
ABI Aviation Block Infrastructure
ABMS Advanced battle management system
ABS American Bureau of Shipping
A/C Aircraft
ACAS Airborne collision avoidance system / Assistant Chief of the Air Staff
ACL Agent communication language / Autonomous control levels
ACOUSTIC Detects drones by recognizing unique sounds produced by their motors.
ACRP Airport Cooperative Research Project
ACS Airbome (defense) control station (system)
ACTD Advanced Concept Technology Demonstration
AD Air Defense / Ansar Dine terrorist group.
A/D Attack / Defense Scenario Analysis
ADAC Automated Dynamic Airspace Controller
ADAPs Adaptive compute acceleration platforms
ADC Air data computer
ADCP Acoustic Doppler Current Profiler
ADF Automatic direction finder/finding.
ADMS Air defense missile (radar) system
ADS Air Defense System (USA)
ADS-B Automatic Dependent Surveillance – Broadcast systems
ADT Air Data Terminal
AE Artificial Employee
AESA Active electronically scanned array
AEW Airbome early warning
AF Adaptive Filtering
AFCS Automatic flight control system
AFRICOM US Africa Command
AGL Above ground level
AGM Air- to- surface missile
AGARD Advisory Group for Aerospace Research and Development (NATO)
AGM-65 Maverick (USA) is an air-to-surface missile (AGM) designed for close air support. It is the most widely produced precision-guided missile in the Western world, and is effective against a wide range of tactical targets, including armor, air defenses, ships, ground transportation and fuel storage facilities.
AGV Autonomous Guard Vehicle
AHA Autopilot Hardware Attack
AHD Analog high definition
AHRS Attitude and heading reference system
AI Artificial intelligence: “1. a branch of computer science dealing with the
simulation of intelligent behavior in computers and 2: the capability of a machine
to imitate intelligent human behavior.” (Merriam-Webster, 2020)
AIAA American Institute of Aeronautics and Aerospace
AIC Aeronautical Information Circular
AIP Aeronautical Information Publication
AIS Automated Identification System for Collision Avoidance
AJ Anti-Jam
AKM Autonomous Key Management
ALB Air Land Battle
ALERT Advanced Low-observable Embedded Reconnaissance Targeting system.
AM Amplitude Modulation / al-Mourabitoun terrorist group
AMB Agile Multi-Beam
AMRAAM Advanced Medium-Range Air-to-Air Missile
ANSP Air Navigation Service Provider
ANO Air Navigation Order (UK)
AO Area of Operations
AoA Angle of Attack
APEC Asia Pacific Economic Cooperation
APG Asia-Pacific Gateway
APKWS Advanced precision kill weapon system
AQ Al-Qaida Terrorist Group – “the Base”
AOA Aircraft operating authority
AQIM al-Qaeda in the Islamic Maghreb
Ar Receive antenna effective area, m2
AR Aspect ratio
AR drone AR stands for “Augmented Reality” in AR drone. AR Drone can perform tasks like object recognition and following, gesture following.
ARM Anti-Radiation Munitions
ARS Airborne Remote Sensing
ART Autonomous Rail Transport
ARW Anti-radiation weapons
AS Airborne Sensing Systems
ASB Advisory Service Bulletin / Air Sea Battle
ASBM Anti-ship ballistic missile
ASCM Anti-ship cruise missile
ASEA Active electronically scanned arrays
ASEAN Association of Southeastern Asian Nations
ASC ALEXA /SIRI /CORTANA
ASICs Application specific integrated Circuits & circuit boards
ASL Airborne Systems Laboratory
ASMS Automated Separation Management System
ASR Chinese Air Silk Road
ASOS Automated surface weather observation system
ASTM American Society of Testing and Materials (ASTM)
ASTER Agency for Science, Technology and Research
ASuW Anti-surface unit warfare
ASW Anti-submarine warfare
AT Aerial target
ATC Air Traffic Control
ATHENA Lockheed Martin Advanced Test High Energy Asset
ATM Air Traffic Management
ATN Aids to Navigation (aka ATON)
ATR Automatic Target Recognition
ATS Air Traffic Service
AUDS Anti-UAV Defense System
AUV Autonomous Underwater Vehicle
Avionics Aviation electronics in manned or unmanned aircraft
AUVSI Association for Unmanned Vehicle Systems International
AV Air Vehicle
AWB Application White Boxing
AWOS Automated weather observation system
AWSAS All Weather Sense and Avoid System
B IF equivalent bandwidth, Hz
Backhauling Intermediate links between core network or internet backbone and small subnets at the edge of the network
BA Bacterial agent
BAMS Broad Area maritime surveillance
BATS Bermuda Atlantic Time-series Study
Bandwidth Defined as the Range within a band of wavelengths, frequencies, or energy.
Think of it as a range of radio frequencies occupied by a modulated carrier wave, assigned to a service over which a device can operate. Bandwidth is also a capacity for data transfer of electrical communications system.
BDA Battle Damage assessment
BER Bit error rate
Black Swan Black Swan Event- A black swan is an unpredictable event that is beyond what is.
normally expected of a situation and has potentially severe consequences. Black
swan events are characterized by their extreme rarity, severe impact, and the
widespread insistence they were obvious in hindsight.
(Black Swan Definition, 2020)
BLOS Beyond line-of-sight
BMI Buried Mine Identification
BNF Bind and Fly – with custom transmitter.
BOSS Buried Object Scanning Sonar
BPAUV Battlespace preparation autonomous underwater vehicle
BRI Chinese Belt and Road Initiative
BR&T Boeing Research and Technology
BT Biological toxins
BTA Biological Threat Agent
BSR Bilinear Signal Representation
BSs Base Stations
BVR Beyond visual range
BW Biological weapons
c Speed of light ~ (3 x 108 m/s) [186,000 miles per sec] in vacuum named after Celeritas the Latin word for speed or velocity.
c speed of sound (344 m/s) in air
C Combined methods of CR
C2 / C2W Command and control / Command and Control Warfare
C3I Command, control, communications, and Intelligence
C4 Command, control, communications, and computers
C4I Command, control, communications and computers, intelligence
C4ISR Command, control, communications, computers, intelligence, surveillance & reconnaissance
C4ISTAR Command, control, communications, computers, intelligence, surveillance, target
acquisition and reconnaissance
CA Collision Avoidance / Clear Acquisition (GPS) / Cyber Assault (aka CyA)
C/A Civilian acquisition code for GPS
CAA Control Acquisition cyber attack
CAS Close Air Support / Common situational awareness
CASA Civil Aviation Safety Authority
CASIC China Aerospace Science and Industry Corporation
C of A Certificate of Airworthiness
CAP Civil Air Publication
CAT Collision Avoidance Threshold /Connectivity & automation in transport
CC / CyC Cyber Crime
CCCI/II Classical Cryptography Course Volume I/II (Nichols R. K., Classical Cryptography Course Volume I / II, 1996)
CCE Cyber Counter Espionage
CCI Command control interface / Cyber Counterintelligence
CCMCPS Cooperative Cognitive Maritime Cyber Physical System
CCS Cyber Counter Sabotage
CCT Cyber Counter Terrorism
CC-UAS Counter-Counter Unmanned Aircraft Systems
CD Conflict Detection
CDL Common datalink
CDMA code division multiple access
CDN Content Distribution Network
CDR Collision detection and resolution systems (automated SAA in UAS)
CEA Cyber electromagnetic activities (Cyber, EW, Spectrum warfare)
CEO Chief Executive Officer
CETC Chinese Electronics Technology Group
CF Computer Forensics
CFTA Continental Free Trade Area
CFT Certificate of flight trials / Cross-functional teams
CHIMERA Counter-electronic HPM Extended range base air defense
CI / CyI Cyber Infiltration
CIA Confidentiality, Integrity, Availability / Central Intelligence Agency
CIAD Cyber- Multi-layered Integrated Air Defense Systems
CIED Computer improvised explosive device.
CIN Common Information Network
CIR Color Infrared – artificial standard where NIR bands shifted so that humans can see the infrared reflectance.
CISA Cybersecurity & Infrastructure Security Agency
CLE Airport code for Cleveland
C/N Carrier to Noise ratio in HAPS, => C/ N0
C/NA Communication / Navigation Aid
CM / CyM Countermeasure / Cyber Manipulation
CN3 Communications / navigation network node
CNI Critical National Infrastructure
CNKI China-North Korea-Iran technical weapons cooperation agreements
CNO Chief Naval Operations
CNPC Control and non-payload links
CO2 Carbon dioxide emissions
COA Certificate of Waiver or Authorization
COB Chief of the Boat
COMINT Communications intelligence
COMJAM Communications Jamming
COMSEC Communications Security
CONOP(S) Concepts of Operations
CONUS Continental United States
COOP Cooperative Observer Program
COS Continued Operational Safety
COTS Commercial off-the-shelf
CPA Closest Point of Approach
CPA Spoof CPA spoof involves faking a possible collision with a target ship.
CPL Commercial pilot’s license
CPNI Center for Protection of National Infrastructure (UK)
CPRC Communist Party of the Republic of China
CPS Cyber-physical systems
CR Conflict Resolution / Close range / Cyber Raid (aka CyR)
CRH Coaxial rotor helicopter
CRX Received Signal Power, watts
CS Control station
CSDP Common Security and Defense Policy missions (EU)
CSR Compact Surveillance Radar
CSfC Commercial Solutions for Classified Program
CSIRO Commonwealth Scientific and Industrial Research Organization
CT Counter Terrorism / Counter Terrorism Mission
CTOL Conventional take-off and landing
C-UAS Counter Unmanned Aircraft Systems (defenses / countermeasures)
CUAS CSIRO Unmanned Aircraft Systems
CV Collision Volume
CW / CyW Cyber Warfare
D-STAR Variation of A-STAR algorithm suitable for solving path planning problems in
unknown environments
D distance from transmitter in Range equation (Adamy D. -0., 2015)
DA Danger area
Danger Close
Definition www.benning.army.mil/infantry/magazine/issues/2013/May-June/Myer.html Nov 14, 2013 – 1) danger close is included in the “method-of-engagement” line of a call-for-fire request to indicate that friendly forces are close to the target. … Danger close is a term that is exclusive from risk estimate distance (RED) although the RED for 0.1 percent PI is used to define danger close for aircraft delivery. Pi = Probability of incapacitation. 2) Definition of “danger close” (US DoD) In close air support, artillery, mortar, and naval gunfire support fires, it is the term included in the method of engagement segment of a call for fire which indicates that friendly forces are within close proximity of the target.
DARO Defense Airborne Reconnaissance Office
DARPA Defense Advanced Research Projects Agency
DAS Detection by Acoustical Signature
dB decibels
DC Direct Current
DCL Drone Champions League
DCPA Distance between vessels approaching CPA.
DDD Dull, dangerous, and dirty
DDOS Distributed Denial of Service cyber attack
DE Directed Energy
DEF CON DEF CON is the world’s longest running and largest underground hacking conference.
DE / EP Directed energy / Electromagnetic pulse.
DEM Digital elevation model
DEW Directed energy weapons.
DF Direction finding
DFCS Digital Flight Control System
DHS Department of Homeland Security
DIME Diplomatic, information, military, and economy
DIRCM Directed Infrared Countermeasures
DIY Do-it-yourself (amateur built drones or modified racing drones)
D j Jammer location – to-target receiver location distance, in km, FM 34-40-7
DJ Data Jamming / Drone Jammer
DJI Popular and functional Chinese made drone series: Mavic, Phantom, Ryze, Matrix, Spark, Enterprise, Inspire, Tello {However, banned by USA Army} (Newman, 2017)
DL Downlink in HAPS
DLA Date last accessed (usually a web reference)
DLI Datalink interface
DME di-methyl ether
DNA Deoxyribonucleic acid
DoD Department of Defense
DOF Degrees of Freedom
DOS Denial of Service cyber attack
DOT Department of Transportation
DPM Direct power management / Dynamic Power Management
DPRK Democratic People’s Republic of Korea
D-R-O-N-E FAA Guidance: Direct, Report, Observe, Notice &Execute
DROV Remote operating vehicle
DSA Detect, sense and avoid / Dynamic Sense-and-Act.
DSR Chinese Digital Silk Road
DSS Decision Support System
DSSS Direct sequence spread spectrum.
D t Enemy transmitter location -to- target receiver location, in km, FM 34-40-7
DT Directional transmission / Department of Transport (UK)
DTDMA Distributed Time Division Multiple Access (DTDMA) network radio system
DTED Digital terrain evaluation data
DTF Drug Task Force
DTH Direct-To-Home
DTI Direct Track & Identify
DTRA Defense Threat Reduction Agency
DUO Designated UAS operator
DVL Doppler Velocity Log
EA Electronic Attack
EARSC European Association of Remote Sensing Companies
EAS Equivalent airspeed
EAU East Africa union comprising of Israel and six East African states, Kenya, Ethiopia, Tanzania, Uganda, Rwanda, and South Sudan
(Eb / No) Thermal noise power spectral density ratio
ECCM / EP Electronic counter-countermeasures / Electronic Protection
ECM Electronic countermeasures
ECR Electronic combat reconnaissance
EDC Estimated Date of Completion
EDEW Effects of Directed Energy Weapons
EEDI Energy efficiency design index
EEZP Exclusive economic Zone protection
EFF Electronic Frontier Foundation
EHS Enhanced surveillance
EIRP Effective isotopic radiated power
Electrolaser Electroshock weapon that is also a DEW. Uses lasers to form electrically conductive laser-induced plasma charge.
ELINT Electronic Intelligence
ELT Emergency locator transmitter
ECM Electromagnetic compatibility
EM Electromagnetic
EMC Electromagnetic compatibility
EME Electromagnetic environment
EMI Electromagnetic interference
EMO Electromagnetic operations
EMP Electromagnetic pulse
EMR Electromagnetic Radiation
EMS Electromagnetic Spectrum
EMSVIS Electromagnetic Spectrum Visible Light
EMW Electromagnetic Waves
EO Electro-optical (sensing) / Earth Observation
EOI Electro-Optical Imager
EOTS Electro-optical targeting system
EPIRB Emergency Positioning -Indicating Radio Beacon
EQUAS Explainable question answering system.
ERPJ Effective radiated power of the jammer, in dBm
ERPS Effective radiated power of the desired signal transmitter, in dBm
ESC Electronic still camera
ESM / ES Electronic support measures / Electronic warfare support / Earth station & ESM Electronic Signal Monitoring
EU European Union
EUNAVFOR European Union Naval Force’s anti-piracy naval mission
EUTM Somalia Military training mission in Somalia
EVTOL Electric Vertical Take-off and Landing
EW Electronic warfare, see 9-15 & footnotes.
F Field theory methods of CR
F Fundamental frequency is defined as the lowest frequency of a periodic waveform
f Frequency, cycles / second RRE)
Fo Resonant frequency of string, Hz see Eq. 20-5
F Frequency in MHz, FM 34-40-7
FAA Federal Aviation Administration
FACE Future Airborne Capability Environment
FAME Fatty acid methyl esters
FAR False Alarm Rates
FB Facebook©
FBL Fly-by-Light, a type of flight-control system where input command signals are sent to the actuators through the medium of optical-fiber.
FBW Fly-by-wire
FCC Federal Communications Commission
FCS Flight control systems / Flight Control Station
FDF Frequency Domain Filtering
FDM frequency division multiplexing
FHSS Frequency hopping spread spectrum.
FIIP Floating Integrated Information Platforms
FIR Far Infrared (25-40) to (200-350) um
FIRES definition (US DoD – JP 3-0) the use of weapon systems to create a specific lethal or nonlethal effect on a target.
FL Flight Level
FLIR Forward-looking infrared
Fly-by-Wire Predetermine flight mission path based on GPS coordinates.
Floats Floating sensors (USN)
FMS Flexible manufacturing system
Follow-Me UAS autopilot automatically follows operator.
Fom HAPS Figure of merit in upload /download link
FoV Field of view
FFOV Forward Field of View
FRAGO Fragmentary Order – to send timely changes of existing orders to a subordinate.
FPV First Person View – live streaming video used in racing drones.
FPGA Field programmable gate array
FS Fixed service
FSS Fixed satellite service
FW Fixed wing
FY Fiscal year
G Geometric methods of CR
G5S G5 Sahel (G5S) Joint Force, has membership of five states: Burkina Faso, Mali, Mauritania, Niger, and Chad
GAO General Accounting Office USA
gAR Receiving Antenna Gain as a Factor
GBU Guided Bomb Unit
GCHQ Government Communications Headquarters (Britain)
GCS Ground control station
GDP Gross Domestic Product (USA)
GDPR European Union’s (EU) General Data Protection Regulation
GDT Ground data terminal
GENie General Electric Network for Information Exchange
GEO Geostationary Earth orbit satellite
GEOINT Geospatial-Intelligence
GeoFence A geo-fence is a virtual perimeter for a real-world geographic area
GIGO Garbage in, garbage out
GLOW Gross lift-off weight for a missile / rocket
GLONASS Global Satellite Navigational System
GNL Galveston National Laboratory
GNSS Global Navigation Satellite System
GPS Global Positioning System / Geo Fencing
GPS/INS Use of GPS satellite signals to correct or calibrate a solution from an inertial navigation system (INS). The method is applicable for any GNSS/INS system.
GPSSPOOF Hack of GPS system affecting UAS commands.
GPWS Ground proximity warning system
G R The receiving antenna gain in the direction of the desired signal transmitter, dBi.
G RJ Receiving antenna gain in the direction of the jammer, in dBi.
GS Ground segment of HAPs
GSAA Government Services Administration – audit division
GSE Ground support equipment
GSHM Ground Station Handover Method
GSM Global System for Mobile Communications
GT Game Theory methods of CR
G/T ratio of the receive antenna gain to system noise temperature.
(G /Ts) dB Represents the figure of merit of the HAPS receiver, in dB.
GT Gain of the transmit antenna, dB.
GTA Ground -to -Air Defense
Hard damage DEW complete vaporization of a target
Harmonic Frequency, which is an integer multiple of the fundamental frequency.
H Elevation of the jammer location above sea level, feet, FM 34-40-7
HAE High altitude endurance
HALE High altitude – long endurance
HAPS High Altitude Platforms (generally for wireless communications enhancements)
HAPS UAVs UAVs dedicated to HAPS service (example to communicate via CNPC links)
HCE Highly contested environment
HEAT High-explosive anti-tank warhead
HELWS High energy laser weapon system
HITL Human in-the-loop
HMI Human machine interface
HO Home Office (UK)
HPA High power amplifier
HPL High powered laser weapon
HPM High powered microwave defense
HSM Hardware Security Module
H t Elevation of enemy transmitter location above sea level, in feet, FM 34-40-7
HUD Heads-up display
Human “a bipedal primate mammal (Homo sapiens), a person” (Merriam-Webster, 2020); Humanity “the quality or state of being human.” (Merriam-Webster, 2020)
Humanoids “a humanoid being: a nonhuman creature or being with characteristics (such as the ability to walk upright) resembling those of a human.”
HUMINT Human intelligence (spy’s)
HVT High value target (generally, for assassination)
I Sound intensity, W x m-2 [Source strength S / 4πr2] (Uni-Wuppertal, 2019)
IA Information Assurance / Intentional cyber warfare attack
I-actors Intentional Cyber Actors
IACS Industrial automation and control systems
IADS Multi-layered integrated air defense systems
IAI Israeli Aerospace Industries
IAS Indicated airspeed
IBM International Business Machines
ICAO International Civil Aviation Organization
I.C.B.C International Center for Boundary Cooperation (China)
ICBM Intercontinental Ballistic Missiles
ICGs Information centers of gravity
ICS Internet Connection Sharing / Industrial control systems
ICT Information & Communications Technology
ID Information Dominance / Inspection and Identification /Identification
IEC 62443 International standard for industrial automation and control systems
IEDs Improvised Explosive Devices
IEEE Institute of Electrical and Electronics Engineers
IETM Interactive Electronic Maintenance Manuals
IEWS Intelligence, electronic warfare, and sensors
IFF Identification, friend, or foe
IFR Instrument flight rules
I&I Interchangeability and Interoperability
IIT Intentional Insider Threats
Imaging Sensors ARS sensors that build images
IL Intensity level of sound measured, dB, Eq. 20-2
IMINT Imagery intelligence
IMM/IM&M Interacting-multiple-models tracker / Integrity Management & Monitoring
IMO International Maritime Organization
IMU Inertial Measurement Unit
INS Inertial navigation system
INFOSEC Information Security
IO Information Operations, see Figure 9-11 & footnotes.
IOB Internet of bodies
IOC Intergovernmental Oceanographic Commission
IOR India Ocean Region
IoT Internet of things
IIoT Industrial Internet of things
IPL Insitu Pacific Limited
IR Infrared Sensors
IRST Infrared search and tracking
IS Information Superiority
ISCS Integrated shipboard control systems
ISIS Islamic State of Iraq and al Sham (ISIS)
ISR Intelligence, Reconnaissance and Surveillance UAS Platform
ISTAR Intelligence, surveillance, target acquisition and reconnaissance
IT/OT Information Technology/ Operational Technology
ITU International Telecommunications Union – Standards Organization
ITU-R International Telecommunications Union – Radio Sector
IW Information Warfare
JADC2 Joint all-domain command & control
JADO Joint all-domain operations (Thatcher, 2020)
JAGM Joint-Air-to-Ground Missile
JAUS Joint architecture for UAS
JDAM Joint direct attack munitions
JFO Joint fires observer
JP Joint Publication – followed by military identifier.
JDAM Joint Direct Attack Munition
JNIM Jama’at Nusrat al-Islam wal-Muslimin
JOAC Joint Operational Access Concept
JOPES Joint Operation and Planning System / Execution System
JP Joint Publication
J / S = the ratio of the jammer power to the desired signal power at the input to the receiver being jammed in dB
JST Japan Time zone
JTAC Joint Terminal Attack Controller.
JTIDS Joint Tactical Information Distribution System (JTIDS) is an L band DTDMA.
K Boltzmann’s constant (Noise component, RRE) (1.38 x 10 -23 J/K), Kelvin
K 2 for jamming frequency modulated receivers (jamming tuner accuracy), FM 34-40-7
KAMIKAZI Means “Divine Wind,” Tactic best known for Japanese suicide A/C attacks on Allied Capital Vessels in WWII. UAS TEAMS or SWARMS could be directed in the same way.
KE Kinetic energy
KEW Kinetic energy weapons
KM Katiba Macina Groups
KMS Key Management System
KSU Kansas State University
L λ / 2 in Eq. 20-5
LAANC Low Altitude Authorization and Notification Capability
LASER “A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation. The term “laser” originated as an acronym for “light amplification by stimulated emission of radiation”. A laser differs from other sources of light in that it emits light coherently, spatially and temporally. Spatial coherence allows a laser to be focused to a tight spot, enabling applications such as laser cutting and lithography. Spatial coherence also allows a laser beam to stay narrow over great distances (collimation), enabling applications such as laser pointers. Lasers can also have high temporal coherence, which allows them to emit light with a very narrow spectrum, i.e., they can emit a single color of light. Temporal coherence can be used to produce pulses of light as short as a femtosecond. Used: for military and law enforcement devices for marking targets and measuring range and speed.” (Wiki-L, 2018)
Laser JDAM Laser Joint Direct Attack Munition – dumb bombs, all weather precision –guided munitions. Guided by an integrated inertial guidance system.
Laser rangefinder Scope to assist targeting of munitions. Countermeasure: laser-absorbing paint
LGWs Laser-guided weapons
Latency Processing difference between time interval signal is transmitted and signal is received
LCAC Landing Craft Air Cushion Facility
LCDR Lieutenant Commander
L/D Lift to drag ratio.
LDCM Low Duty cycle methods
LEO Low Earth Orbit Satellite / Law Enforcement Officer
LGB Laser-guided bomb, a guided bomb that uses semi-active laser guidance to strike a designated target with greater accuracy than an unguided one.
LGTF Liptako-Gourma task force (LGTF) established by Burkina Faso, Mali, and Niger to secure their shared border region.
LIDAR Light (Imaging) Detection and Ranging
LFS Free- Space Loss as a Factor
LIPC laser-induced plasma channel
LJ Propagation loss from jammer to receiver, in dBi
LMADIS Light Marine Air Defense Integrated System (family of C-UAS systems)
LMM Lightweight Multi-role Missile (by Thales)
LNG Liquid natural gas
LORAN-C Long Range Navigation, Revision C
LOS Line-of-sight / Loss of Signal / Loss of Separation
LOSAS Low-cost Scout UAV Acoustic System
LPA Log periodic array
LPI Low Probability of Intercept
LR Long range
LRA Long range artillery
LRAD Long Range Acoustical Device (Weapon) (Yunmonk Son, 2015)
LRCS Low radar cross section
LRE Launch and recovery element.
LRF Laser rangefinder
LS Losses existing in the system (lumped together), dB (RRE)
LS The propagation loss from the desired signal transmitter, in dBm
LSDB Laser Small Diameter Bomb
LSG Real-time Tracking Laser Scalar Gradiometer
LST Laser spot trackers
LTA Lighter than Air (airship) /Low noise amplifier
LTE /LTE+ Long Term Evolution – refers to mobile telecommunications coverage.
LUSV Large Unmanned Surface Vehicles
LWIR Long wave Infrared (sensor or camera)
M Mass in Eq. 20-5
MA Multi-agent methods of CR
MAC Unique Media access control address assigned to a network interface controller (NIC) for use as a network address in communication with a network segment.
MAD Magnetic anomaly detection
MADIS Marine Air Defense Integrated System
MAE Medium-altitude endurance
MAGTF Marine air-ground task force
MALDRONE Malware injected into critical SAA for UAS.
MALE Medium-altitude, long endurance UAS
MALE-T Medium altitude long endurance – tactical UAS
MAME Medium altitude, medium endurance
MARIN Maritime Research Institute Netherlands
MARPOL Marine pollution (prevention of)
MAS Mayflower autonomous system
MASINT Measurement and Signal Intelligence
MATS Mobile Aircraft Tracking System
M-AUDS Mobile Anti-UAV Defense System
MAV Micro-air vehicle
Maverick AGM -65 (USA) Missile
MBES Multi-beam Echo Sounder
MCE Mission control element
MCM Mine countermeasures
MCU Master Control Unit
MCVs Mesoscale convective vortices
MDR Missed Detection Rates
Mesonet network of automated weather and environmental monitoring stations designed to
observe mesoscale meteorological phenomena.
MEB Marine expeditionary brigade (14,500 marines and sailors).
MEMS Micro-electromechanical systems
MEO Medium Earth Orbit satellite
MFD Multifunctional display
MGTOW Maximum gross take-off weight
MHT Multiple-hypotheses-testing
MIM Man in the Middle cyber attack
MINUSMA Multidimensional Integrated Stabilization Mission in Mali
MIR Mid Infrared 5 to (25-40) um
MIT Massachusetts Institute of Technology
ML Machine learning techniques
MLRS Multi launch rocket systems.
MLU Mid-life upgrade
MMI Man-machine interface
MORS Military Operations Research Society
Modulation Signal Modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted
MPA Maritime patrol aircraft
MPI Message-passing interface
MPC Model-based predictive control
MPO Mission payload operator
MR Medium range / Maritime Reconnaissance
MRE Medium-range endurance
MS Mobile service
MSL / AGL MSL altitudes are measured from a standard datum, which is roughly equal to the average altitude of the ocean. So, an aircraft traveling 5,000 feet directly above a mountain that’s 3,000 feet tall would have an altitude of 5,000 feet Above Ground Level (AGL) and 8,000 feet MSL.
MSR Maritime Silk Road (China)
MSSM Multi-step optimization method to achieve re-planning for stealth UAV penetration of ADS.
MTCR missile Technology Control Regime
MTI Moving target indication*
MTOM Maximum take-off mass
MTOW Maximum takeoff weight of an aircraft at which the pilot can attempt to take off, due to structural or other limits.
MTS Multi Spectral Targeting System /Maritime Transportation Systems / Sector
MTTR Multitarget tracking radar/Mean time to repair.
MUAV Mini-UAV or maritime UAV
MUJAO Movement for Unity and Jihad in West Africa
MUM Manned-unmanned teaming.
MUSV Medium Unmanned Surface Vehicles
MW Microwave
MWIR Midwave Infrared
MW microwave towers
N Available Noise power, watts for HAPS
N Terrain and ground conductivity factor, FM 34-40-7
5 = very rough terrain with poor ground conductivity
4 = moderately rough terrain with fair to good ground conductivity
3 = Farmland terrain with good ground conductivity
2 = Level terrain with good ground conductivity[1]
The elevation of the jammer location and the enemy transmitter location does not include the height of the antenna above the ground or the length of the antenna. It is the location deviation above sea level.
NAC Network Access Control
NACA National Advisory Committee on Aeronautics
NAS National Airspace (USA)
NASAMS II National Advanced Surface to Air Missile System
NATO North Atlantic Treaty Organization
NAV Nano-air vehicle / NAV data message for GPS systems
NAVSEAS Naval Sea Systems Command
NBC Nuclear, biological, and chemical warfare
NCO Network-centric operations
NCW Network Centric Warfare
NDRC National Development and Reform Commission (China)
NEC Network enabled capability
NEMESIS Netted Emulation of Multi-Element Signature against integrated Sensors (USN)
NGA National Geospatial Intelligence Agency
NGO Non-Governmental Organization
NIEM National Information Exchange Model
NIR near Infrared
NLOS Non-line-of-sight
NM Nautical Miles
NMAC A NMAC is defined as an incident associated with the operation of an aircraft in which a possibility of collision occurs as a result of proximity of less than 500 feet to another aircraft, or a report is received from a pilot or a flight crewmember stating that a collision hazard existed between two or more aircraft.
NMLA the National Movement for Liberation of Azawad (Tuareg Rebellion)
NO Numerical Optimization methods of CR
NOAA National Oceanographic and Atmospheric Administration
NOLO No onboard live operator (USN)
NOTAM Notice to airmen
NOx Nitrogen emissions
NPD Near Peer Doctrine
NPS National Park Service
NSA National Security Agency (US)
NSRL New Silk Road Sea / Land routes (Chinese)
NSWC Naval Surface Warfare Center
NSWC PCD Naval Surface Warfare Center Panama City Division
NTIA National Telecommunications and Information Administration
NTM/NTOM Notice to mariners
NTSB National Transportation Safety Board
NTT Non-Threat Traffic
NULLO Not using live operator (USAF)
NUSSRC National Unmanned Systems Shared Resource Center
O Other methods of CR
OEM Original Equipment Manufacture
OIO Offensive Information Operations
OLOS Out-of-the-line-of-sight
OODA Decision Loop: Observe, Orient, Decide, Act
OoT Ocean of Things (USN) (DARPA)
ONR Office of Naval Research
OPA Optionally piloted aircraft
OPAV Optionally piloted air vehicle (aka OPV)
OPSEC Operations Security
OSI Open systems interconnection
OSS Office of Strategic Services (now CIA)
OT Operational technology
OTH Over- the- horizon
OVPR Office of the Vice President of Research , KSU
P Isotropic source of an electromagnetic pulse of peak power, Mw
PACE Primary; Alternative; Contingency; Emergency
PANCAS Passive Acoustic Non-Cooperative Collision Alert System
PAR Photosynthetically Active Radiation Sensor
PB Particle Beams, Particle beams are large numbers of atomic or sub-atomic.
particles moving at relativistic velocities.
PCAS Persistent close air support
PCS Personal Communication Services
PDV Parameter Data Vector
PEIRP Transmitter’s effective isotropic radiated power, watts
PFMS Predictive Flight Management System
PEMSIA Partnership in Environmental Management of the Seas of East Asia
PGB Precision guided bomb
PGM Precision guided missile
PHOTINT Photographic intelligence (usually sky – ground)
PHX Airport code for Phoenix
PI Probability of Incapacitation
PID Proportional-Integral- Derivative
PII Personal Identifiable Information
PIM Position of intended movements/Previously intended movements
PIT Proximity Intruder Traffic
P j Minimum amount of jammer power output required, in watts, FM 34-40-7
PKI Public Key Infrastructure
PL Power level, dB, Eq. 20-1
PLA Chinese People’s Liberation Army
PLAN Peoples Liberation Army Navy (China)
PLC Programmable Logic Controllers
PLOCAN Research facility Oceanic Platform of the Canary Islands
PMA Post Mission Analysis
PMIAA Permissions Management: Identification, Authentication and Authorization
PNF Plug and Fly with custom transmitter, receiver, battery, and charger.
PNT Reliable communications; positioning, navigation, and timing
PO Psychological Operations / Performance Objectives
POS Position and Orientation System
POV Point of View
PPP Precise Point Positioning
PPS Precise positioning service (GPS)
PRC Peoples Republic of China (China)
Primum Non Nocere – First Do No Harm (Latin)
PSD Power Spectral Density
PREACT Partnership for Regional East Africa Counterterrorism (PREACT)
PRF Pulse repetition frequency codes
PRM Precision Runway Monitor
PS Pressure sensor
PSH Plan-symmetric helicopter
PSR Primary Surveillance Radar
P t Power output of the enemy drone, in watts, FM 34-40-7
PW/PSYWAR Psychological Warfare
PWO Principal Warfare officer
P(Y) Precise Signal (GPS)for military positioning
QOS Quality of Service in HAPs
QR QR code is a type of matrix barcode which is machine or phone readable.
QUAS QUT UAS
QUT Queensland University of Technology
R 1 /Tb is the bit rate (b/s) in link equation
R&D Research & Development
R4 Energy density received at detected target range, R, nm.
RA Resolution Advisory
RAC Range air controller
RACC Social media RACC Threat Matrix: Removal, Authenticity; Censorship, Collusion
RADAR Radio Detection and Ranging
RADINT Radar intelligence
RAM Radar absorbing materials.
RAS Radar absorbing structure.
RAST Recovery, assist, and traverse.
RB Rule-based methods (Conflict Resolution)
RBW Red- breasted Woodpecker
RCE Remote Code Execution
RCO Remote-control operator
RCS Radar cross-section
RCTA Surf Radio Technical Commission for Aeronautics
RDT& E Research, Development, Test & Evaluation
RED Risk Estimate Distance
Remote ID Remote ID has two meanings in this textbook. It is used as an information /
technology device to identify people from a UAV. This term is used in the UAS.
industry and the FAA as a mechanism for identifying an aircraft type and the
registrant from the ground, essentially a digital license plate and registration.
RES Radio electronic systems
RF Radio Frequency
RGB Red Green Blue for VIS camera
RGT Remote ground terminal
RIAS Research Institute for Autonomous Systems -University of North Dakota
Rician PDF Rician probability density function
RIMPAC Rim of the Pacific Exercise – Maritime
RL Ramp launched
RMS Reconnaissance management system /Root-mean-square
RN Ryan-Nichols Qualitative Risk Assessment Equations 17-2, 17-3
RNRA Ryan – Nichols Attack / Defense Scenario Risk Assessment for Cyber cases
ROA Remotely operated aircraft
ROC Republic of China (Taiwan) / Regional Operations Center (USA)
ROV/ROUV Remote operating vehicle / Remotely operated underwater vehicle
RPA Remotely piloted aircraft
RPH Remotely piloted helicopter
RPV Remotely piloted vehicle
RR Radio regulations
RRE Radar Range Equation
RSA RSA (Rivest–Shamir–Adelman) -authors of early public –key cryptographic system
RSTA Reconnaissance, surveillance, and target acquisition
RTA Dubai Roads and Transport Authority
RTF Off- the- shelf, Ready -to -Fly
RTG Real time Gradiometer
RTK Real Time Kinematic
RTS Remote tracking station/Request to send/Release to service.
RTU Remote Terminal Unit
RUAV Relay UAV
RWR Radar warning receiver
S Intensity at surface of sphere
S&T Science & Technology
SA Situational Awareness
SAA Sense and Avoid &
SAA Sense and Act Systems; replaces See and Avoid function of a human pilot.
SAASM Selective Availability Anti-Spoofing Module
SAE Society of Automotive Engineers
SAHRV Semi-autonomous Hydrographic Reconnaissance vehicle
SAM Surface to Air Missile
SAMPLE Survivable autonomous mobile platform, long-endurance
SAP Systems Applications and Products also the name of a company
SAR Synthetic aperture radar / Search and rescue- especially using helicopters.
SAS Safety Assurance System
SATCOM Satellite communications
SBP Sub Bottom Profiler
SCADA Supervisory Control and Data Acquisition systems
SCHEMA Security Incident Identification
SCIF Sensitive Compartmented Information Facility
SCS Shipboard control system (or station) / Stereo Camera System / South China Sea
SE Synthetic environment
SEA Airport code for Seattle
SEAD Suppression of Enemy Air Defenses
SECDEF Secretary of Defense
Shadowing Airframe shadowing – UAV- Ground signal degradation during maneuver
SEZ Special economic zones
SHM Simple harmonic motion – represented by sign wave.
SHORAD Short Range Air Defense systems
SIGINT Signals Intelligence
Signature UAS detection by acoustic, optical, thermal and radio /radar
SINS Ships inertial navigation systems.
SJM Salafi-Jihad Movement
SKASaC Seeking airborne surveillance and control.
SKYNET Fictional artificial intelligence system that becomes self-aware
SLAM Simultaneous localization and mapping
SLAMRAAM Surface launched AMRAAM
SM Separation Management
SMC Single moving camera
SME Subject matter expert
SMR Single main rotor
S/N S / N = is one pulse received signal to noise ratio, dB: Signal to Noise ratio at HAPS receiver
SOA Static Obstacle – Avoidance system
Soft damage DEW disruption to a UAS computer
SOLAS Safety of Life at Sea (International Maritime Convention) [safety conventions]
SONAR Sound Navigation and Ranging
Sox Sulfur emissions
SPL Sound pressure level, dB = 20 Log p / po [ measured pressures to reference pressure] see Eq. 20-3,4; 6-7
SPS Standard position service (GPS)
Spoofing A Cyber-weapon attack that generates false signals to replace valid ones.
Spot sensors ARS sensors that measure single locations without image library
SPURV Special purpose underwater research vehicle
SQL SQL Injection – common malevolent code injection technique
SR Short range
SRBM Short range ballistic missile, ex SCUD missile
SRL Systems readiness level
SSA Static Sense-and -Act
SSBN Ballistic missile submarine force
SSP Smart Skies Project
SSR Secondary Surveillance Radar
SST Self – Separation Threshold
ST&T Submarine Track and Trail
STANAG 4856 Standard interfaces of UAV Control System for NATO UAV
STCW Standards of training and certification
STK Satellite toolkit
STOL Short take-off and landing
sUAS Small Unmanned Aircraft System
SubT Subterranean Challenge Urban Circuit
SUAVE Small UAV engine
SWARM High level, dangerous collaboration of UAS, UUV, or unmanned boats
SWAT Special Weapons and Tactics (police / paramilitary)
SWAP Size, weight, and power
SWIR Shortwave infrared, 1400-3000 nm, 1.4 -3.0 um wavelength range
SZ Safety Zone is defined as the horizontal and vertical separation criteria which form a cylindrical airspace volume around the UAS. In figure 3-2 that volume is defined by 1000 ft. radius and 200 ft. height. It is assumed that initially the UAS is in the center with 100 ft above and below the A/C.
T In Range equation & environment, strength of a received signal, function of square or fourth power of distance, d, from transmitter (Adamy D. -0., 2015)
T Time, sec (RRE)
T Tension in Eq.20-5
TA Traffic Advisory
TAC Target air controller
TACAN Tactical air navigation
TAR Antenna noise temperature, Kelvin
TAS True airspeed
TBO Time between overhauls
TC Type certificate
TCAS Traffic alert and collision avoidance system
TCPA Time to reach Closest Point of Approach
Te Effective input noise temperature, Kelvin,
TEAM (UAS) High level, dangerous collaboration of UAS, UUV, or unmanned boats; differs from SWARM in that it has a UAS Team Leader, (TL) where SWARM does not. TL directs the UAS team and is the primary counter UAS target to disrupt.
TETRA Terrestrial Trunked Radio for terrestrial terminals / services
Thermobaric Metal augmented charge
THOR Tactical high-power operational responder
TIR Thermal infrared = 8000 – 15000 nm, 8 -15 um
TL Team Leader
TLS Transport Layer Security
TO take-off
Tort A tort is an act or omission that gives rise to injury or harm to another and amounts to a civil wrong for which courts impose liability.
TP Trajectory Prediction
TRANSCOM U.S. Transportation Command networks
TRL Technology readiness level: Technology readiness levels are a rating method.
developed by NASA to describe where a technology is in terms of its
development. The lowest levels (1 – 3) are technologies that are being.
researched, the middle levels (4 – 6) are technologies that are being prototyped.
and tested, and the highest levels (7 – 9) are technologies that are being.
demonstrated and used. (NASA, 2017)
TS Measured noise temperature, Kelvin units above absolute zero.
TSTCP Trans-Sahara Counterterrorism Partnership. TSCTP partners include Algeria, Burkina Faso, Cameroon, Chad, Mali, Mauritania, Morocco, Niger, Nigeria, Senegal, and Tunisia.
TT & C Telemetry, tracking and command.
TUAV Tactical UAV
UA Unmanned Aircraft (non-cooperative and potential intruder)
U-Actors Unintentional Cyber Actors
UAE United Arab Emirates
UAM Urban Air Mobility (vehicle)
UAPO Unmanned Aircraft Program Office
UAS Unmanned aircraft system
UASCdr Unmanned aircraft system commander
UASIPP UAS Integration Pilot Program
UAS-p UAS pilot
UAV Unmanned aerial vehicle / Unmanned autonomous vehicle.
UAV-p UAV pilot
UBR Uplink bit rate, Mb/s
UCAR Unmanned combat armed rotorcraft
UCARS UAV common automated recovery system
UCAV Unmanned combat air vehicle
UCWA / UA Unintentional cyber warfare attack
UG Underwater glider (USN)
UGCS Unmanned Ground Control Station
UGS Unmanned ground-based station
UGT Unmanned ground transportation
UGV Unmanned ground vehicle
UHF Ultra High Frequency, 300 MHz – 3 GHz
UIT Unintentional Insider Threats
UK United Kingdom
UL Upload link
ULC Uniform Law Commission
ULPCG University of Las Palmas de Gran Canaria
UMTS Universal Mobile Telecommunications System
U.N. United Nations
UND University of North Dakota
UNESCO United Nations Educational, Scientific and Cultural Organization
UNICEF United Nations Children’s Fund
US United States
USAMRIID U.S. Army Medical Research Institute of Infectious Diseases
USBL Responder for Surface Ultra Short Baseline
USCG United States Coast Guard
USCGA United States Coast Guard Auxiliary
USD Unmanned surveillance drone / United States Dollar
USMC United States Marine Corp
USS Undersea Search and Survey
USV Unmanned surface vehicle [Boat]
UTM Unmanned Traffic Management / Safe Uniform Traffic Management
UTV Unmanned target vehicle
UUV Unmanned underwater / undersea vehicle.
UV Unmanned Vehicle
UUNs/DUNSs Urgent / deliberate universal needs statements
UXO Unexploded Ordinance
V Visible
VCR Video Camera Recorder
VFR Visual flight rules
VHS Very High Frequency Radio
VIKI Virtual Interactive Kinetic Intelligence
VLA Very light aircraft
VLJ Very Light Jet
VLAR Vertical launch and recovery
VLOS Visual Line of Sight
VMC Visual Meteorological Conditions
VNIR Visible light and near infrared 400 – 1400 nm, 0.4 – 1.4 um wavelength range
VOA Voice of America
Voloport Landing site for Volcopter.
VTC Vessel traffic control
VTM Vessel traffic management
VTOL Vertical take-off and landing
VTUAV Vertical take-off UAV
WABN wide available broadband networks
WARM identify war reserve mode emissions.
WEF World Economic Forum
WEZ Weapon Engagement Zone
WMD Weapons of Mass Destruction /Weapons of Mass Disruption
WMDD Weapons of Mass Destruction Directorate
WRC World Radio Conference Standards Organization
XLUUV Extra-large unmanned undersea vehicle
XO Executive Officer of Naval vessel
ZIGBEE or KILLERBEE Sniffing / penetration tools specific to UAS.
Greek / Mathematical Symbols
λ Wavelength in Hz, c / f where c= speed of light 344 m/s and f = frequency, Hz.
Σ Radar Cross Sectional Area, m2
υ UAV velocity vector and UAV speed (ms -1)
θ Horizontal angle in inertial axes (rad)
Ψ Vertical angle in inertial axes (rad)
x,y,z Inertial position coordinates (m)
κ Curvature (m-1)
τ Torsion, (m-1)
r(q) Path, with path variable (q)
h Path length (m)
e Basis axes vector set.
P(x, y, z, θ, Ψ) UAV pose where: where x, y, z, is the UAV location or waypoint and (θ, Ψ) are.
the horizontal and vertical angles , respectively
Ps Starting pose for UAV moving to
Pf Finish pose
Џ Path constraint in (9.4)
a lateral acceleration proportional to curvature k
∞ vector operator in (9.6)
f(n) Path cost function in (9.9)
g(n) cost of path from start node n to the goal.
h(n) Heuristic function which estimates the distance from the next node n on the path.
to goal in (9.9)
h(X) represents actual journey cost from goal X.
g(X,E) represents the estimate journey cost from state X to the current position of the
stealth UAV in (9.10)
N Length of the prediction domain in (9.11) & N steps in (9.12)
W length of the control domain in (9.11)
qi Output prediction error
qj Is the weighting coefficient of the control variable in (9.11)
k Kth node for prediction of cost of predicted flight path in MPC (9.12)
3-D three dimensional
Special Definitions
Asymmetric warfare can describe a conflict in which the resources of two belligerents differ in essence and, in the struggle, interact and attempt to exploit each other’s characteristic weaknesses. Such struggles often involve strategies and tactics of unconventional warfare, the weaker combatants attempting to use strategy to offset deficiencies in quantity or quality of their forces and equipment. (Thomas, 2010) Such strategies may not necessarily be militarized. (Steponova, 2016)
This is in contrast to symmetric warfare, where two powers have comparable military power and resources and rely on tactics that are similar overall, differing only in details and execution. (Thomas, 2010)
Sources plus Bibliography below: (Nichols R. K., Unmanned Aircraft Systems In the Cyber Domain: Protecting USA’s Advanced Air Assets. 2nd Ed. Manhattan, KS: New Prairie Press., 2019) and (Nichols, et al., Counter Unmanned Aircraft Systems Technologies and Operations, 2020) (Nichols & et.al, 2020)
Austin, R, (2010) Unmanned Aircraft Systems: UAVS Design, Development and Deployment, West Sussex, UK: Wiley, [Condensed with additions from eleven-page “Units and Abbreviations Table.” Pp. ix-xxix] Additional sources generated from / specific to Chapter development / discussion. A few definitions taken from Wikipedia.
Cyber terminology from: Nichols, R. K. (Sept. 5, 2008) Cyber Counterintelligence & Sensitive Compartmented Information Facility (SCIF) Needs – Talking Points & (Randall K. Nichols J. J., 2018) & (Nichols R. K., Hardening US Unmanned Systems Against Enemy Counter Measures, 2019) & (Randall K. Nichols D. , Chapter 20 Acoustic CM & IFF Libraries V SWARMS Rev 1 05142019, 2018) & (Randall K. Nichols and Lekkas, 2002)& (NIST, September 2012)
Alford, L. D., Jr., USAF, Lt. Col. (2000) Cyber Warfare: Protecting Military Systems Acquisition Review Quarterly, spring 2000, V.7, No. 2, P, 105, (Nielsen, 2012)
Nichols, Randall K.; Mumm, Hans C.; Lonstein, Wayne D.; Ryan, Julie J.C.H.; Carter, Candice; and Hood, John-Paul, “Unmanned Aircraft Systems in the Cyber Domain” (2019). NPP eBooks. 27. https://newprairiepress.org/ebooks/27
Http://Www.Dtic.Mil/Dtic/Tr/Fulltext/U2/A487951.Pdf
Appendix 1: Standard Acoustic Principal Physical Properties (Entokey, 2019)
and (Gelfand S. A., 2009)
A majority of the technical abbreviations come from (Nichols R. K., et al., Unmanned Aircraft Systems in the Cyber Domain, 2019) and (Nichols, et al., Counter Unmanned Aircraft Systems Technologies and Operations, 2020) (Nichols & et.al, 2020) (Nichols, et al., Unmanned Aircraft Systems (UAS) in Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd Edition, 2019) Nichols, R. K., Ryan, J., Mumm, H., Lonstein, W., Carter, C., Hood, J., . . . & Jackson, M. (2020). Unmanned Vehicle Systems & Operations on Air, Sea, Land. Manhattan, KS: New Prairie Press #35. Nichols, R. K., Sincavage, S., Mumm, H., Lonstein, W., Carter, C., Hood, J., . . . & Shields, B. (2021). Disruptive Technologies With Applications In Airline, Marine, Defense Industries. Manhattan, KS: New Prairie Press, #TBA.
Other definitions from the following references:
References
49 U.S. Code § 40103, 49 U.S. Code § 40103 Sovereignty and use of airspace (U.S. Code July 5, 1994).
Abramson, E. (2016). Ethical Dilemmas in the Age of AI. Retrieved from Abramson, E. – knowmail.me/blog: https://www.knowmail.me/blog/ethical-dilemmas-age-ai/
Adamy, D. -0. (2015). EW 104 EW against a New Generation of Threats. Boston: Artech House.
Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston, MA: Artech House.
Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston: Artech House.
Adamy, D. (2004). EW 102 A Second Course in Electronic Warfare. Boston: Artech House.
Adamy, D. (2009). EW 103 Tactical Battlefield Communications Electronic Warfare. Boston: Artech House.
Adamy, D. (2009). EW 103 Tactical Battlefield Communications Electronic Warfare. Boston, MA: Artech House.
Adamy, D. (2015). EW Against a New Generation of Threats. Boston: Artech House.
Adamy, D. L. (2004). EW 102 A Second Course in Electronic Warfare. Boston: Artech House.
Adamy, D.-9. (1998, Jan). Lesson 4: the basic link for all EW functions. (electronic warfare)(EW Reference & Source Guide). Journal of Electronic Defense, Jan 1998 Issue.
Administrator. (2015, June 15). Standing Wave and Fundamental Frequency. Retrieved from Electronics Hub: https://www.electronicshub.org/?s=fundamental+frequency
Administrator. (2019, May 17). Harmonic Frequencies. Retrieved from electronicshub.org: https://www.electronicshub.org/harmonic-frequencies/
Alejandro Aragon-Zavala, J. L.-R.-P. (2008). High-Altitude Platforms for Wireless Communications. Chichester, West Sussex, UK: John Wiley & Sons.
Alford, L. (2000). Cyber Warfare: Protecting Military Systems. Acquisition Review Quarterly.
Angelov, P. (2012). Sense and avoid in UAS research and applications. Hoboken: NJ.
Anon. (2019). Saudi Arabia grants citizenship to robot Sophia. Retrieved from dw: Saudi Arabia grants cihttps://www.dw.com/en/saudi-arabia-grants-citizenship-to-robot-sophia/a-41150856
Army, U. (1992, November 23). US Army Field Manual FM 34-40-7. Communications Jamming Handbook.
Asimov, I. (1950). “Runaround”. I, Robot (The Isaac Asimov Collection ed.). New York City: Doubleday.
Atherton, K. D. (2019). Can the Pentagon sell Silicon Valley on AI as ethical war? . C4ISRNET.
Austin, R. (2010). “Design for Stealth”, Unmanned Aircraft Systems UAVS Design Development and Deployment. New York: John Wiley and Sons.
Barnhart, R. K. (2012). Introduction to Unmanned Aircraft Systems. New York: CRC Press.
Beaudoin, L. e. (2011). Potential Threats of UAS Swarms and the Countermeasures Need. ECIW.
Bernstein, R. A. (29 June 2012). MUNITIONS DETECTION USING UNMANNED UNDERWATER VEHICLES EQUIPPED WITH ADVANCED SENSORS. Panama City, FL: NSWC PCD ESTCP Project Number MR-201103 Ver 7a.
Black Swan Definition. (2020, December 16). Retrieved from https://www.investopedia.com/terms: https://www.investopedia.com/terms/b/blackswan.asp#:~:text=A%20black%20swan%20is%20an,they%20were%20obvious%20in%20hindsight.
Bluefin Robotics. (2020, December 15). Retrieved from gdmissionsystems.com/underwater-vehicles/bluefin-robotics: https://gdmissionsystems.com/underwater-vehicles/bluefin-robotics
Brown, E. F. (Dec 2008). Airborne Communication Networks for Small Unmanned Aircraft Systems. Proc. IEEE, vol 96, no 12, pp. 2008-17.
Burch, D. (2015). RADAR for Mariners. New York: McGraw-Hill.
Cameron, J. &. (Director). (1991). Terminator 2: Judgement Day [Motion Picture].
Chapman, A. (2019, May 31). GPS Spoofing. Retrieved from Tufts University – Tech Notes 2017: https://sites.tufts.edu/eeseniordesignhandbook/files/2017/05/Red_Chapman.pdf
Cornell University Legal Information Institute. (2019, June 5). But-for test. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/but-for_test
Cornell University Legal Information Institute. (2019, June 5). Intervening Cause. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/intervening_cause
Cornell University Legal Information Institute. (2019, June 5). Personal Jurisdiction. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/personal_jurisdiction
Crouch, T. (2014, March). history-of-flight/wright-brothers-first-flight-photo. Retrieved from www.airspacemag.com: https://www.airspacemag.com/history-of-flight/wright-brothers-first-flight-photo-annotated-180949489/
D, G. a. (2010). Broadband Communications via High Altitude Platforms. New York City, NY: John Wiley & Sons.
Dalamagkidis, K. V. (2012). On Integrating Unmanned Aircraft into the National Airspace System, 2nd edition. Denver, CO: Springer.
Daniel-Cornel TĂNĂ, S. (2018). The Impact of the Development of Maritime Autonomous Systems on the Ethics of Naval Conflicts. Annals: Series on Military Sciences(2), 118-130.
Deloitte Center for Government Insights analysis. (2018, June 18). The future of regulation. Principles for regulating emerging technologies. Retrieved from Deloitte Insights: https://www2.deloitte.com/insights/us/en/industry/public-sector/future-of-regulation/regulating-emerging-technology.html
Dewey, D. (2017, July 14). Drone crashes into LDS temple in Utah; raises questions of airspace rules. Retrieved from eastidahonews.com: https://www.eastidahonews.com/2017/07/drone-crashes-lds-temple-utah-raises-questions-airspace-rules/
Diversity of citizenship; amount in controversy; costs, 28 U.S. Code § 1332 (United States Congress June 25, 1948).
DJI. (2019, June 5). DJI Enterprise. Retrieved from Enterprise DJI.com: https://enterprise.dji.com/civil-protection
DLSR Pros. (2019, June 3). Best Drones (UAVs) for Firefighting in 2019. Retrieved from dlsrpros.com: https://www.dslrpros.com/dslrpros-blog/best-drones-firefighting-2019/
DoD. (2018). Dictionary of Military Terms. Retrieved from JCS.Mil: http://www.jcs.mil/doctrine/dod_dictionary/
DoD. (2018). Joint Publication (JP) 3-01 Countering Air and Missile Threats. Washington, DC: DoD.
DoD-01. (2018). JP 1-02. Retrieved from Department of Defense Dictionary of Military and Associated Terms: www.dtic.mil/doctrine/new_pubs/jp1_02.pdf
DoD-02. (2018). Information Operations (IO) in the United States. Retrieved from JP 3-13 : http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf
DoD-03. (2015). Unmanned Systems Roadmap 2013 to 2038. Retrieved from DTIC: http://www.dtic.mil/dtic/tr/fulltext/u2/a592015.pdf
Drones, Q. S. (2017, July 11). quadcopters-have-hit-the-sound-barrier/. Retrieved from quadstardrones.com: https://quadstardrones.com/2017/07/11/quadcopters-have-hit-the-sound-barrier/
DTRA. (2019, October 18). Private Communication re Aviation Vulnerabilities. (Nichols, Interviewer) Retrieved from https://www.dtra.mil/
Durham, W. (2013). Aircraft Flight Dynamics and Control. The Atrium, Chesterton, UK: Wiley.
EARSC. (2015). A Taxonomy for the EO Services Market: enhancing perception and performance of the EO service industry. EARSC Issue 2.
EIA. (2019, June 20). The Strait of Hormuz is the world’s most important oil transit chokepoint. Retrieved from EIA – US Energy Information Administration: https://www.eia.gov/todayinenergy/detail.php?id=39932
Entokey, a. G. (2019, May 16). entokey.com/acoustics-and-sound-measurement/. Retrieved from entokey.com/acoustics-and-sound-measurement/: https://entokey.com/acoustics-and-sound-measurement/
ESA-ESTEC Contract 162372/02/NL/US. (September 2005). STRATOS: Stratospheric Platforms a definition study for ESA Platform, Final Report, 1-34. ESA-ESTEC .
Eshel, T. (2019, September 14). AFRL to Test a Drone-Swarm Killer HPM. Retrieved from Defense Update: https://defense-update.com/20190923_hpm.html
European Union. (2019, May 2019). About the regulation and data protection. Retrieved from ec.europa.eu: https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en
FAA. (2018, February 1). Part 107 Rule for sUAS. Retrieved from Fly under the Special Rule for Model Aircraft: https://www.faa.gov/uas/getting_started/model_aircraft/
Federal Question, 28 U.S. Code § 1331 (United States Congress June 25, 1948).
FEMA. (2013). Lessons Learned from the Boston Marathon Bombings: Preparing for and Responding to the Attack. Retrieved from www.fema.gov: http://www.fema.gov/media-library-data/20130726-1923-25045-1176/lessons_learned_from_t
Filbert, F. &. (2014, (July – August). Joint Counter Low, Slow, Small Unmanned Aircraft Systems Test. Fires PB644-14, no 4. Washington: DoD.
Filippo Santoni de, S. &. (2018). Meaningful Human Control over Autonomous Systems: A Philosophical Account. Frontiers in Robotics and AI. doi:10.3389/frobt.2018.00015
Fitts, R. (1980). The Strategy of Electromagnetic Conflict. Los Altos, CA: Peninsula Publishing.
Fleetwood, J. (2017). Public Health, Ethics, and Autonomous Vehicles. American Journal of Public Health, 107(4), 632-537.
Fortuna, C. (2017, 12 02). Autonomous Driving Levels 0–5 + Implications. Retrieved from cleantechnica.com: https://cleantechnica.com/2017/12/02/autonomous-driving-levels-0-5-implications/
- Sulzberger, J. B. (2009). Hunting Sea Mines with UUV-Based Magnetic and Electro-Optic Sensors. Retrieved from algebra.sci.csueastbay.edu/: http://algebra.sci.csueastbay.edu/~grewe/pubs/DistSensorNetworkBook2011/Atmosphere/UnderWaterSeaMineHunt.pdf
Gallagher, S. (2019, September 16). Missiles and drones that hit Saudi oil fields: Made in Iran, but fired by whom? Retrieved from Arstechnica.com: https://arstechnica.com/tech-policy/2019/09/missiles-and-drones-that-hit-saudi-oil-fields-made-in-iran-but-fired-by-whom/
Gelfand. (2004). “Physical Concepts”, Hearing an Introduction to Psychological and Physiological Acoustics, 4th ed. New York City.
Gelfand, S. A. (2009). Essentials of Audiology, 3rd Edition. Stuttgart, DE: Thieme.
Giordano, N. (2009). College Physics: Reasoning and Relationships. New York City, NY: Cengage Learning. pp. 421–424.
Guardbaum, S. (1994). The Nature of Preemption. Cornell Law Review, 767, 771.
Harris Aerial. (2019, June 5). Carrier HX8 Sprayer Drone. Retrieved from harrisaerial.com: https://www.harrisaerial.com/carrier-hx8-sprayer/
Hartman, K. a. (2013). The Vulnerability of UAVs to Cyber Attacks – An Approach to the Risk Assessment. 2013 5th International Conference on Cyber Conflict . Tallin: NATO CCD COE Publications.
Heinman, C. (2019). Hearing Loss Tests Patient D v-105. Carlisle, PA: Brown Optical Hearing Aid Service.
Henderson, T. (2017). The Doppler Effect – Lesson 3, Waves. Physics tutorial. The Physics Classroom. Retrieved from Henderson, Tom (2017). “The Doppler Effect – Lesson 3, Waves”. Physics tutorial. The Physics Classroom. Retrieved September 4, 2017.: Henderson, Tom (2017). “The Doppler Effect – Lesson 3, Waves”. Physics tutorial. The Physics Classroom. Retrieved September 4, 2017.
Hern, A. (2017, 1 12). Give robots ‘personhood’ status, EU committee argues. Retrieved from The Guardian: www.theguardian.com/technology/2017/jan/12/give-robots-personhood-status-eu-committee-argues
Horowitz, E. (1978). Fundamentals of Computer Algorithms. Potomac, MD: Computer Science Press.
Howard, C. (2019, June 21). What is the Strait of Hormuz, where Iran shot down US Navy drone? Retrieved from Fox News: https://www.foxnews.com/world/whats-the-strait-of-hormuz-iran-shot-us-navy-drone
Hubbard, R. K. (1998). Boater’s Bowditch. Camden, MA: International Marine.
Ibrahim, A. (2019). Optimization Methods for User Admissions and Radio Resource Allocation for Multicasting over High Altitude Platforms . Memorial University of Newfoundland , Canada: River Publications.
IEEE . (2017). The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems Announces New Standards Projects. Telecom Standards, 27(11), pp. 4-5. .
Jesus Gonzalo, D. L. (2018, March 15). On the Capabilities and Limitations of High Altitude Pseudo-Satellites. Progress In Aerospace Sciences, 37-56. doi:https://doi.org/10.1016/j.paerosci.2018.03.006
Johnson, O. &. (2012). Ethics: Selections from Classic and Contemporary Writers. Boston, MA: Cengage Learning.
Jones, T. (2017). International Commercial Drone Regulation and Drone Delivery Services. Santa Monica: The Rand Corporation.
Kania, E. (2017, July 6). Swarms at War: Chinese Advances in Swarm Intelligence. China Brief Volume: 17 Issue 9. China Brief Volume: 17 Issue 9.
Kanowitz, S. (2019, 05 15). Toward the deployment of ethical AI. Retrieved from Government Computer News. : Kanowitz, S. (2019). Toward the dephttps://gcn.com/articles/2019/05/15/ethical-ai-idc.aspx?s=gcntech_200519
Kaye, T. a. (2001, September 30). ACHIEVING INFORMATION DOMINANCE:. Retrieved from DODCCRP-Space and Naval Warfare Systems Center San Diego: http://www.dodccrp.org/events/2002_CCRTS/Tracks/pdf/026.PDF
Kim, A. G. (2012, June). Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles. Retrieved from Infotech@Aerospace.com: https://www.researchgate.net/publication/268571174_Cyber_Attack_Vulnerabilities_Analysis_for_Unmanned_Aerial_Vehicles
Kirk, J. (2015, August 5). sounds-can-knock-drones-sky. Retrieved from www.computerworld.com.au/article/581231: https://www.computerworld.com.au/article/581231/sounds-can-knock-drones-sky/
Knight, W. (2018). Nine charts that really bring home just how fast AI is growing. MIT Technology Review .
Kovacs, T. (1998). Micromachined Transducers Sourcebook. NYC: McGraw-Hill.
Leasko, R. (2014). Munitions Detection Using Unmanned Underwater Vehicles Equipped with Advanced Sensors. Scotts Valley, CA: CreateSpace Independent Publishing Platform (Amazon Media on Demand).
Legal Information Institute – Cornell University. (2019, May 31). Strict Liability . Retrieved from Legal Information Institute: https://www.law.cornell.edu/wex/strict_liability
Lipschutz, M. (1969). Schaums Outline for Differential Geometry. NYC: McGraw-Hill .
Lister, T. (2019, September 16). Attack is a game-changer in Gulf confrontation. Retrieved from CNN: https://www.cnn.com/middleeast/live-news/saudi-oil-attack-dle-intl/h_3e647100fa720927c962d7643472b12d
LRAD. (2019, May 189). LRAD 450XL Datasheet. Retrieved from LRADX: http://www.lradx.com/wp-context/uploads/2015/05/LRAD_datasheet_450XL.pdf
MacGregor, D. S. (2018). Colorado Causes of Action: Elements, Defenses, Remedies, and Forms. Denver: Bradford Publishing Co. .
Macnamara, T. M. (2010). Introduction to Antenna Placement & Installation. New York City, NY : John Wiley & Sons.
Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-1274) — the “Angelic Doctor” Lecture. Retrieved from Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-1274) — the Philosophy of Law. : Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-http://home.wlu.edu/~mahonj/PhilLawLecture1NatLaw.htm
Marbury v. Madison, 5 U.S. 137 (United States Supreme Court February 23, 1803).
Marshall, D. M. (2016). Introduction to Unmanned Aircraft Systems, 2nd Edition. New York: CRC Press.
Matolak, R. S. (April 2015). Initial Results for Airframe Shadowing in L-band and C-band Air -Ground Channels. Proc. Integrated Commun,, Navigation, and Surveillance Conf, (pp. pp. 1-8).
McCullogh v. Maryland, 17 U.S. 316 (United States Supreme Court March 6, 1819).
Merriam-Webster. (2019, May 17). Merriam-Webster Online Dictionary.
Merriam-Webster. (2020, August 5). Definition of human (Entry 2 of 2). Retrieved from Merriam-Webster.com: https://www.merriam-webster.com/dictionary/human#h2
Merriam-Webster. (2020, August 11). humanity noun. Retrieved from Merriam-Webster.com: https://www.merriam-webster.com/dictionary/humanity
Merriam-Webster, Inc. (2019). Definition of Ethics. online: Merriam-Webster, Inc. Retrieved from Definition of Ethics. (2019a). Online: Merriam-Webster, Incorporated.: Definition of Ethics. (2019a). Online: Merriam-Webster, Incorporated.
Middleton, C. (2018). SAP launches ethical A.I. guidelines, expert advisory panel. Retrieved from internetofbusiness.com: Middleton, C. (2018). SAP launches ethical A.I. guidelines, expert advisory panel. Retrieved from https://internetofbusiness.com/sap-publishes-ethical-guidelines-for-a-i-forms-expert-advisory-panel/
Misselhorn, C. (2018). Artificial Morality. Concepts, Issues and Challenges. Society, 55(2), 161-169.
Mohorcic, D. G. (2010). Broadband Communications via High Altitude Platforms. New York City, NY: John Wiley & Sons.
Moir, I. a. (2006). Military Avionics Systems. New York: Wiley Aerospace Series.
Monahan, K. (2004). The Radar Book: Effective Navigation and Collision Avoidance. Anacortes, WA: Fineedge Publications.
Muspratt, A. (2018, November 22). New global drone standards proposed. Retrieved from Defense iQ: https://www.defenceiq.com/defence-technology/news/new-global-drone-standards-proposed
Myer, G. (2013, May-June). Danger Close Definition. Retrieved from US Army Magazine: www.benning.army.mil/infantry/magazine/issues/2013/May-June/Myer.html
- Goddemeir, K. D. (June 2015). Role-based Connectivity Management with Realist Air to Ground Channels for Future Applications. IEEE Vehic. Tech. Mag. Vol 10, no 2, pp. 79-85.
N/A. (2020, July 25). Cambridge Dictionary on line. Retrieved from dictionary.cambridge.org/us/: https://dictionary.cambridge.org/us/
NASA. (2018). Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project. Retrieved from NASA: https://www.nasa.gov/feature/autonomous-systems
National Conference of State Legislatures. (2018, September 10). Current Unmanned Aircraft State Law Landscape. Retrieved from NCSL.org: http://www.ncsl.org/research/transportation/current-unmanned-aircraft-state-law-landscape.aspx
Naval Mines. (2020, December 16). Retrieved from en.wikipedia.org: https://en.wikipedia.org/wiki/Naval_mine#cite_note-minewar-83
NBC Today Show. (2018, May 9). How peeping drones could be spying on you without you knowing it. Retrieved from Today.com: https://www.today.com/video/how-peeping-drones-could-be-spying-on-you-without-you-knowing-it-1229001795967
Newman, L. H. (2017, August 7). THE ARMY GROUNDS ITS DJI DRONES OVER SECURITY CONCERNS. Retrieved from WIRED: https://www.wired.com/story/army-dji-drone-ban/
Nichols, R. K. (1996). Classical Cryptography Course Volume I / II. Laguna Hills, CA: Aegean Park Press.
Nichols, R. K. (1996). Classical Cryptography Course, Volume I. Laguna Hills, CA: Aegean Park Press.
Nichols, R. K. (2008, September 05). Counterintelligence & Sensitive Compartmented Information Facility . (SCIF) Needs – Talking Points.
Nichols, R. K. (2018). Unmanned Aircraft Systems (UAS) In the Cyber Domain: Protecting USA’s Advanced Air Assets. 1st Ed. Manhattan, KS: New Prairie Press.
Nichols, R. K. (2019, March 14). Hardening US Unmanned Systems Against Enemy Counter Measures. 7th Annual Unmanned Systems Summit. Alexandria, VA, USA: PPTX presentation , self.
Nichols, R. K. (2019, October 15). Randall Nichols (October 15, 2019) Implications from Attack by Iran on Saudi Arabian Oil Fields (implications-from-attack-iran-saudi-Arabian-oil-fields-Nichols. Retrieved from www.linkedin.com/pulse/: https://www.linkedin.com/pulse/implications-from-attack-iran-saudi-arabian-oil-fields-nichols/
Nichols, R. K. (2019). Unmanned Aircraft Systems In the Cyber Domain: Protecting USA’s Advanced Air Assets. 2nd Ed. Manhattan, KS: New Prairie Press. Manhattan, KS: New Prairie Press.
Nichols, R. K., & et.al. (2020). Unmanned Vehicle Systems & Operations on Air, Sea, Land. Manhattan, KS: NPP #35.
Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., & and Carter, C. (2018). Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets. Manhattan, KS: New Prairie Press (NPP) eBooks. 21.
Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., Carter, C. M., & & Hood, J. P. (2020). Counter Unmanned Aircraft Systems Technologies & Operations. Manhattan, KS: New Prairie Press #31.
Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., Carter, C., & and Hood, J.-P. (2019). Unmanned Aircraft Systems in the Cyber Domain. Manhattan, KS: NPP eBooks. 27.
Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., Carter, C., & and Hood, J.-P. (2019). Unmanned Aircraft Systems in the Cyber Domain, 2nd Edition. Manhattan, KS: NPP eBooks. 27. Retrieved from www.newprairiepress.org/ebooks/27
Nichols, R. (Nov 28-30, 2006). Cyber Terrorism, Critical Infrastructure, & SCADA Presentation. In R. Nichols (Ed.), Defense Threat Reduction Agency Conference. Shirlington VA: Utica College, Utica NY.
Nichols, R., Ryan, J., Mumm, H., Carter, C., Lonstein, W., & Hood, &. J. (2020). Counter Unmanned Aircraft Systems Technologies and Operations. Manhattan, KS: New Prairie Press #31.
Nichols, R., Ryan, J., Mumm, H., Lonstein, W., Carter, C., & & Hood, J. (2019). Unmanned Aircraft Systems (UAS) in Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd Edition. Manhattan, KS: New Prairie Press #27 .
Nichols, R.-0. (2016, March 29). NCIE UAS SAA Final Rev 4. 2016 INFOWARCON conference presentation April 4-7, Nichols, R.K. et. al. (3-29-2016) Presentation to INFOWARCON April 4-7 on NCIE UAS SAA Final Rev 4, presented to 2016 INFOWARCON conference, Memphis TN. Available as PPTx presentation download from author or in CANVAS. Memphis, TN, USA: INFOWARCON16.
Nielsen, P. E. (2012). Effects of Directed Energy Weapons. Middletown, DE: CreateSpace Independent Publishing Platform.
NIST. (September 2012). Guide for Conducting. Washington, DC: GPO.
North Carolina Department of Transportation. (2019, May 30). Law & Regulations. Retrieved from NCDOT.GOV: https://www.ncdot.gov/divisions/aviation/uas/Pages/laws-regulations.aspx
NSWC. (2020, December 15). Warfare Centers NSWC Panama City. Retrieved from www.navsea.navy.mil: https://www.navsea.navy.mil/Home/Warfare-Centers/NSWC-Panama-City/What-We-Do/
Ocean Studies Board, N. R. (2012). Oceanography and Mine Warfare. Washington, DC: Ocean Studies Board, National Research Council ISBN 0-309-51587-4.
Osborn, K. (2019, October 15). Swarm Hell: Can the U.S. Army Stop Hundreds of Drones Armed with Explosives? Retrieved from National Interest: https://nationalinterest.org/blog/buzz/swarm-hell-can-us-army-stop-hundreds-drones-armed-explosives-88206
Osseiran, A. (Dec 2014). Scenarios for 5G Mobile and Wireless communications: the vision of the METIS Project. IEEE Communications Magazine, Vol 52, no 5, pp. 26-35.
O’Sullivan, J. L. (1845). The Great Nation of Futurity. United States Magazine and Democratic Review Vol 6 Issue 23, pp. 426-430.
Pierson. (2019, May 16). tuning-fork-waves-sound. Retrieved from airfreshener.club – Pierson Education: https://airfreshener.club/quotes/tuning-fork-waves-sound.html
Porter, J. D. (2019, June 8). jdporterlaw.com/intellectual-property-law/. Retrieved from jdporterlaw.com: http://www.jdporterlaw.com/intellectual-property-law/
Possel, M. (2017). Waves, motion and frequency: the Doppler effect. Einstein Online, Vol. 5. Max Planck Institute for Gravitational Physics, Potsdam, Germany.
Price Waterhouse Coopers, LLP. (2018). Skies without limits – Drones- taking the UK’s economy to new heights. London: Price Waterhouse Coopers, LLP.
PROTECTION OF CERTAIN FACILITIES AND ASSETS FROM UNMANNED AIRCRAFT, H. R. 302 (United States Congress January 3, 2018).
Proyas, A. (Director). (2004). I, Robot. In. Hollywood, CA. [Motion Picture].
Ramzy, A. &. (2008). Tainted-Baby-Milk Scandal in China. Retrieved from content.time.com/time/world/article/: http://content.time.com/time/world/article/0,8599,1841535,00.html
Randall K. Nichols and Lekkas, P. C. (2002). Wireless Security: Threats, Models, Solutions. New York City, NY: McGraw Hill.
Randall K. Nichols, D. (2018). Chapter 20 Acoustic CM & IFF Libraries V SWARMS Rev 1 05142019. In R. K. Nichols, H. C. Mumm, W. D. Lonstein, & J. S. Hood, Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. Manhattan, KS: NPP Press.
Randall K. Nichols, D. (2019 for publication). Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. In H. M. Randall K. Nichols, Chapter 18 Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries (p. 2nd ed.). Manhattan, KS: For Publication, NPP.
Randall K. Nichols, D. J. (2000). Defending Your Digital Assets against Hackers, Crackers, Spies and Thieves. New York: RSA Press.
Randall K. Nichols, J. J. (2018). Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets. Manhattan, KS: New Prairie Press.
Rani, C. M. (2015). Security of unmanned aerial vehicle systems against cyber-physical attacks. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.
Rappaport, T. (2014). Millimeter Wave Wireless Communications. New York City, NY: Prentice Hall.
Reklaitis, G. R. (1983). Engineering Optimization: Methods and Practices. Boston: Wiley.
Reklaitis, G. R. (1983). Engineering Optimization: Methods and Practices. Boston: Wiley.
REMUS -1. (2020, December 15). REMUS 100 Technical Brochure (2017). Retrieved from www.hydroid.com: https://www.hydroid.com/sites/default/files/product_pages/New_Generation_REMUS_100_%20Brochure_2017.pdf
REMUS -2. (2020, December 15). REMUS 600 Technical Data. Retrieved from www.hydroid.com/remus-600-defense-applications: https://www.hydroid.com/remus-600-defense-applications
REMUS. (2020, December 15). REMUS 100 for Defense Applications Data Sheet. Retrieved from https://www.hydroid.com/new-generation-remus-100-defense-applications: https://www.hydroid.com/new-generation-remus-100-defense-applications
REMUS -3. (2020, December 15). REMUS 600 Technical Data Sheet. Retrieved from www.hydroid.com/: https://www.hydroid.com/sites/default/files/product_pages/REMUS_600_Brochure_2017_0.pdf
REMUS -4. (2020, December 15). REMUS 6000 . Retrieved from www.hydroid.com/: https://www.hydroid.com/sites/default/files/product_pages/REMUS_6000_Brochure_2017.pdf
REMUS -5. (2020, December 15). REMUS 6000 Brochure. Retrieved from www.hydroid.com/: https://www.hydroid.com/sites/default/files/product_pages/REMUS_6000_Brochure_2017.pdf
Ricker, D. (2017, July 1). Navigating drone laws has become a growing and lucrative legal niche. Retrieved from ABA Journal: http://www.abajournal.com/magazine/article/drone_law_attorneys
Roland, A. (1977). Bushnell’s Submarine: American Original or European Import? Technology and Culture: The Johns Hopkins University Press, Vol. 18, No. 2 (Apr., 1977), pp. 157-174 (18 pages).
Said Emre Alper, Y. T. (December 2008). A Compact Angular Rate Sensor System Using a Fully Decoupled Silicon-on-Glass MEMS Gyroscope. JOURNAL OF MICROELECTROMECHANICAL SYSTEMS, VOL. 17, NO. 6.
Sanchez, M. (2019, June 4). No Drones. Retrieved from Unspalsh.com: https://unsplash.com/photos/oMqswmrie4Y
Schroeder, A. (2018, February 1). Localizing Humanitarian Drones: Robotics & Disaster Response from the Maldives to Malawi. Retrieved from medium.com: https://medium.com/radiant-earth-insights/localizing-humanitarian-drones-robotics-disaster-response-from-the-maldives-to-malawi-a1f362432cb1
SERDP-ESTCP. (2012). Munitions-Response/Munitions-Underwater/MR-201103-IR. https://www.serdp-estcp.org/Program-Areas/Munitions-Response/Munitions-Underwater/MR-201103: NSWC PCD.
Sheena McKenzie, M. W. (2019, September 17). Saudi attacks send oil prices soaring. Retrieved from CNN: https://www.cnn.com/middleeast/live-news/saudi-oil-attack-dle-intl/h_1ab7e8469e98525f887c3a4e588dde8a
Signia. (2019, May 16). Signia Hearing Aids. Retrieved from Signia Hearing Aids – Hear across America: www.signiausa.com
Singer v. City of Newton, 284 F. Supp. 3d 125 (U.S. District Court Massachusetts September 21, 2017).
Singer, P. W. (2010, February 25). Will Foreign Drones One Day attack the US? . Newsweek.
Skolnik, M. (2008). Radar Handbook, 3rd Edition. Boston: McGraw Hill.
slideshare.net. (2019, May 16). Proud Paras/sound-waves-loudness-and-intensity, slide 12. Retrieved from slideshare.net: https://www.slideshare.net/ProudParas/sound-waves-loudness-and-intensity
Sood A.K. & Enbody, R. (2014, December 19). https://www.georgetownjournalofinternau-s-military-defense-systems-the-anatomy-of-cyber-espionage-by-chinese-hackers. Retrieved from georgetownjournalofinternationalaffairs.org/online-edition: https://www.georgetownjournalofinternationalaffairs.org/online-edition/u-s-military-defense-systems-the-anatomy-of-cyber-espionage-by-chinese-hackers
Sovereignty and use of airspace, 49 U.S. Code § 40103 (United States Congress July 5, 1994).
Staff. (2008). FINAL ACTS WRC-07. World Radiocommunication Conference. Geneva: ITU.
Staff. (2012). FINAL ACTS WRC-12. World Radiocommunication Conference. Geneva: ITU.
Staff. (2016, April 17). Equal Loudness Contours. Retrieved from Gutenberg Organization: http://central.gutenberg.org/article/WHEBN0001046687/Equal-loudness%20contour
Staff. (2019). FINAL ACTS WRC-15. World Radiocommunication Conference. Geneva.
Staff. (2019, May 6). wikipedia.org/wiki/Doppler_effect. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Doppler_effect
Staff, W. (2019, May 04). 5G. Retrieved from Wikipedia: www.wikipedia.org
Steponova, E. (2016). 2008 Terrorism in Asymmetrical Conflict. SIPRI Report 23.
Stone, Z. (2007, 11 7). Stone, Z. (2017). Everything You Need To Know About Sophia, The World’s First Robot Citizen. Retrieved from https://www.forbes.everything-you-need-to-know-about-sophia-the-worlds-first-robot-citizen. Retrieved from Forbes: https://www.forbes.com/sites/zarastone/2017/11/07/everything-you-need-to-know-about-sophia-the-worlds-first-robot-citizen/#1667784246fa
Stratfor. (2019, October 20). strait-of-Hurmuz-chokepoints. Retrieved from https://www.stratfor.com: https://www.stratfor.com/sites/default/files/styles/wv_small/public/strait-of-hormuz-chokepoints.jpg?itok=xSgx6Hhi
Studios, D. D. (2017). Boaters Ref. USA.
sUAS News. (2018, March 2). RAS Consulting & Investigations hire Jeff Parisse to offer sophisticated UAS security and surveillance services. Retrieved from suasnews.com: https://www.suasnews.com/2018/03/ras-consulting-investigations-hire-jeff-parisse-offer-sophisticated-uas-security-surveillance-services/
Sun, W. M. (June 2015). Unmanned Aircraft Systems: Air-Ground Channel Characterization for future applications. IEEE Vehic. Tech Mag. Vol 10, No 2 , pp. 79-85.
T.C. Dozer, D. A. (2008). High Altitude Platforms for VHDR in-theater communications. IET Seminar on Military Satellite Communications Systems.
Teledynemarine. (2020, December 16). Q-Boat_1250. Retrieved from www.teledynemarine.com: http://www.teledynemarine.com/Q-Boat_1250?BrandID=13
Teledynemarine-1. (2020, December 16). Z-Boat1800T_Trimble. Retrieved from www.teledynemarine.com: http://www.teledynemarine.com/Z-Boat1800T_Trimble?BrandID=13
Tewari, A. (2011). Advanced Control of Aircraft, Spacecraft and Rockets. Chichester, UK: Wiley.
Thatcher, M. K. (2020, August 9). Integrated Joint All-Domain Operations Full Spectrum Operations. Retrieved from www.lockheedmartin.com: https://www.lockheedmartin.com/content/dam/lockheed-martin/aero/documents/mdo/Integrated_JADO_Solution_Whitepaper.pdf
The Shepard News Team. (2018, September 12). Liteye Receives Follow-on Contract for C-AUDS – DB – Digital Battlespace. Retrieved from Aerospace, Defense and Security News and Analysis – Shephard Media, The Shepard Press, Ltd: www.shephardmedia.com/news/digidigital-battlespace/liteye-receives-follow-contract-c-auds
Thomas, R. (2010). Relearning Counterinsurgency Warfare. Parameters, PDF.
Toomay, J. (1982). RADAR for the Non – Specialist. London; Lifetime Learning Publications. London: Lifetime Learning Publications.
TRS, S. (2018, July 10). Tontechnic-Rechner-Sengpielaudio. Retrieved from Tontechnic-Rechner-Sengpielaudio Calculator: www.sengspielaudio.com/calculator-wavelength.htm
Tsourdos, A. &. (2011). Cooperative Path Planning of Unmanned Aerial Vehicles . Reston, VA: American Institute of Aeronotics and Astronautics, Vol #235.
UAV Coach. (2019, May 30). Drone Laws in South Carolina (2019). Retrieved from UAVcoach.com: https://uavcoach.com/drone-laws-south-carolina/
United States Constitution Article VI, Sec.2 (United States of America September 17, 1787).
Uni-Wuppertal. (2019, May 15). Inverse Square Law, General. Retrieved from hydrogen.physik.uni-Wuppertal.de/hyperphysics/: http://hydrogen.physik.uni-Wuppertal.de/hyperphysics/hyperphysics/hbase/forces/isq.html
Urban, T. (2018). Teach Your Robots Well: Will Self-Taught Robots Be the End of Us? Retrieved from www.worldsciencefestival.com: Urban, T. (2018). Teach Your Robots Well: Will Self-Taught Robots Be the End of Us? Retrieved from https://www.worldsciencefestival.com/programs/teach-robots-well-will-self-taught-robots-end-us/
Usenix.org. (2019, 6 9). MEMS, Drones, & Sound Sourcing. Retrieved from Usenix.org: www.usenix.org
WebFinance, Inc. (2019). Definition of Ethics. (2019b). online: Online: WebFinance, Inc.
Weise, E. (2017, August 23). could-hackers-behind-u-s-navy-collisions. Retrieved from USATODAY: https://www.ruidosonews.com/story/tech/news/2017/08/23/could-hackers-behind-u-s-navy-collisions/594107001/
Wiki-E. (2018, August 26). Equal Loudness Contours. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Equal-loudness_contour
Wiki-L. (2018, August 27). Laser. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Laser
Wikipedia. (2018, August 26). Human Hearing Range. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Hearing_range
Wikipedia. (2019, May 6). wikipedia.org/wiki/Doppler_effect. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Doppler_effect
Wikipedia. (2020, July 26). A* Algorithm. Retrieved from Wikipedia: https://en.wikipedia.org/wiki/A*_search_algorithm
Wiley, R. G. (1993). Electronic Intelligence: The Analysis of Radar Signals, 2nd ed. Norwood, MA: Artech House.
Wilson, M. (2012). The Use of Low-Cost Mobile Radar Systems for Small UAS Sense and Avoid. Sense and Avoid in UAS Research and Applications.
Wong, C. (2017). Top Canadian researcher says AI robots deserve human rights. Retrieved from Wong, C. (2017). Top Canadian researcher says AI robots deserve human rights. Retrieveitbusiness.ca: Wong, C. (2017). Top Canadian researcher says AI robots deserve human rhttps://www.itbusiness.ca/news/top-canadian-researcher-says-ai-robots-deserve-human-rights/95730
Wordpress. (2012, 08 29). The True Sign of Intelligence. Retrieved from deepthinkings.wordpress.com: http://deepthinkings.wordpress.com/2012/08/29/the-true-sign-of-intelligence/
Wright, T. (2017, August 11). You’ve Been Warned: Keep Your Drones Away From Military Bases. Retrieved from Air & Space, Smithsonian: https://www.airspacemag.com/daily-planet/keep-your-drones-away-military-base-180964451/
Wyvern, T. (2018). National Critical Intelligence Estimate: Counter Unmanned Aircraft Systems (C-UAS) in the US. Salina, KS: KSUP.
Xiaoyang Liu, C. L. (2016). High Altitude Platform Station Network and Channel Modeling Performance Analysis. Mathematics and Computer Science. Vol. 1, No 1, pp. 10-16. doi: Xiaoyang Liu, Chao Liu, Wanping Liu, Xiaoping Zeng. High Altitude Platform Station Network and Channel Modeling Performance Analys10.11648/j.mcs.20160101.13
- Zeng, R. Z. (May 2016.). Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Communications Magazine. Vol. 54, no.5, pp. 36-42.
Yong Zeng, R. Z. (2016). Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges. IEEE Communications Magazine, 36-42.
Yu, X. &. (2015). Sense and avoid technologies with applications to unmanned aircraft systems: Review and prospects. Progress in Aerospace Sciences, 74, 152-166.
Yunmonk Son, H. S. (2015, August 12-14). Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. Proc. 24th Usenix Security Symposium. Washington, DC: USENIX. Retrieved from https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/son
Zetter, K. (2015). So, The NSA Has An Actual SKYNET Program . WIRED Magazine(Online). . Retrieved from Zetter, K. (2015). So, The NSA Has An Actual SKYNET Program WIRED Magazine(Online).
Zhang, Z. W. (2020). Rapid Penetration Path Planning Method for Stealth UAV in Complex Environment with POP-UP Threats. International Journal of Aerospace Engineering, TBA.