z-logo
open-access-imgOpen Access
Radar operation in a hostile electromagnetic environment
Author(s) -
Armin Doerry
Publication year - 2014
Language(s) - English
Resource type - Reports
DOI - 10.2172/1204106
Subject(s) - radar , radar jamming and deception , jamming , computer science , radar lock on , spoofing attack , radar engineering details , adversary , man portable radar , radar tracker , fire control radar , computer security , real time computing , remote sensing , telecommunications , pulse doppler radar , radar imaging , geography , physics , thermodynamics
Radar ISR does not always involve cooperative or even friendly targets. An adversary has numerous techniques available to him to counter the effectiveness of a radar ISR sensor. These generally fall under the banner of jamming, spoofing, or otherwise interfering with the EM signals required by the radar sensor. Consequently mitigation techniques are prudent to retain efficacy of the radar sensor. We discuss in general terms a number of mitigation techniques.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom