scispace - formally typeset
Author

Per Eliasson

Bio: Per Eliasson is an academic researcher. The author has contributed to research in topic(s): Military technology & Situation awareness. The author has an hindex of 1, co-authored 6 publication(s) receiving 5 citation(s).

Papers
More filters

[...]

01 Jan 2013
TL;DR: Amnet militarteknik utgar fran att tekniska system ar officerens arbetsredskap och att en forstaelse for och kunskap om dessa verktyg ar central for att kunna utova professionen framgangsrikt as mentioned in this paper.
Abstract: Amnet militarteknik utgar fran att tekniska system ar officerens arbetsredskap och att en forstaelse for och kunskap om dessa verktyg ar central for att kunna utova professionen framgangsrikt. Denn ...

2 citations

[...]

01 Jan 2008

1 citations

[...]

01 Jan 2011
TL;DR: In modern warfare, the dependence on and interaction with technology is internationally undisputed as mentioned in this paper, starting from the currently used definition of the academic subject of Military-Technology in Sweden, which is defined as:
Abstract: In modern warfare the dependence on and interaction with technology is internationally undisputed. Starting from the currently used definition of the academic subject of Military-Technology in Swed ...

1 citations

[...]

01 Jan 2010

Cited by
More filters
Dissertation

[...]

01 Dec 2003

26 citations

Journal ArticleDOI

[...]

TL;DR: In this article, a concept called Military Utility is proposed for the study of the use of technology in military operations, which is derived through conceptual analysis and is based on related concepts used in social sciences, the military domain and Systems Engineering.
Abstract: A concept called Military Utility is proposed for the study of the use of technology in military operations. The proposed concept includes a three-level structure representing key features and their detailed components. On basic level the Military Utility of a technical system, to a military actor, in a specific context, is a compound measure of the military effectiveness, of the assessed technical system's suitability to the military capability system and of the affordability. The concept is derived through conceptual analysis and is based on related concepts used in social sciences, the military domain and Systems Engineering. It is argued that the concept has qualitative explanatory powers and can support military decision-making regarding technology in forecasts, defense planning, development, utilization and the lessons learned process. The suggested concept is expected to contribute to the development of the science of Military-Technology and to be found useful to actors related to defense.

15 citations

Journal ArticleDOI

[...]

TL;DR: In this article, field experiments were used to evaluate three different indirect fire models: the cookie cutter and the Carleton damage functions and a simplified physical model for fragmenting ammunition. Data fr...
Abstract: Field experiments were used to evaluate three different indirect fire models: the cookie cutter and the Carleton damage functions and a simplified physical model for fragmenting ammunition. Data fr...

7 citations

Proceedings ArticleDOI

[...]

06 Oct 2014
TL;DR: A model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data, concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations may also incur non-negligible risks of collateral damage and other societal costs.
Abstract: Flaws in computer software or hardware that are as yet unknown to the public, known as zero-day vulnerabilities, are an increasingly sought-after resource by actors conducting cyber operations. While the objective pursued is commonly defensive, as in protecting own systems and networks, cyber operations may also involve exploiting identified vulnerabilities for intelligence collection or to produce military effects. The weapon zing and stockpiling of such vulnerabilities by various actors, or even the intentional implantation into cyberspace infrastructure, is a trend that currently resembles an arms race. An open question is how to measure the utility that access to these exploitable vulnerabilities provides for military purposes, and how to contrast and compare this to the possible adverse societal consequences that withholding disclosure of them may result in, such as loss of privacy or impeded freedom of the press. This paper presents a case study focusing on the Heart bleed bug, used as a tool in an offensive cyber operation. We introduce a model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data. Our calculations show that reaching a global adoption of at least 50 % would take approximately three years from the time of release, given that the vulnerability remains undiscovered, while surpassing 75 % adoption would take an estimated four years. The paper concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations take time. They may also incur non-negligible risks of collateral damage and other societal costs.

5 citations

[...]

01 Jan 2010