scispace - formally typeset
Search or ask a question

Showing papers on "Vulnerability (computing) published in 1961"


Journal ArticleDOI
TL;DR: The procedure for evaluating the jamming vulnerability of a communication system is presented and the factors considered include system performance under laboratory conditions, characteristics of transmission channels, power and transmitter design of jammer, and the costs of desired communication and jamming systems.
Abstract: This paper presents the procedure for evaluating the jamming vulnerability of a communication system. The factors considered include system performance under laboratory conditions, characteristics of transmission channels, power and transmitter design of jammer, and the costs of desired communication and jamming systems.

2 citations