Show simple item record

dc.contributor.authorLavers, CRen
dc.contributor.authorMoustakis, Fen
dc.date.accessioned2020-10-23T10:21:36Z
dc.date.available2020-10-23T10:21:36Z
dc.date.issued2020-01-01en
dc.identifier.isbn9781510638914en
dc.identifier.issn0277-786Xen
dc.identifier.urihttp://hdl.handle.net/10026.1/16588
dc.description.abstract

Today we are reliant on a growing range of space-based assets. To assess inherent space-related risks it is critical to evaluate existing and planned systems. Here we summarise 2019-2020 findings from a wide range of participants. Our analysis includes: the importance of: persistency, all-weather, night and day capabilities, satellite image resolution, and other technical requirements. Hybrid threats, cyber warfare, GPS 'spoofing', jamming, and EMP are part of a new generation of threats becoming relevant with rapid space domain exploitation, in addition to space weather impact [1].

en
dc.language.isoenen
dc.titleSpace-based assets, applications, user importance and maritime vulnerabilitiesen
dc.typeConference Contribution
plymouth.volume11539en
plymouth.publication-statusPublisheden
plymouth.journalProceedings of SPIE - The International Society for Optical Engineeringen
dc.identifier.doi10.1117/12.2584920en
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Users by role
dc.identifier.eissn1996-756Xen
dc.rights.embargoperiodNot knownen
rioxxterms.versionofrecord10.1117/12.2584920en
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserveden
rioxxterms.typeConference Paper/Proceeding/Abstracten


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV