Threat Modeling

Threat Modeling

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Introduction to Electronic Warfare Modeling and Simulation — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Threat modeling is an exercise in determining, capturing, and reproducing the perception of a threat transmitter by a sensor. The point of view from which the threat must be considered is that of the sensors in EW systems. Modeling issues inside the EW system are dealt with in later chapters. In this chapter, we look at the modeling of threat signals on their way to the EW receiver.

Chapter Contents:

  • 6.1 Modes of Operation
  • 6.1.1 Ground-Based Weapons
  • 6.1.2 Track-While-Scan Threats
  • 6.1.3 Antiship Missiles
  • 6.1.4 Air-to-Air Threats
  • 6.2 Modulations
  • 6.2.1 Pulsed Signals
  • 6.2.2 Continuous Signals
  • 6.3 Antenna Characteristics
  • 6.3.1 Communication Threat Antennas
  • 6.3.2 Radar Antennas
  • 6.3.3 Circular Scan
  • 6.3.4 Sector Scan
  • 6.3.5 Helical Scan
  • 6.3.6 Raster Scan
  • 6.3.7 Conical Scan
  • 6.3.8 Spiral Scan
  • 6.3.9 Palmer Scan
  • 6.3.10 Palmer Raster Scan
  • 6.3.11 Lobe Switching
  • 6.3.12 Lobe on Receive Only
  • 6.3.13 Phased Array
  • 6.3.14 Electronic-Elevation Scan with Mechanical-Azimuth Scan
  • 6.4 Signals Leaving Transmitter Site
  • 6.5 Signals Arriving at Receiving Site

Inspec keywords: radio receivers; electronic warfare

Other keywords: EW receiver; sensor; threat signal modeling; threat modeling; threat transmitter; EW systems

Subjects: Electronic warfare; Radio links and equipment

Preview this chapter:
Zoom in

Threat Modeling, Page 1 of 2

| /docserver/preview/fulltext/books/ra/sbra011e/SBRA011E_ch6-1.gif /docserver/preview/fulltext/books/ra/sbra011e/SBRA011E_ch6-2.gif

Related content

This is a required field
Please enter a valid email address