Author(s): Dr. Barros Anna Isabel;  

    |     

This special edition features a selection of the best publicly releasable full papers from the conference, which were peer-reviewed by leading international military OR&A experts. Other full papers, as well as all short papers that were presented at the conference, are published in NATO’s STO peer-reviewed conference proceedings.

Author(s): Francisco Gallardo LópezAntonio Pérez YusteDavid Sánchez Heredero;   

    |     

GNSS (Global Navigation Satellite Systems) jamming and spoofing pose a severe threat across key sectors, as GNSS is widely used across many applications, including critical infrastructure. Due to the current geopolitical tensions, the navigation and timing service provided by GNSS (e.g., Galileo, GPS, Glonass, etc.) have been targeted.

Author(s): Evelyn WellingAntonio Aguirre  

    |     

Collaborative munitions development among US, NATO, and defence treaty allies is essential to ensure that allied militaries maintain a technological advantage and are equipped with interoperable weapons to fight alongside allies in multilateral conflict. Munitions effectiveness data and model exchange is key to this end. Effectiveness data can feed downstream analyses and inform critical decision making [1] to accelerate the research and development of future munitions and reduce the time and resource cost involved in the performance evaluation of existing munitions [2]. As alliance members may develop related technologies at different paces, collaborative Modelling and Simulation (M&S) tools can narrow associated gaps by reducing duplication of effort and the cost of munitions research and development.

Author(s): Maxwell Dondo;   

    |     

Joint functions, which for the Canadian Armed Forces (CAF) are command, sense, act, shield, and sustain [1], provide a critical operational framework of related activities and capabilities at all levels that allow commanders to plan, execute, synchronise, and oversee activities in joint operations [1], [2], [3]. These functions, which can be further broken down into subordinate tasks and related capabilities [2], [4], [5], are increasingly conducted in and through cyberspace. This shift makes them vulnerable to disruptive cyber breaches from sophisticated adversaries whose Tactics, Techniques, and Procedures (TTPs) are continuously evolving and increasing in frequency.