The electromagnetic bomb-a weapon of electrical mass destruction C Kopp MONASH UNIV CLAYTON (AUSTRALIA), 1996 | 81 | 1996 |
Information-theoretic models of deception: Modelling cooperation and diffusion in populations exposed to" fake news" C Kopp, KB Korb, BI Mills PloS one 13 (11), e0207383, 2018 | 67 | 2018 |
Shannon, hypergames and information warfare C Kopp Journal of Information Warfare 2 (2), 108-118, 2003 | 47 | 2003 |
The E-Bomb–a Weapon of Electrical Mass Destruction C Kopp Proceedings of the InfoWarCon V Conference, 1996 | 42 | 1996 |
Ad Hoc Networking C Kopp Systems Journal, 33-40, 1999 | 41 | 1999 |
High energy laser directed energy weapons C Kopp Air Power Australia, 2008 | 39 | 2008 |
Technology of improvised explosive devices C Kopp Defence Today 4649, 46-49, 2008 | 39 | 2008 |
Exoskeletons for warriors of the future C Kopp Defence Today 9 (2), 38-40, 2011 | 34 | 2011 |
Classical Deception Techniques and Perception Management vs. the Four Strategies of Information Warfare C Kopp Proceedings of the 6th Australian Information Warfare & Security Conference …, 2005 | 32 | 2005 |
Managing Cluster Computers. C Kopp Dr. Dobb's Journal: Software Tools for the Professional Programmer 25 (7), 21-26, 2000 | 29 | 2000 |
Password-capabilities and the walnut kernel MD Castro, RD Pose, C Kopp The Computer Journal 51 (5), 595-607, 2008 | 28 | 2008 |
Moore’s law and its implications for information warfare C Kopp Proceedings of the International AOC Electronic Warfare Conference …, 2000 | 28 | 2000 |
Information Warfare: A fundamental paradigm of infowar C Kopp Systems: Enterprise Computing Monthly, 46-55, 2000 | 27 | 2000 |
Information Warfare and Evolution C Kopp, B Mills Proceedings of the 3rd Australian Information Warfare & Security Conference …, 2002 | 26 | 2002 |
Bypassing the home computing bottleneck: The suburban area network C Kopp, R Pose Computer Architecture 98, 87-100, 1998 | 26 | 1998 |
An introduction to the technical and operational aspects of the electromagnetic bomb C Kopp Air Power Studies Centre, 1996 | 26 | 1996 |
A doctrine for the use of electromagnetic pulse bombs C Kopp | 25 | 1993 |
A Link Layer Security Protocol for Suburban Ad-Hoc Networks MM Islam, R Pose, C Kopp proceedings of Australian Telecommunication Networks and Applications Conference, 2004 | 20 | 2004 |
The Orientation step of the OODA loop and Information Warfare L Brumley, C Kopp, K Korb Information Warfare and Security Conference, 20, 2006 | 19 | 2006 |
Range-limited UAV trajectory using terrain masking under radar detection risk M Pelosi, C Kopp, M Brown Applied Artificial Intelligence 26 (8), 743-759, 2012 | 18 | 2012 |