Dependence of Military Bridge Length and Parameters Defining its Manufacturing Costs
Fulltext (.pdf 1,61 MB)
https://doi.org/10.52651/sam.a.2022.1.5-13
Autor: Peter MAKO
In: Science & Military
ISSN: 2453-7632
Ročník: 17
Číslo: 1
Strany: 5 - 13
Rok vydania: 2022
Vydavateľ: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, Liptovský Mikuláš
Abstrakt: Knowledge of dependence between the length of the bridge and parameters which are defining the costs for itsKnowledge of dependence between the length of the bridge and parameters which are defining the costs for itsproduction can be extraordinary valuable for making decisions during planning, procurement or any other inhouse processesof manufacturers of this equipment. This article is expressing graphical and functional dependence between the bridge lengthand the basic parameters which are defining manufacturing costs of the bridges. Presented functions allow to predict parametersdefining manufacturing costs for bridges which are out of the scope of this article also.
Kľúčové slová: Bridge; STANAG 2021; Bridge length; Static analysis; AM-50; Dependence.
Citácia:
MAKO, Peter. Dependence of Military Bridge Length and Parameters Defining its Manufacturing Costs. In: Science & Military [online]. Liptovský Mikuláš: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, 2022, 17 (1), s. 5-13. ISSN: 1336-8885 (print). ISSN: 2453-7632 (online). Dostupné na internete: https://doi.org/10.52651/sam.a.2022.1.5-13
Evasion of Antivirus with the Help of Packers
Fulltext (.pdf 1,65 MB)
https://doi.org/10.52651/sam.a.2022.1.14-22
Autor: Andrej FEDÁK, Jozef ŠTULRAJTER
In: Science & Military
ISSN: 2453-7632
Ročník: 17
Číslo: 1
Strany: 14 - 22
Rok vydania: 2022
Vydavateľ: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, Liptovský Mikuláš
Abstrakt: Nowadays, almost every malware file comes obfuscated and prepacked preferably with an unknown algorithm.Nowadays, almost every malware file comes obfuscated and prepacked preferably with an unknown algorithm.Antivirus programs are taught to deal with these kinds of obstacles with the help of signature databases and heuristic engines.AV systems and their tools are professionally and carefully developed by experts; however, they are not flawless either. Theytend to react to any threats that are identified by already-known malicious patterns and bad behaviours. Therefore, malware hasto evolve and use new methods to pass these defences. In this paper, the internal components of AV programs and well-knownpacking techniques are briefly explained while in addition they are tested against each other. This work provides an initialinsight into the complex subject of antivirus protection.
Kľúčové slová: Antivirus detection; Malware evasion; Scanner; Signature; Heuristic engine; Packer; Obfuscation; Compressor;Antivirus detection; Malware evasion; Scanner; Signature; Heuristic engine; Packer; Obfuscation; Compressor;Crypter; Protector; Portable executable.
Citácia:
FEDÁK, Andrej a Jozef ŠTULRAJTER. Evasion of Antivirus with the Help of Packers. In: Science & Military [online]. Liptovský Mikuláš: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, 2022, 17 (1), s. 14-22. ISSN: 1336-8885 (print). ISSN: 2453-7632 (online). Dostupné na internete: https://doi.org/10.52651/sam.a.2022.1.14-22
The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity
Fulltext (.pdf 0,9 MB)
https://doi.org/10.52651/sam.a.2022.1.29-36
Autor: Sebastián POTOCKÝ, Jozef ŠTULRAJTER
In: Science & Military
ISSN: 2453-7632
Ročník: 17
Číslo: 1
Strany: 29 - 36
Rok vydania: 2022
Vydavateľ: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, Liptovský Mikuláš
Abstrakt: Nowadays, information obtained from mobile phones is often the subject of evidence in front of a court. ForensicNowadays, information obtained from mobile phones is often the subject of evidence in front of a court. Forensicanalysts often come across smartphones about which they have no prior information. However, they need to extract data fromthem. The main prerequisite to extract the data is to bypass Android lock screen protection. The HID attack is a promisingmethod to break Android lock screen protection. In many cases, this is the only way how to break the smartphone´s nonbiometriclock screen protections on newer Android OS versions. The article contains examples of three non-biometric typesof Android smartphone lock screen protections and their computational complexity. The paper describes hardware and softwarerequirements for implementation of HID attack.
Kľúčové slová: Android; HID; Attack; Bypass; Protection; PIN; Pattern; Password.
Citácia:
POTOCKÝ Sebastián a Jozef ŠTULRAJTER. The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity. In: Science & Military [online]. Liptovský Mikuláš: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, 2022, 17 (1), s. 29-36. ISSN: 1336-8885 (print). ISSN: 2453-7632 (online). Dostupné na internete: https://doi.org/10.52651/sam.a.2022.1.29-36
Searching for the Causes of Abnormally Fast Degradation of Engine Oil in a Diesel Combustion Engine
Fulltext (.pdf 1,04 MB)
https://doi.org/10.52651/sam.a.2022.1.23-28
Autor: Pavol LUKÁŠIK, Vladimír KADLUB, Jindřich STEHLÍK
In: Science & Military
ISSN: 2453-7632
Ročník: 17
Číslo: 1
Strany: 23 - 28
Rok vydania: 2022
Vydavateľ: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, Liptovský Mikuláš
Abstrakt: Today, modern tribodiagnostics offers sophisticated analyzes of motor oils with fast and accurate results. However,Today, modern tribodiagnostics offers sophisticated analyzes of motor oils with fast and accurate results. However,finding the causes of some undesirable processes of engine oil degradation often requires long-term monitoring of the operatingfacility. In this case, it was a problem of diesel engine oil in the Citroёn Jumpy 2.0 HDi service minibus, which has been in useby the Department of Mechanical Engineering (Armed Forces Academy of General M. R. Štefanik, Demänová) for more than13 years. The fuel system (conditioners of injectors) on this vehicle has also been monitored for a long time in the period 2019-2021, an article about it was also published in the journal Science & Military (No. 2 / Vol. 14/2019). The cadets of theDeptartment of mechanical engineering Armed Forces Academy of General M. R. Štefanik, were also involved in the diagnosticprocess. In parallel with the fuel system, the quality of the engine oil was regularly monitored in the time interval 20.1.2020 -22.4.2021 at a start of 2185 km from the last oil change. During this monitoring, a very rapid degradation of engine oil wasfound in some parameters, which is atypical during normal vehicle operation. This article discusses the measured results andpossible causes of this adverse event.
Kľúčové slová: Tribology; Tribodiagnostics; Engine oil; Diesel engine; Engine oil parameters; Carbon black content.
Citácia:
LUKÁŠIK Pavol, Vladimír KADLUB a Jindřich STEHLÍK. Searching for the Causes of Abnormally Fast Degradation of Engine Oil in a Diesel Combustion Engine. In: Science & Military [online]. Liptovský Mikuláš: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, 2022, 17 (1), s. 23-28. ISSN: 1336-8885 (print). ISSN: 2453-7632 (online). Dostupné na internete: https://doi.org/10.52651/sam.a.2022.1.23-28
The Impact of Technological Changes on the Development of Military Leaders
Fulltext (.pdf 0,9 MB)
https://doi.org/10.52651/sam.a.2022.1.37-42
Autor: Jan NOHEL, Zdeněk FLASAR, Milan PODHOREC, Bryan PAKULA
In: Science & Military
ISSN: 2453-7632
Ročník: 17
Číslo: 1
Strany: 37 - 42
Rok vydania: 2022
Vydavateľ: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, Liptovský Mikuláš
Abstrakt: The article focuses on possible directions of development of leadership in future military operations. It describes the principles of leading people and the functions of a leader-commander necessary for fulfilling tasks. However, as the rate of automation and robotization in leading military operations increases, the role of a leader-commander changes. Communication and information technologies allow directing military operations in a larger area with a higher degree of independence of the individual elements of the deployed forces as well as the decentralization of command and control. The increasingly more common use of autonomous systems brings a sizable challenge in the shape of commanding robots into the leadership process.
Kľúčové slová: Automation; Autonomy; Robotization; Commander; Leader; Leadership.
Citácia:
NOHEL Jan, Zdeněk FLASAR, Milan PODHOREC a Bryan PAKULA. The Impact of Technological Changes on the Development of Military Leaders. In: Science & Military [online]. Liptovský Mikuláš: Akadémia ozbrojených síl generála Milana Rastislava Štefánika, 2022, 17 (1), s. 37-42. ISSN: 1336-8885 (print). ISSN: 2453-7632 (online). Dostupné na internete: https://doi.org/10.52651/sam.a.2022.1.37-42