We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 303 results
  1. Critical Infrastructure Protection in the Light of the Armed Conflicts

    This book summarizes the latest findings in critical infrastructure protection and related research areas. Armed conflicts and wars are now closer to...

    Tünde Anna Kovács, Zoltán Nyikes, ... László Tóth in Advanced Sciences and Technologies for Security Applications
    Conference proceedings 2024
  2. Cyber Resilience Fundamentals

    Cyber resilience is a new and emerging discipline that has gained a lot of attention in the recent past. As cyber resilience has many interfaces and...
    Simon Tjoa, Melisa Gafić, Peter Kieseberg in Cyber Resilience Fundamentals
    Chapter 2024
  3. Managing the Cyber Resilience Process

    Building an organization’s cyber resilience is a challenging and complex task that requires appropriate management in order to achieve the goals set....
    Simon Tjoa, Melisa Gafić, Peter Kieseberg in Cyber Resilience Fundamentals
    Chapter 2024
  4. Bionic Hand with Phalanx Built-In Servos

    Losing one or both hands is a devastating experience, as the human hand is used for numerous activities, such as eating, working or conveying...
    Conference paper 2024
  5. An Analysis of What e-Administration Information Security Means in Hungary

    The term “public services” refers to activities involving producing public goods and related services that create economic value, such as healthcare,...
    Marianna Ádám, Vid Sebestyén Honfi, ... Pál Bárkányi in Critical Infrastructure Protection in the Light of the Armed Conflicts
    Conference paper 2024
  6. Cyber Threats to Consumers and Other Risks in the Field of E-commerce Security

    The acceleration of digitalization has been driven by the strong stimulus of the digital revolution announced by the European Union, social and...
    Conference paper 2024
  7. The Possibility of Energy Enterprises Technological Units’ Protection from the Fragmentation Effect of Ammunition

    The analysis of rocket and artillery strikes on the energy complex of Ukraine since February 24, 2022 has been carried out. It is shown that most of...
    Afanasenko Kostiantyn, Lypovyi Volodymyr, ... Hryhorenko Oleksandr in Critical Infrastructure Protection in the Light of the Armed Conflicts
    Conference paper 2024
  8. Neuro-fuzzy Vulnerability Evaluation According to Excellence Criteria

    A method is presented for the evaluation of the effects of the vulnerabilities on corporate assets. An AI assistant performs this evaluation using...
    Conference paper 2024
  9. Terrorist Threats to African Hospitals

    This research is conducted on health facilities, their security staff and their relationship with terrorist attacks. The article is comprised of...
    Conference paper 2024
  10. Analysis of the Turbocompressor Rotor Dynamics Taking into Account Features of Active Magnetic Bearings Using Specialized Computing Systems

    The article includes an analysis of various computational engineering analysis tools in terms of evaluating the dynamics of rotors in active magnetic...
    Conference paper 2024
  11. Analysis and Evaluation of the Transport Sector During the COVID-19 Epidemic: Budapest Versus Amman

    The COVID-19 epidemic is considered a focal point in many ways and to fight the disease many countries adopted preventive instructions and forced...
    Conference paper 2024
  12. Application of Incremental Sheet Forming for Cladding Panels with Customized Design

    Incremental sheet metal forming provides great freedom in unique and versatile sha** of sheet metal at low cost. Products may be industrial parts,...
    Conference paper 2024
  13. Integrated Physical Protection of Emergency Water Production Facilities

    In an emergency water production facility where a hazardous substance is also used, in addition to property protection, it is also vital to comply...
    Conference paper 2024
  14. Threats and Vulnerabilities in Web Applications and How to Avoid Them

    This paper presents the 10 most common web threats and vulnerabilities, determined by OWASP Foundation. Daily, individuals make use of web...
    Conference paper 2024
  15. Enhancing Cybersecurity in Industrial Control Systems Through GRC Framework: Principles, Regulations, and Risk Assessment

    Information security’s primary purpose is to safeguard confidentiality, integrity, and availability. Moreover, as a result of the current global...
    Conference paper 2024
  16. Legal Aspects of Network Security

    In this article, we will examine some of the international- EU- and Hungarian legal frameworks for network security, summarize them and outline...
    Levente Durczy, Kornélia Lazányi, ... András Molnár in Critical Infrastructure Protection in the Light of the Armed Conflicts
    Conference paper 2024
  17. Industrial IoT and 5G in Critical Information Infrastructures

    Industrial IoT can revolutionize how products are manufactured, and industrial processes are managed, enabling real-time data collection and...
    Conference paper 2024
  18. Investigating the Effect of Adding Multiwalled Carbon Nanotubes on the Morphological Properties of Polybutylene Terephthalate

    The effect of reinforcement with multi-walled carbon nanotubes (MWCNTs) on the crystallization behavior at non-isothermal melting of polybutylene...
    Conference paper 2024
  19. Review of the Maintenance Strategies, and Failures in the Aspects of the Reliability

    In this paper, the life cycle of an industrial machine is reviewed. Changes in condition during normal use of the machine or machine component are...
    Csenge Huszák, Péter Pinke, Tünde Anna Kovács in Critical Infrastructure Protection in the Light of the Armed Conflicts
    Conference paper 2024
  20. Examination of UV Radiation During Inert Gas Arc Welding

    During the arc welding process, many parameters must be taken into account to create the right joint. For this reason, the welding parameters are of...
    Márton Schramkó, Péter Pinke, Tünde Anna Kovács in Critical Infrastructure Protection in the Light of the Armed Conflicts
    Conference paper 2024
Did you find what you were looking for? Share feedback.