Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Critical infrastructure protection =...
~
Kovács, Tünde Anna.
Linked to FindBook
Google Book
Amazon
博客來
Critical infrastructure protection = advanced technologies for crisis prevention and response /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Critical infrastructure protection/ edited by Tünde Anna Kovács, Igor Fürstner.
Reminder of title:
advanced technologies for crisis prevention and response /
other author:
Kovács, Tünde Anna.
Published:
Dordrecht :Springer Netherlands : : 2025.,
Description:
xi, 339 p. :ill., digital ;24 cm.
[NT 15003449]:
1. Nada El Yasmine Aichaoui, Tunde Anna Kovacs: Exploring the Intersection of Human Movement and Collaborative Robotics: Challenges and Opportunities in Computational Modeling -- 2. Mamiyev Azar: Serverless Approaches to Incident Response in Critical Networks -- 3. Tamás Berek: Use of UAVs in aerial radiation surveying in radiological contamination detection -- 4. János Besenyő: Prevention of the terror attack and the social aspects in the European Union -- 5. Felisberto David Wandi Chivela, Zoltán Pap and Edit Laufer: Fuzzy Logic-Based Risk Assessment Evaluating Physiological Values -- 6. Petar Čisar, Sanja Maravić Čisar and Attila Pásztor: Application of Heuristic Scanning in Malware Detection -- 7. Sanja Maravić Čisar, Robert Pinter, Petar Čisar and Livia Szedmina: Reverse Engineering and Cyber Security -- 8. Zlatko Čović: Secure Data Utilization from Web Environment -- 9. Norbert Daruka: Critical infrastructure risks from sabotage -- 10. Igor Fürstner: Analysis of Challenges and Opportunities of Using Photovoltaic Systems in the case of Households in Republic of Serbia by using Publicly Available Data -- 11. László Gogolák: Robot Navigation Based on Wireless Sensor Networks and Its Security Challenges in Industrial Environments -- 12. Szilvia Veress Juhaszné: Food Terrorism as a Real Threat -- 13. Dražan Kozak, Krešimir Crnogorac: Remote strain measurement at vital objects by own developed device -- 14. Milan Majer: Construction and Operation of the Hungarian Technical Border Barrier -- 15. Piroska Stanić Molcer and Ahmed Nour Abdesselam: Side-Channel Analysis for Hardware Trojan Detection: A Deep Learning Approach -- 16. Zoltán Nyikes and Tünde Anna Kovács: Expert application for the explosive cladding process specification -- 17. Zoltán Nyikes and László Tóth: Military and Civilian Uses of Cyber-Physical Systems in Crysis Situations -- 18. Mehmet Alican Polat and Tünde Anna Kovács: Hydrogen in Mobility and Infrastructure -- 19. Brigitta Safar and stelian Tampu: Humanitarian response to the basic psychosocial needs of refugees - Overview of psychosocial support for Voluntary and Forced Refugees -- 20. János Simon: Critical Infrastructure Protection of the Warehouse Logistics 4.0 Based on AVG Systems -- 21. Darjana Sredić and Ljubica Janjetović: Nonverbal communication and the psychology of lying for a security environment -- 22. Jovan Trajkovski: Ballistic response of high-strength steel against small-arm projectiles - numerical modelling -- 23. Darko Trifunovic and Branislav Todorovic: Android Knowledge Application as an Additional Advanced Technology for Use in Critical Infrastructure Protection.
Contained By:
Springer Nature eBook
Subject:
Terrorism - Congresses. - Prevention -
Online resource:
https://doi.org/10.1007/978-94-024-2308-2
ISBN:
9789402423082
Critical infrastructure protection = advanced technologies for crisis prevention and response /
Critical infrastructure protection
advanced technologies for crisis prevention and response /[electronic resource] :edited by Tünde Anna Kovács, Igor Fürstner. - Dordrecht :Springer Netherlands :2025. - xi, 339 p. :ill., digital ;24 cm. - NATO science for peace and security series C: Environmental security,1874-6543. - NATO science for peace and security.Series C,Environmental security..
1. Nada El Yasmine Aichaoui, Tunde Anna Kovacs: Exploring the Intersection of Human Movement and Collaborative Robotics: Challenges and Opportunities in Computational Modeling -- 2. Mamiyev Azar: Serverless Approaches to Incident Response in Critical Networks -- 3. Tamás Berek: Use of UAVs in aerial radiation surveying in radiological contamination detection -- 4. János Besenyő: Prevention of the terror attack and the social aspects in the European Union -- 5. Felisberto David Wandi Chivela, Zoltán Pap and Edit Laufer: Fuzzy Logic-Based Risk Assessment Evaluating Physiological Values -- 6. Petar Čisar, Sanja Maravić Čisar and Attila Pásztor: Application of Heuristic Scanning in Malware Detection -- 7. Sanja Maravić Čisar, Robert Pinter, Petar Čisar and Livia Szedmina: Reverse Engineering and Cyber Security -- 8. Zlatko Čović: Secure Data Utilization from Web Environment -- 9. Norbert Daruka: Critical infrastructure risks from sabotage -- 10. Igor Fürstner: Analysis of Challenges and Opportunities of Using Photovoltaic Systems in the case of Households in Republic of Serbia by using Publicly Available Data -- 11. László Gogolák: Robot Navigation Based on Wireless Sensor Networks and Its Security Challenges in Industrial Environments -- 12. Szilvia Veress Juhaszné: Food Terrorism as a Real Threat -- 13. Dražan Kozak, Krešimir Crnogorac: Remote strain measurement at vital objects by own developed device -- 14. Milan Majer: Construction and Operation of the Hungarian Technical Border Barrier -- 15. Piroska Stanić Molcer and Ahmed Nour Abdesselam: Side-Channel Analysis for Hardware Trojan Detection: A Deep Learning Approach -- 16. Zoltán Nyikes and Tünde Anna Kovács: Expert application for the explosive cladding process specification -- 17. Zoltán Nyikes and László Tóth: Military and Civilian Uses of Cyber-Physical Systems in Crysis Situations -- 18. Mehmet Alican Polat and Tünde Anna Kovács: Hydrogen in Mobility and Infrastructure -- 19. Brigitta Safar and stelian Tampu: Humanitarian response to the basic psychosocial needs of refugees - Overview of psychosocial support for Voluntary and Forced Refugees -- 20. János Simon: Critical Infrastructure Protection of the Warehouse Logistics 4.0 Based on AVG Systems -- 21. Darjana Sredić and Ljubica Janjetović: Nonverbal communication and the psychology of lying for a security environment -- 22. Jovan Trajkovski: Ballistic response of high-strength steel against small-arm projectiles - numerical modelling -- 23. Darko Trifunovic and Branislav Todorovic: Android Knowledge Application as an Additional Advanced Technology for Use in Critical Infrastructure Protection.
This book presents the latest research findings from experts in critical infrastructure protection and management. It explores various aspects of both cyber and physical attack scenarios, focusing on crisis management and response strategies. A significant portion of the work addresses how different critical infrastructure sectors can withstand and recover from attacks, with an emphasis on practical solutions and real-world applications. Several chapters also delve into the human element of crisis management, highlighting the psychological and organizational challenges faced during emergencies. The book demonstrates how human decision-making, behaviour, and coordination play pivotal roles in the effectiveness of response efforts. One of the emerging topics in critical infrastructure protection discussed in the book is using Unmanned Aerial Vehicles (UAVs) in firefighting and other accident-related crisis situations. This innovative technology is shown to enhance emergency response capabilities, offering new ways to monitor, assess, and manage crises from a distance. Additionally, the research includes detailed analyses of ballistic and blast effects, offering insights into how these physical threats can impact infrastructure and how to mitigate their effects. The book combines cutting-edge research with practical insights, providing a comprehensive overview of the current trends and challenges in protecting critical infrastructures from a wide range of threats. This book also addresses the evolving role of humans in modern warfare, particularly in the context of increasing reliance on artificial intelligence. As AI technologies reshape military strategies, they emphasize the need to balance automation with human oversight, ensuring that human security remains central to decision-making processes in complex and high-stakes environments.
ISBN: 9789402423082
Standard No.: 10.1007/978-94-024-2308-2doiSubjects--Topical Terms:
622730
Terrorism
--Prevention--Congresses.
LC Class. No.: HV6431
Dewey Class. No.: 363.32517
Critical infrastructure protection = advanced technologies for crisis prevention and response /
LDR
:05775nmm a2200361 a 4500
001
2409736
003
DE-He213
005
20250513130318.0
006
m d
007
cr nn 008maaau
008
260204s2025 ne s 0 eng d
020
$a
9789402423082
$q
(electronic bk.)
020
$a
9789402423075
$q
(paper)
024
7
$a
10.1007/978-94-024-2308-2
$2
doi
035
$a
978-94-024-2308-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6431
072
7
$a
TJF
$2
bicssc
072
7
$a
GPFC
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
TJF
$2
thema
072
7
$a
GPFC
$2
thema
082
0 4
$a
363.32517
$2
23
090
$a
HV6431
$b
.C934 2025
245
0 0
$a
Critical infrastructure protection
$h
[electronic resource] :
$b
advanced technologies for crisis prevention and response /
$c
edited by Tünde Anna Kovács, Igor Fürstner.
260
$a
Dordrecht :
$b
Springer Netherlands :
$b
Imprint: Springer,
$c
2025.
300
$a
xi, 339 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
NATO science for peace and security series C: Environmental security,
$x
1874-6543
505
0
$a
1. Nada El Yasmine Aichaoui, Tunde Anna Kovacs: Exploring the Intersection of Human Movement and Collaborative Robotics: Challenges and Opportunities in Computational Modeling -- 2. Mamiyev Azar: Serverless Approaches to Incident Response in Critical Networks -- 3. Tamás Berek: Use of UAVs in aerial radiation surveying in radiological contamination detection -- 4. János Besenyő: Prevention of the terror attack and the social aspects in the European Union -- 5. Felisberto David Wandi Chivela, Zoltán Pap and Edit Laufer: Fuzzy Logic-Based Risk Assessment Evaluating Physiological Values -- 6. Petar Čisar, Sanja Maravić Čisar and Attila Pásztor: Application of Heuristic Scanning in Malware Detection -- 7. Sanja Maravić Čisar, Robert Pinter, Petar Čisar and Livia Szedmina: Reverse Engineering and Cyber Security -- 8. Zlatko Čović: Secure Data Utilization from Web Environment -- 9. Norbert Daruka: Critical infrastructure risks from sabotage -- 10. Igor Fürstner: Analysis of Challenges and Opportunities of Using Photovoltaic Systems in the case of Households in Republic of Serbia by using Publicly Available Data -- 11. László Gogolák: Robot Navigation Based on Wireless Sensor Networks and Its Security Challenges in Industrial Environments -- 12. Szilvia Veress Juhaszné: Food Terrorism as a Real Threat -- 13. Dražan Kozak, Krešimir Crnogorac: Remote strain measurement at vital objects by own developed device -- 14. Milan Majer: Construction and Operation of the Hungarian Technical Border Barrier -- 15. Piroska Stanić Molcer and Ahmed Nour Abdesselam: Side-Channel Analysis for Hardware Trojan Detection: A Deep Learning Approach -- 16. Zoltán Nyikes and Tünde Anna Kovács: Expert application for the explosive cladding process specification -- 17. Zoltán Nyikes and László Tóth: Military and Civilian Uses of Cyber-Physical Systems in Crysis Situations -- 18. Mehmet Alican Polat and Tünde Anna Kovács: Hydrogen in Mobility and Infrastructure -- 19. Brigitta Safar and stelian Tampu: Humanitarian response to the basic psychosocial needs of refugees - Overview of psychosocial support for Voluntary and Forced Refugees -- 20. János Simon: Critical Infrastructure Protection of the Warehouse Logistics 4.0 Based on AVG Systems -- 21. Darjana Sredić and Ljubica Janjetović: Nonverbal communication and the psychology of lying for a security environment -- 22. Jovan Trajkovski: Ballistic response of high-strength steel against small-arm projectiles - numerical modelling -- 23. Darko Trifunovic and Branislav Todorovic: Android Knowledge Application as an Additional Advanced Technology for Use in Critical Infrastructure Protection.
520
$a
This book presents the latest research findings from experts in critical infrastructure protection and management. It explores various aspects of both cyber and physical attack scenarios, focusing on crisis management and response strategies. A significant portion of the work addresses how different critical infrastructure sectors can withstand and recover from attacks, with an emphasis on practical solutions and real-world applications. Several chapters also delve into the human element of crisis management, highlighting the psychological and organizational challenges faced during emergencies. The book demonstrates how human decision-making, behaviour, and coordination play pivotal roles in the effectiveness of response efforts. One of the emerging topics in critical infrastructure protection discussed in the book is using Unmanned Aerial Vehicles (UAVs) in firefighting and other accident-related crisis situations. This innovative technology is shown to enhance emergency response capabilities, offering new ways to monitor, assess, and manage crises from a distance. Additionally, the research includes detailed analyses of ballistic and blast effects, offering insights into how these physical threats can impact infrastructure and how to mitigate their effects. The book combines cutting-edge research with practical insights, providing a comprehensive overview of the current trends and challenges in protecting critical infrastructures from a wide range of threats. This book also addresses the evolving role of humans in modern warfare, particularly in the context of increasing reliance on artificial intelligence. As AI technologies reshape military strategies, they emphasize the need to balance automation with human oversight, ensuring that human security remains central to decision-making processes in complex and high-stakes environments.
650
0
$a
Terrorism
$x
Prevention
$v
Congresses.
$3
622730
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
0
$a
Emergency management
$v
Congresses.
$3
620307
650
1 4
$a
Cyber-Physical Systems.
$3
3591993
650
2 4
$a
Materials Engineering.
$3
2071625
650
2 4
$a
Internet of Things.
$3
3538511
700
1
$a
Kovács, Tünde Anna.
$3
3783115
700
1
$a
Fürstner, Igor.
$3
3783116
710
2
$a
SpringerLink (Online service)
$3
836513
711
2
$a
Advanced Training Course on Security-Related Advanced Technologies in Critical Infrastructure Protection, with a View to Prevent Crises
$d
(2024 :
$c
Belgrade, Serbia)
$3
3783117
773
0
$t
Springer Nature eBook
830
0
$a
NATO science for peace and security.
$n
Series C,
$p
Environmental security.
$3
2160093
856
4 0
$u
https://doi.org/10.1007/978-94-024-2308-2
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9515234
電子資源
11.線上閱覽_V
電子書
EB HV6431
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login