語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Critical infrastructure protection = advanced technologies for crisis prevention and response /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Critical infrastructure protection/ edited by Tünde Anna Kovács, Igor Fürstner.
其他題名:
advanced technologies for crisis prevention and response /
其他作者:
Kovács, Tünde Anna.
出版者:
Dordrecht :Springer Netherlands : : 2025.,
面頁冊數:
xi, 339 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Terrorism - Congresses. - Prevention -
電子資源:
https://doi.org/10.1007/978-94-024-2308-2
ISBN:
9789402423082
Critical infrastructure protection = advanced technologies for crisis prevention and response /
Critical infrastructure protection
advanced technologies for crisis prevention and response /[electronic resource] :edited by Tünde Anna Kovács, Igor Fürstner. - Dordrecht :Springer Netherlands :2025. - xi, 339 p. :ill., digital ;24 cm. - NATO science for peace and security series C: Environmental security,1874-6543. - NATO science for peace and security.Series C,Environmental security..
1. Nada El Yasmine Aichaoui, Tunde Anna Kovacs: Exploring the Intersection of Human Movement and Collaborative Robotics: Challenges and Opportunities in Computational Modeling -- 2. Mamiyev Azar: Serverless Approaches to Incident Response in Critical Networks -- 3. Tamás Berek: Use of UAVs in aerial radiation surveying in radiological contamination detection -- 4. János Besenyő: Prevention of the terror attack and the social aspects in the European Union -- 5. Felisberto David Wandi Chivela, Zoltán Pap and Edit Laufer: Fuzzy Logic-Based Risk Assessment Evaluating Physiological Values -- 6. Petar Čisar, Sanja Maravić Čisar and Attila Pásztor: Application of Heuristic Scanning in Malware Detection -- 7. Sanja Maravić Čisar, Robert Pinter, Petar Čisar and Livia Szedmina: Reverse Engineering and Cyber Security -- 8. Zlatko Čović: Secure Data Utilization from Web Environment -- 9. Norbert Daruka: Critical infrastructure risks from sabotage -- 10. Igor Fürstner: Analysis of Challenges and Opportunities of Using Photovoltaic Systems in the case of Households in Republic of Serbia by using Publicly Available Data -- 11. László Gogolák: Robot Navigation Based on Wireless Sensor Networks and Its Security Challenges in Industrial Environments -- 12. Szilvia Veress Juhaszné: Food Terrorism as a Real Threat -- 13. Dražan Kozak, Krešimir Crnogorac: Remote strain measurement at vital objects by own developed device -- 14. Milan Majer: Construction and Operation of the Hungarian Technical Border Barrier -- 15. Piroska Stanić Molcer and Ahmed Nour Abdesselam: Side-Channel Analysis for Hardware Trojan Detection: A Deep Learning Approach -- 16. Zoltán Nyikes and Tünde Anna Kovács: Expert application for the explosive cladding process specification -- 17. Zoltán Nyikes and László Tóth: Military and Civilian Uses of Cyber-Physical Systems in Crysis Situations -- 18. Mehmet Alican Polat and Tünde Anna Kovács: Hydrogen in Mobility and Infrastructure -- 19. Brigitta Safar and stelian Tampu: Humanitarian response to the basic psychosocial needs of refugees - Overview of psychosocial support for Voluntary and Forced Refugees -- 20. János Simon: Critical Infrastructure Protection of the Warehouse Logistics 4.0 Based on AVG Systems -- 21. Darjana Sredić and Ljubica Janjetović: Nonverbal communication and the psychology of lying for a security environment -- 22. Jovan Trajkovski: Ballistic response of high-strength steel against small-arm projectiles - numerical modelling -- 23. Darko Trifunovic and Branislav Todorovic: Android Knowledge Application as an Additional Advanced Technology for Use in Critical Infrastructure Protection.
This book presents the latest research findings from experts in critical infrastructure protection and management. It explores various aspects of both cyber and physical attack scenarios, focusing on crisis management and response strategies. A significant portion of the work addresses how different critical infrastructure sectors can withstand and recover from attacks, with an emphasis on practical solutions and real-world applications. Several chapters also delve into the human element of crisis management, highlighting the psychological and organizational challenges faced during emergencies. The book demonstrates how human decision-making, behaviour, and coordination play pivotal roles in the effectiveness of response efforts. One of the emerging topics in critical infrastructure protection discussed in the book is using Unmanned Aerial Vehicles (UAVs) in firefighting and other accident-related crisis situations. This innovative technology is shown to enhance emergency response capabilities, offering new ways to monitor, assess, and manage crises from a distance. Additionally, the research includes detailed analyses of ballistic and blast effects, offering insights into how these physical threats can impact infrastructure and how to mitigate their effects. The book combines cutting-edge research with practical insights, providing a comprehensive overview of the current trends and challenges in protecting critical infrastructures from a wide range of threats. This book also addresses the evolving role of humans in modern warfare, particularly in the context of increasing reliance on artificial intelligence. As AI technologies reshape military strategies, they emphasize the need to balance automation with human oversight, ensuring that human security remains central to decision-making processes in complex and high-stakes environments.
ISBN: 9789402423082
Standard No.: 10.1007/978-94-024-2308-2doiSubjects--Topical Terms:
805666
Terrorism
--Prevention--Congresses.
LC Class. No.: HV6431
Dewey Class. No.: 363.32517
Critical infrastructure protection = advanced technologies for crisis prevention and response /
LDR
:05775nam a2200361 a 4500
001
1161830
003
DE-He213
005
20250513130318.0
006
m d
007
cr nn 008maaau
008
251029s2025 ne s 0 eng d
020
$a
9789402423082
$q
(electronic bk.)
020
$a
9789402423075
$q
(paper)
024
7
$a
10.1007/978-94-024-2308-2
$2
doi
035
$a
978-94-024-2308-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6431
072
7
$a
TJF
$2
bicssc
072
7
$a
GPFC
$2
bicssc
072
7
$a
TEC008000
$2
bisacsh
072
7
$a
TJF
$2
thema
072
7
$a
GPFC
$2
thema
082
0 4
$a
363.32517
$2
23
090
$a
HV6431
$b
.C934 2025
245
0 0
$a
Critical infrastructure protection
$h
[electronic resource] :
$b
advanced technologies for crisis prevention and response /
$c
edited by Tünde Anna Kovács, Igor Fürstner.
260
$a
Dordrecht :
$c
2025.
$b
Springer Netherlands :
$b
Imprint: Springer,
300
$a
xi, 339 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
NATO science for peace and security series C: Environmental security,
$x
1874-6543
505
0
$a
1. Nada El Yasmine Aichaoui, Tunde Anna Kovacs: Exploring the Intersection of Human Movement and Collaborative Robotics: Challenges and Opportunities in Computational Modeling -- 2. Mamiyev Azar: Serverless Approaches to Incident Response in Critical Networks -- 3. Tamás Berek: Use of UAVs in aerial radiation surveying in radiological contamination detection -- 4. János Besenyő: Prevention of the terror attack and the social aspects in the European Union -- 5. Felisberto David Wandi Chivela, Zoltán Pap and Edit Laufer: Fuzzy Logic-Based Risk Assessment Evaluating Physiological Values -- 6. Petar Čisar, Sanja Maravić Čisar and Attila Pásztor: Application of Heuristic Scanning in Malware Detection -- 7. Sanja Maravić Čisar, Robert Pinter, Petar Čisar and Livia Szedmina: Reverse Engineering and Cyber Security -- 8. Zlatko Čović: Secure Data Utilization from Web Environment -- 9. Norbert Daruka: Critical infrastructure risks from sabotage -- 10. Igor Fürstner: Analysis of Challenges and Opportunities of Using Photovoltaic Systems in the case of Households in Republic of Serbia by using Publicly Available Data -- 11. László Gogolák: Robot Navigation Based on Wireless Sensor Networks and Its Security Challenges in Industrial Environments -- 12. Szilvia Veress Juhaszné: Food Terrorism as a Real Threat -- 13. Dražan Kozak, Krešimir Crnogorac: Remote strain measurement at vital objects by own developed device -- 14. Milan Majer: Construction and Operation of the Hungarian Technical Border Barrier -- 15. Piroska Stanić Molcer and Ahmed Nour Abdesselam: Side-Channel Analysis for Hardware Trojan Detection: A Deep Learning Approach -- 16. Zoltán Nyikes and Tünde Anna Kovács: Expert application for the explosive cladding process specification -- 17. Zoltán Nyikes and László Tóth: Military and Civilian Uses of Cyber-Physical Systems in Crysis Situations -- 18. Mehmet Alican Polat and Tünde Anna Kovács: Hydrogen in Mobility and Infrastructure -- 19. Brigitta Safar and stelian Tampu: Humanitarian response to the basic psychosocial needs of refugees - Overview of psychosocial support for Voluntary and Forced Refugees -- 20. János Simon: Critical Infrastructure Protection of the Warehouse Logistics 4.0 Based on AVG Systems -- 21. Darjana Sredić and Ljubica Janjetović: Nonverbal communication and the psychology of lying for a security environment -- 22. Jovan Trajkovski: Ballistic response of high-strength steel against small-arm projectiles - numerical modelling -- 23. Darko Trifunovic and Branislav Todorovic: Android Knowledge Application as an Additional Advanced Technology for Use in Critical Infrastructure Protection.
520
$a
This book presents the latest research findings from experts in critical infrastructure protection and management. It explores various aspects of both cyber and physical attack scenarios, focusing on crisis management and response strategies. A significant portion of the work addresses how different critical infrastructure sectors can withstand and recover from attacks, with an emphasis on practical solutions and real-world applications. Several chapters also delve into the human element of crisis management, highlighting the psychological and organizational challenges faced during emergencies. The book demonstrates how human decision-making, behaviour, and coordination play pivotal roles in the effectiveness of response efforts. One of the emerging topics in critical infrastructure protection discussed in the book is using Unmanned Aerial Vehicles (UAVs) in firefighting and other accident-related crisis situations. This innovative technology is shown to enhance emergency response capabilities, offering new ways to monitor, assess, and manage crises from a distance. Additionally, the research includes detailed analyses of ballistic and blast effects, offering insights into how these physical threats can impact infrastructure and how to mitigate their effects. The book combines cutting-edge research with practical insights, providing a comprehensive overview of the current trends and challenges in protecting critical infrastructures from a wide range of threats. This book also addresses the evolving role of humans in modern warfare, particularly in the context of increasing reliance on artificial intelligence. As AI technologies reshape military strategies, they emphasize the need to balance automation with human oversight, ensuring that human security remains central to decision-making processes in complex and high-stakes environments.
650
0
$a
Terrorism
$x
Prevention
$v
Congresses.
$3
805666
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
574534
$3
727814
650
0
$a
Emergency management
$v
Handbooks, manuals, etc.
$3
569381
$3
735578
650
1 4
$a
Cyber-Physical Systems.
$3
1387591
650
2 4
$a
Materials Engineering.
$3
1062318
650
2 4
$a
Internet of Things.
$3
1048478
700
1
$a
Kovács, Tünde Anna.
$3
1488767
700
1
$a
Fürstner, Igor.
$3
1488768
710
2
$a
SpringerLink (Online service)
$3
593884
711
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
773
0
$t
Springer Nature eBook
830
0
$a
NATO science for peace and security.
$n
Series C,
$p
Environmental security.
$3
1067728
856
4 0
$u
https://doi.org/10.1007/978-94-024-2308-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入