Results 1 to 10 of about 702,907 (282)

Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities [PDF]

open access: yesSensors
Critical National Infrastructures (CNIs)—including energy grids, water systems, transportation networks, and communication frameworks—are essential to modern society yet face escalating cybersecurity threats. This review paper comprehensively analyzes AI-
Yagmur Yigit   +8 more
doaj   +2 more sources

CRITICAL INFRASTRUCTURE PROTECTION WITHIN THE EUROPEAN UNION [PDF]

open access: yesJournal of Defense Resources Management, 2013
The new dynamics and intensity of the risks and threats posed to societal functioning and citizens’ security have acquired new meanings. Consequently, an integrated approach to the concept of ”critical infrastructure” is necessary. The critical nature of
Vasile N. POPA
doaj   +2 more sources

Legal Dimension of the Protection of Critical Infrastructure – Selected Aspects

open access: goldSafety & Fire Technology, 2022
Aim: As part of this article, an attempt was made to present the legislative process in Poland regarding critical infrastructure, for which valid is the Act of 26 April 2007 on crisis management, specifying, inter alia, authorities competent in crisis ...
Łukasz Roman, Krzysztof Cygańczuk
doaj   +2 more sources

Cybersecurity and Protection of Critical Infrastructure

open access: yesStudia Iuridica Lublinensia, 2023
The functioning of critical infrastructure depends on information and communication technologies (ICT) systems that enable its equipment or facilities to operate smoothly. Threats to its functioning can present a major issue for the state and society, as
Małgorzata Czuryk
doaj   +1 more source

Applying Risk Management Process in Critical Infrastructure Protection [PDF]

open access: yesInterdisciplinary Description of Complex Systems, 2019
Critical Infrastructure is an asset or system whose disruption or destruction should have adverse effect on the performance of economic and social functions of the state, and thus on the quality of life of residents in terms of the protection of their ...
Maria Luskova, Zdenek Dvorak
doaj   +1 more source

Security management in the field of critical infrastructure protection in the Republic of Serbia: State and perspectives [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2020
Term "critical infrastructure" became part of the post-Cold War security discourse when the first legal and political acts, containing this term, emerged.
Stajić Ljubomir S.   +2 more
doaj   +1 more source

Methodology of modelling the level of security of systems of peripheral protection [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2015
Safety of transport objects, as objects of strategic character and belonging to a critical infrastructure depends on the effectiveness of the used various security systems.
Mirosław Siergiejczyk, Adam Rosiński
doaj   +1 more source

Security of European critical infrastructures outside the European Union: a review of the Western Balkans national laws

open access: yesInsights into Regional Development, 2022
From the very beginning of the 21st century, the European Union took measures to develop a common security framework for critical infrastructure protection and to harmonize measures and standards between states.
Milica Sikimić
doaj   +1 more source

New hybrid method for vulnerability assessment in floodplain areas exposed to dam break

open access: yesEngineering Reports, 2023
Natural and man‐made factors can cause dam failure, which constantly threatens downstream assets. Flood risk assessment is typically developed according to the hydraulic and geographic characteristics of floodplain regions.
Mohammad Ali Nekooie, Saeed Gholizadeh
doaj   +1 more source

Critical Energy Infrastructure Protection - Assessment Results Communication [PDF]

open access: yes, 2011
Computer simulation of real systems is most of the time a complex task, both in terms of the analytical models describing the process and the usage of the tools that implement the models themselves.
MASERA Marcelo, VAMANU BOGDAN
core   +4 more sources

Home - About - Disclaimer - Privacy