- document
- Gaasbeek, R.C. (author) conference paper 2022
- document
-
Koolloos, M.F.J. (author), Mansfield, T. (author), Henniger, O. (author), Damer, N. (author), Gacon, P. (author), Ulrich, C. (author), Schnürer, F. (author), Kroon, E.J. (author), Vardulakis, G. (author), Kemp, M. (author), Gaasbeek, R.C. (author), Elfving, A. (author), Pettersson, A. (author), Ehlerding, A. (author), van Voorthuijsen, G.P. (author)This document describes how the HECTOS harmonised certification framework could be applied to several physical security products used in biometrics, explosives & weapons detection equipment, radiological & nuclear detection equipment, chemical and biological detection equipment and locks. Additionally, the applicability of the HECTOS framework...report 2017
- document
-
TNO Defensie en Veiligheid (author), Rypkema, J.A. (author), van der Horst, M.J. (author), Gaasbeek, R.C. (author), den Hartog, E.A. (author), de Koning, L. (author), van Rijk, R. (author)Aanleiding : Ontwikkeling van nieuwe technologieën bieden een steeds breder scala aan kleding en uitrusting om operationele hulpverleners mee uit te rusten. De kleding en uitrusting kan worden ingezet om hulpverleners beter te beschermen en de werkzaamheden onder risicovolle omstandigheden toch uit te kunnen voeren. Echter, in sommige gevallen...report 2010
- document
-
Bonsen, I.M. (author), Gaasbeek, R.C. (author), TNO Defensie en Veiligheid (author)Current approaches in critical infrastructure protection use long lists of items that fail to give its user a structured answer to the state of protection of its object. The functionality approach uses different terrorist functions to structure the threat (which are to have intent, to scout, to transport, to attack and to have an effect). It...conference paper 2009