Searched for: subject%3A%22Defence%252C%255C%2BSafety%255C%2Band%255C%2BSecurity%255C%2B%253B%255C%2BInformation%255C%2BSociety%22
(1 - 9 of 9)
- document
-
Huijbrechts, B. (author), Velikovaa, M. (author), Michels, S. (author), Scheepens, R. (author)Deliver “actionable” intelligence instead of just raw information – this is what the Metis research project pursues for supporting operational work in domains characterized by constantly evolving situations with a diversity of entities, complex interactions and high-level uncertainty in the information gathered. Operating effectively in such...article 2015
- document
-
Hendriks, A.J. (author), van de Laar, P.J.L.J. (author)Much, if not most, information needed to assess a crisis situation originates these days from cooperative sources such as the Internet and social networks. Public safety authorities face the challenge to compile this information of uncertain origin and quality in their situation understanding and response planning. Time matters: the integration...article 2013
- document
-
Luiijf, H.A.M. (author)This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the relevance to consider possible threats and their impact...bookPart 2012
- document
-
Sijs, J. (author), Papp, Z. (author)Distributed solutions for signal processing techniques are important for establishing large-scale monitoring and control applications. They enable the deployment of scalable sensor networks for particular application areas. Typically, such networks consists of a large number of vulnerable components connected via unreliable communication links...conference paper 2012
- document
-
Hoepman, J.H. (author), Hooghiemstra, T. (author)Onze geschiedenis laat een constante strijd tussen de burgers en hun bestuurders zien als het gaat om het beschermen van de grondrechten aan de ene kant en om het verhogen van de veiligheid en van de efficiëntie en slagkracht van het bestuur aan de andere kant. Dit is in de digitale samenleving niet anders. In het digitale domein woedt echter...article 2012
- document
-
van der Veen, J.S. (author), Bastiaans, M. (author), de Jonge, M. (author), Strijkers, R.J. (author)This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices locally, but also that it is infeasible to rely...conference paper 2012
- document
-
Klaver, M.H.A. (author)Op 16 oktober vond in Amsterdam The Grand Conference plaats. Deze conferentie werd georganiseerd door het Centre for the Protection of National Infrastructure (CPNI.NL) in nauwe samenwerking met de Europese Commissie, de Europese Network and Information Security Agency (ENISA), het Amerikaanse Department of Homeland Security (DHS) en het World...article 2012
- document
-
Luiijf, H.A.M. (author)Monitoring en besturing van steeds meer technische apparatuur,zowel lokaal als op afstand, gaat met computers. Zonder na te denken over enige vorm van informatiebeveiliging koppelt men de bediening van de apparatuur met het internet of publieke netwerken. Deskundigen maken zich al jaren zorgen. Recente incidenten laten zien dat bedrijven,...article 2012
- document
-
Hoepman, J.H. (author)The Internet of Things is nothing new. First introduced as Ubiquitous Computing by Mark Weiser [49] around 1990, the basic concept of the “disappearing computer” has been studied as Ambient Intelligence or Pervasive Computing in the decades that followed. Today we witness the first large scale applications of these ideas. We see RFID technology...article 2011
Searched for: subject%3A%22Defence%252C%255C%2BSafety%255C%2Band%255C%2BSecurity%255C%2B%253B%255C%2BInformation%255C%2BSociety%22
(1 - 9 of 9)