Searched for: subject%3A%22NO%255C%2B%255C-%255C%2BNetworked%255C%2BOrganisations%22
(61 - 80 of 202)

Pages

document
van Rest, J.H.C. (author)
Large European Union communities are working on and using surveillance systems. They are of diverse backgrounds, such as end users (e.g. law enforcement agencies and critical infrastructure owners), suppliers of surveillance products and services, academics and policymakers. One of the goals of the ERNCIP thematic group (TG) on video analytics...
report 2015
document
Holtzer, A.C.G. (author), van der Giessen, A.M. (author), Djurica, M. (author), Gruber, G. (author), Krengel, M. (author), Kokkinos, P. (author), Varvarigos, M. (author), Prusa, J. (author), Schulting, H.W. (author), Holzmann-Kaiser, U. (author), Schmoll, C. (author), Hatzakis, I. (author), da Silva, F.M. (author), Reymund, A. (author), Strebler, R. (author), Moreno, J.J.R. (author), Munoz, C.G. (author), Gheorghe, G. (author), Nikolopoulos, V. (author), Mavridis, T. (author), Bektas, O. (author), Yuce, E. (author), Volk, M. (author), Sterle, J. (author), Skarmeta, A. (author)
This deliverable D5.3 presents the GEN6 Final Measurement. It describes the outputs, outcomes and impact of the GEN6 project, based on other project deliverables inputs of the pilot leaders of the active GEN6 pilots and the individual consortium partners. The final measurement aims to show the amount of achievements within GEN6 and spill-over of...
report 2015
document
van Rest, J.H.C. (author)
public lecture 2015
document
van Rest, J.H.C. (author)
This report describes surveillance use cases in the context of protection of critical infrastructure. The focus in this report is on video analytics. This report is created as part of the work of the ERNCIP Thematic Group on Video Analytics and Surveillance.
report 2015
document
Duijnhoven, H. (author), Neef, M. (author)
This chapter discusses the complex challenge of dealing with diverging threats in our contemporary hyper-connected society. In recent decades, resilience has become a key notion that has been adopted by policy-makers and academia to embrace the changing risk our society faces. Yet the traditional, modernist rational logic that dominates...
bookPart 2015
document
Luiijf, H.A.M. (author)
bookPart 2015
document
van der Ven, J.G.M. (author), Stolk, D.J. (author)
public lecture 2015
document
Luiijf, H.A.M. (author), Theocharidou, M. (author), Rome, E. (author)
CIPedia© http://www.cipedia.eu is a Wiki-based body of common knowledge for the wide international community of critical infrastructure (CI) protection and resilience stakeholders such as policy makers, researchers, governmental agencies, emergency management organizations, CI operators, and even the public.
article 2015
document
Zielstra, A. (author), Luiijf, H.A.M. (author), Duijnhoven, H.L. (author)
All stakeholders in cyber security and resilience have obligations; it is time to end the period of loose, non-binding collaborations, say Annemarie Zielstra, Eric Luiijf and Hanneke Duijnhoven, in this call for nations to work more closely together
article 2015
document
Luiijf, H.A.M. (author)
Bij ontwikkelaars en gebruikers in de ICT-wereld staat veiligheid zelden bovenaan als het gaat om de belangrijkste producteigenschappen. Op de eerste plaats moet het gewoon werken. Vervolgens moet het zoveel mogelijk kunnen. En het mag natuurlijk niet te ingewikkeld zijn. Of het ook veilig is? Dat zal toch wel? Nu tegenwoordig zo ongeveer alles...
article 2015
document
Klaver, M.H.A. (author)
article 2015
document
Palomares, I. (author), Galway, L. (author), Haran, M. (author), Neef, M. (author), Woods, C. (author), Wang, H. (author)
Post-crisis response and recovery necessitates the identification and prioritization of the needs and capacities of the affected community in order to provide efficient and wellcoordinated humanitarian assistance. The Community Based Comprehensive Recovery platform aims to facilitate enhanced communication flows between professional communities,...
conference paper 2015
document
Luiijf, H.A.M. (author), Klaver, M.H.A. (author)
With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases critical services offered by key Internet Service Providers (ISP). This paper debates whether nations, their policy-makers, legislation and regulation...
article 2015
document
Luiijf, H.A.M. (author)
Ter ondersteuning van de internationale cyber security gemeenschap ontwikkelde TNO drie producten voor de vierde Global Conference on Cyber Space: From Awareness to action: bridging the gaps in 10 steps, Sharing Cyber Security Information en Cyber Security of Industrial Control Systems (ICS).
article 2015
document
Treurniet, W. (author), Blankers, I.J. (author), Goddijn, B. (author)
De praktijk van het schrijven van ramp- en incidentbestrijdingsplannen is weerbarstig. In veel gevallen is bij de planvorming onvoldoende oog voor de bredere en langere termijn maatschappelijke impact van een ramp of grootschalig incident. Verder blijken de inhoud en de verschijningsvorm van veel ramp- en incidentbestrijdingsplannen onvoldoende...
article 2015
document
Luiijf, H.A.M. (author)
Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures (CI), their products and services. Many of the CI services as well as other organizations use Industrial Control Systems (ICS) to monitor and control their mission-critical processes. Therefore, it is crucial that the functioning of ICS is...
bookPart 2015
document
Luiijf, H.A.M. (author), Kernkamp, A.C. (author)
The failure of a national critical infrastructure may seriously impact the health and well-being of citizens, the economy, the environment, and the functioning of the government. Moreover, critical infrastructures increasingly depend on information and communication technologies (ICT) or, in short, cyber. Cyber security and resilience are...
book 2015
document
Luiijf, H.A.M. (author), te Paske, B.J. (author)
Our society and its citizens depend on the undisturbed functioning of (critical) infrastructures and their services. Crucial processes in most critical infrastructures, and in many other organisations, rely on the correct and undisturbed functioning of Industrial Control Systems (ICS). A failure of ICS may both cause critical services to fail...
book 2015
document
Neef, R.M. (author), Rijken, M. (author)
Report on interface components of COBACORE workspace and functional behaviour of the COBACORE system: This report describes the functional behaviour of the platform and various interface concepts of the COBACORE platform, including the underlying production rules and support mechanisms.
report 2015
document
van der Kleij, R. (author), van Hemert, D.A. (author), de Vries, A. (author), van Rest, J.H.C. (author)
Het vroegtijdig signaleren van afwijkend gedrag biedt kansen om incidenten te voorkomen of te verstoren, of om daders op heterdaad te betrappen. In dit artikel beschrijven we gesignaleerde trends in het gebruik van kennis over afwijkend gedrag. Organisaties binnen de openbare orde- en veiligheidssector zouden notie moeten nemen van deze...
article 2015
Searched for: subject%3A%22NO%255C%2B%255C-%255C%2BNetworked%255C%2BOrganisations%22
(61 - 80 of 202)

Pages