Abstract is missing.
- Analysis of insurance conditions as a tool to ensure physical protection in the Czech RepublicGabriela Králícková, Petra Dostálová. 1-4 [doi]
- Application of composite indicator in evaluation of resilience in critical infrastructure systemDavid Rehak, Alena Splichalova. 1-6 [doi]
- A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking SystemMichael Coole, Deborah Evans, David Brooks. 1-6 [doi]
- Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechainsYuri Bespalov, Lyudmila Kovalchuk, Hanna Nelasa, Roman Oliynykov, Alberto Garoffolo. 1-7 [doi]
- Analysing keystroke dynamics using wavelet transformsAshhadul Islam, Samir Brahim Belhaouari. 1-5 [doi]
- Electronic Number Plate Generation for Performance EvaluationSoodamani Ramalingam, William E. Martin, Michael Rhead, Robert Gurney. 1-6 [doi]
- Exploring the effects of segmentation when learning with Virtual Reality and 2D displays: a study with airport security officersKaspar Kaufmann, Thomas Wyssenbach, Adrian Schwaninger. 1 [doi]
- Physical Protection and Guarding Service in the Company During the Pandemic - Human Resource ManagementAndrej Vel'as, Zuzana Zvaková, Martin Boros. 1-4 [doi]
- The Effect of Number Plate Layout and Design on Automated RecognitionRobert Gurney, Michael Rhead, William E. Martin. 1-6 [doi]
- Testing Smart Meters with Custom ApplicationDavid Kohout, Petr Mlynek. 1-6 [doi]
- Objective Method for Object Security EvaluationStanislav Kovar, Jan Valouch, Jan Nemec. 1-4 [doi]
- Threats and Resilience: Methodology in the Area of Railway InfrastructureLucie Flynnova, Frantisek Paulus, Jarmil Valasek. 1-5 [doi]
- Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets - Self-defense partDora Kotkova, Lukas Kotek, Martin Hromada. 1-5 [doi]
- Secure Tax State Line: a Brazilian State Platform for Monitoring Roads, Designed to Support Tax Enforcement and ComplianceLindemberg Naffah Ferreira, Rogério Zupo Braga, Bruno Meira Tenório D'Albuquerque, Bruno Eduardo Abreu de Oliveira, Carlos Augusto Lisboa da Silva, Guilherme Couto Soares, Alex Discacciati Neves, Pierre Julião Pimentel, Marcelo Maximiliano Maciel, Eufrásio Alves Cambuí Júnior, Carlos Renato Machado Confar, Aline Chevrand Campos, Alessandro Márcio de Moraes Zebral, José Roberto Miranda, Ricardo Petrini de Morais, Adriano Araújo Campolina, Osvaldo Lage Scavazza, Luiz Cláudio Fernandes L. Gomes. 1-6 [doi]
- Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite UsedEva Holasova, Radek Fujdiak. 1-7 [doi]
- Perceived severity of vulnerability in cybersecurity: cross linguistic variegationWiktor Sedkowski, Karol Bierczynski. 1-4 [doi]
- Online Interactive Education of People in the Field of Protection of Soft TargetsLukas Kotek, Martin Hromada, Dora Kotkova. 1-5 [doi]
- Applying Text Analytics to Insider Risk Analysis: A Case Study on Keyword GenerationCarrie Gardner, William R. Clacyomb. 1-7 [doi]
- Biometric Identity Verification as Part of Physical Protection SystemsTomás Lovecek, Jakub Durica, Katarína Kampová, Katarína Petrlová. 1-7 [doi]
- Analysis of Current Preventive Approaches in the Context of CybersecurityMimi Enakome Oka, Martin Hromada. 1-5 [doi]
- Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing CountriesHemin Muhammad, Martin Hromada. 1-5 [doi]
- Emotional analysis of safeness and risk perception of cybersecurity attacks during the COVID-19 pandemicFabio Garzia, Francesco Borghini, Ekaterina Makshanova, Mara Lombardi, Soodamani Ramalingam. 1-6 [doi]
- Economic Evaluation of Cost and Benefits of Implementing Monitoring and Tracking System of Persons in Medical FacilitatesKatarína Kampová, Katarína Mäkká, Katarína Petrlová. 1-6 [doi]
- Evaluation of the most important fire threats of the buildingAdam Malatinský, Martin Hromada. 1-6 [doi]
- Fuzzing ICS Protocols: Modbus Fuzzer FrameworkPetr Ilgner, Radek Fujdiak. 1-6 [doi]
- A new hybdrid steganographic technique for imagesFabio Garzia, Roberto Cusani, Andrea Chiarella. 1-6 [doi]