This article is focused on the cybersecurity in the protection of Soft targets. From 2014, the Soft targets are the much-discussed topic in the security area. The most security measures are against violent attacks, but the threat is also inside cyber-attacks. In our research, we analyzed possible ways of attacks, and we tried to find the best way for security measures. We create the module for the PSIM, which we use for viewing and categorizing of data from protected objects. In this article, we present the initial study about our research, in which we are focused the transport system. There is a big threat in a disruption, damage or destruction of this system. The cyber-attacks do not have losses of life, but it would not be true in future...
This article is focused on the creation of a tool for customization of security measures. The aim is...
The diploma thesis deals with selected risks of soft targets, which may have a negative impact on th...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
This article is focused on counter-terrorism measures. Our research is deal to Soft targets when we ...
The soft targets and crowded places are defined as the objects or the places without the integration...
The soft targets are closely related with the risk of attack to the group of people. This problem ca...
The soft targets and crowded places are closely related with a high risk of the violent attack. Betw...
This article is focused on the methodology of identification and protection of soft targets of the t...
The soft targets are closely related with the risk of attack to the group of the people. This proble...
The article presents interpretations of the concepts of cybersecurity and cybercrime as well as the ...
The paper contains information about hacking types and systems which they are suffered the most cybe...
The article is of interest to managers and scientists at all levels who deal with combating cyber th...
This research paper examines the topic of cyber-crime and the prevention measures applied against th...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
The soft targets and crowded places are closely related with a risk of assaults. Between the experts...
This article is focused on the creation of a tool for customization of security measures. The aim is...
The diploma thesis deals with selected risks of soft targets, which may have a negative impact on th...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...
This article is focused on counter-terrorism measures. Our research is deal to Soft targets when we ...
The soft targets and crowded places are defined as the objects or the places without the integration...
The soft targets are closely related with the risk of attack to the group of people. This problem ca...
The soft targets and crowded places are closely related with a high risk of the violent attack. Betw...
This article is focused on the methodology of identification and protection of soft targets of the t...
The soft targets are closely related with the risk of attack to the group of the people. This proble...
The article presents interpretations of the concepts of cybersecurity and cybercrime as well as the ...
The paper contains information about hacking types and systems which they are suffered the most cybe...
The article is of interest to managers and scientists at all levels who deal with combating cyber th...
This research paper examines the topic of cyber-crime and the prevention measures applied against th...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
The soft targets and crowded places are closely related with a risk of assaults. Between the experts...
This article is focused on the creation of a tool for customization of security measures. The aim is...
The diploma thesis deals with selected risks of soft targets, which may have a negative impact on th...
This paper is devoted to the analysis of modern trends in economic cybersecurity. We analysed the dy...