https://folyoirat.ludovika.hu/hadmernok/issue/feed Military Engineer 2025-07-04T11:55:14+02:00 Farkas Tibor, főszerkesztő farkas.tibor@uni-nke.hu Open Journal Systems <p>The <strong>Military Engineer</strong> journal is the military technical science thematic publication of the National University of Public Service Faculty of Military Science and Officer Training and Military Technical Doctoral School. The purpose of the journal is to publish researches of academics, PhD and university students about in the field of military engineering sciences and related topics.</p> https://folyoirat.ludovika.hu/hadmernok/article/view/7689 Assessment of Operator’s Safety Management Practices for the Firewater Pollution Prevention in Logistics Warehouses 2024-10-03T18:19:34+02:00 Kátai-Urbán Maxim maximkatai@gmail.com Szakál Béla szakalbela1827@freemail.hu Cimer Zsolt cimer.zsolt@uni-nke.hu <p>The industrial accidents occurred at logistics facilities used for the storage of dangerous goods, as a result of contaminated water generated during fires can cause major environment consequences to the surface and ground waters. In this study, the authors assess the experience of operators’ safety organisation practices of logistics warehouses in the field of firewater pollution prevention.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Kátai-Urbán Maxim, Szakál Béla, Cimer Zsolt https://folyoirat.ludovika.hu/hadmernok/article/view/7696 The Effect of Shelterbelt Forest on Combat Activities: 2024-10-03T18:30:37+02:00 Halasz Andras halasz.andras@uni-mate.hu Nagy Dominik nagy.dominik@uni-mate.hu Jancso Mihaly jancso.mihaly@uni-mate.hu Varga Krisztina varga.krisztina@uni-mate.hu Bojte Csilla bojte.csilla@uni-mate.hu Csizi Istvan csizi.istvan@uni-mate.hu <p>Homeland security includes complex preparational measures in forestry. Beyond fundamental forest management objectives, complete afforestation and shelterbelt forests can greatly enhance the defensive potential of exposed areas. Forest plantation can be used to hide manoeuvre tracks, provide concealment and anti-drone cover. The root system of trees has a soil-stabilising effect, which is essential for moving heavy armoury. Foresight is also required in the selection of appropriate tree species, focusing on the maximum trunk diameter available. The logging road network in forest plantations should match with defence plans. Dirt road maintenance should be a joint responsibility of the forest manager, landowner and the Hungarian Defence Forces. </p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Halász András, Nagy Dominik, Jancsó Mihály, Varga Krisztina, Bojté Csilla, Csízi István https://folyoirat.ludovika.hu/hadmernok/article/view/7827 The Dawn of a New Chapter in India–Africa Relationship 2025-01-22T08:59:01+01:00 Aadi Rajesh nayyaraadi@gmail.com <p>India has come a long way from being a defence importer to becoming a major defence exporter. As India seeks to increase its own geopolitical clout and counterbalance the growing Chinese influence in the developing world, it is adapting to new avenues for partnership with the developing world. With a wide range of indigenous, cost-effective, and reliable weapons, India is seeking to forge a new chapter of defence export in its relations with various developing countries, especially Africa.</p> <p>While some instances of successes have given a boost to the Indian defence industry and increased its exports, challenges remain with competition from China, Russia, Turkey, the United States, and other Western nations in a growing African defence import market. The paper will explore the recent developments in the Indian defence industry, the trend of current exports to Africa, and the potential opportunities and challenges.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Aadi Rajesh https://folyoirat.ludovika.hu/hadmernok/article/view/7536 Cybersecurity in Urban Mobility, Focus on E-Scooters, Part 1 2024-06-19T11:10:16+02:00 Harangozó Valentin harangozovalentin1986@gmail.com <p>The aim of the study was to thoroughly examine the cybersecurity aspects of electromobility devices, identify potential risks and threats, and explore the relationship between users and the cybersecurity of electric vehicles. In the first part of the study, the author presents the willingness of electromobility device users to adopt the technology, based on a survey conducted using the TAP model. The results of the research highlight that perceptions of cybersecurity risks associated with electromobility devices have a significant impact on the acceptance of these technologies and the use of such vehicles, which is crucial for the future development of electromobility.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Harangozó Valentin https://folyoirat.ludovika.hu/hadmernok/article/view/7723 Reusable Interoperability Software Components in NATO C2 Systems 2024-10-11T16:51:03+02:00 Munk Sándor munk.sandor@uni-nke.hu <p>An increasingly important condition for the successful operation of military organisations participating in today’s multinational operations and cooperating with governmental and other (non-governmental) organisations is the interoperability of their systems. The development of NATO military IT systems, implementation and maintenance of their interoperability capabilities is done according to the interoperability requirements of the Federated Mission Networking (FMN) framework. Although development based on reusable software components reduces development time and costs and increases the quality of interoperability capabilities, such components are not available for NATO command and control systems, nor are their issues addressed in military literature.</p> <p>This publication validates the hypothesis that there are interoperability functions included in the NATO FMN requirements that can be implemented in the form of reusable software components, summarises the conceptual foundations of reusable interoperability components, explores their main types, comparing them with related NATO documents, and defines the purpose and main characteristics of each type.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Munk Sándor https://folyoirat.ludovika.hu/hadmernok/article/view/7698 5G Passive Sensing in Urban Areas 2024-10-07T13:02:00+02:00 Ollári Viktor ollari.viktor@protonmail.com Haig Zsolt haig.zsolt@uni-nke.hu <p>The cost-efficiency, decreasing size, rapid deployment, variety of possible illumination sources and low detectability of passive radar solutions make them suitable for a wide range of military and civil applications. A passive radar system detects signals emitted by an illuminator of opportunity and reflected from the target. The potential of 5G technology can make it a remarkable illuminator. The chaotic physical and electromagnetic characteristics of the urban space may require the use of detection-enhancing technologies such as the Internet of Things and artificial intelligence. Based on relevant publications, this paper examines the potential of 5G as an illumination of opportunity for a passive radar ecosystem in an urban environment.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Ollári Viktor, Haig Zsolt https://folyoirat.ludovika.hu/hadmernok/article/view/7885 Evolutionary Analysis of the Elements of NATO’s Cyber Operations Organisations 2025-01-22T09:25:06+01:00 Pozderka Gábor poz@freemail.hu <p>At the NATO’s Warsaw Summit in 2016, leaders agreed that cyberspace is a separated domain and that its defence is part of NATO’s collective defence mission. Accordingly, the rethinking of the previously fragmented capabilities and the system of tasks of the organisational elements responsible for managing them began, and the development of action plans necessary for the implementation of tasks. The aim of this publication is to examine the evolutionary elements of NATO’s cyber defence and cyber operations and to analyse what tasks can be identified during national implementation as a result. Obviously, this evolutionary process has not yet been completed, due to the peculiarity of this field, new tasks are constantly appearing even on a daily basis, and these changes also affect the formation of the organisational structure.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Pozderka Gábor https://folyoirat.ludovika.hu/hadmernok/article/view/7808 What Does Artificial Intelligence Give and Take Away from Us? 2024-12-03T12:49:13+01:00 Szűcs Attila szucs.attila@uni-nke.hu <p>The claim that Artificial Intelligence will change our lives is a bit of a cliché these days. It is changing. But how? Like all the new technologies we start using in our daily lives, as it happened when work processes started to be done by machines instead of by hand power? Or, is what is happening now a change even more profound, a radical change for civilisation as a whole? A change like that brought by the use of fire? The aim of this paper is to go beyond the clichés and provide a deeper, structured analysis of how artificial intelligence (AI) is reshaping our civilisation. To this end, I will use an analytical evaluation method to examine what AI has contributed to people’s well-being, security and sense of security in four main areas of AI application – research, health, transport, data security – and what it has done in the opposite direction. In this study, I want to focus on the impact of the use of AI in education as a key area for the future.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Szűcs Attila https://folyoirat.ludovika.hu/hadmernok/article/view/7870 Opportunities for the Digitalisation of the Chain of Custody 2025-01-29T08:14:44+01:00 Kreitz Zsuzsanna kreitzzsu@gmail.com <p>The chain of custody (CoC) process is essential in the management of forensic evidence, ensuring that the origin, integrity, and handling of evidence can be continuously traced and authenticated. Rapid advances in digitalisation offer opportunities to make traditionally paper-based and manually managed CoC processes more efficient and reliable. The use of digital solutions – such as blockchain technology, RFID chips, and smart contracts – can significantly increase the transparency and reliability of evidence handling, while reducing the risks arising from human error, fraud, or negligence. The aim of this paper is to explore the possibilities for CoC digitisation, with a focus on legal, technological, and data security aspects. The paper also addresses the challenges of implementing a digital CoC, such as compliance with personal data protection regulations and the integration of new systems with existing processes. Overall, digital chain-of-custody solutions can bring significant improvements in the accuracy and speed of evidence management, but their implementation requires thorough legal and technological analysis and preparation.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Kreitz Zsuzsanna https://folyoirat.ludovika.hu/hadmernok/article/view/7746 IT Education Curriculum in Hungary and Serbia 2025-01-14T13:14:55+01:00 Mandić Dorottya mandic.dorottya@gmail.com Kiss Gábor kiss.gabor@bgk.uni-obuda.hu <p>IT has an important role in education, as acquiring user-level IT knowledge is becoming more important nowadays. Several studies deal with the IT education curriculum of Hungary and Serbia. As more and more users are using various smart devices these days, it is becoming more important that they have the right knowledge in this area and that they can use it with the right amount of care to protect their personal data. It is expected that more smart devices will be present in the future and smart device users generally do not know how to use their smart devices safely, many users do not even have basic knowledge. Therefore, it is important for users to be aware of the dangers of using smart devices. This study examines whether information security awareness can be found in the IT education curriculum of Hungary and Serbia, and whether there is a difference between the IT curriculum and password usage habits in the two countries.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Mandić Dorottya, Kiss Gábor https://folyoirat.ludovika.hu/hadmernok/article/view/7782 Security and Operational Controls for a Public Cloud Service in a Financial Institution 2025-01-14T19:26:17+01:00 Oláh István olah.istvan.gyorgy@uni-nke.hu Magyar Sándor magyar.sandor@uni-nke.hu <p>Today, cloud computing services are growing very fast. One of the main reasons for this is the increasing competition and innovation in the market, the increased demand for resources in IT systems and the demand for more complex knowledge-based solutions. Deploying a server and performing the associated tasks on your own infrastructure can often take weeks or months, while the same process takes only a few minutes with a cloud service provider. The use of cloud services has become commonplace for anyone using mobile devices, and for financial institutions, this technology is becoming inevitable in the short term. If an organisation carefully selects a service provider on the basis of legal, technical and information security criteria, and then monitors its operations on an ongoing basis, there is no reason why a financial institution should not use public cloud services, according to the criteria examined. It is important to stress, however, that our analysis did not cover all possible risk factors.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Oláh István, Magyar Sándor https://folyoirat.ludovika.hu/hadmernok/article/view/7753 Cybersecurity Challenges for NATO Military Air Transport Operations 2025-01-14T13:20:08+01:00 Paráda István paradaistvan@gmail.com Tóth András toth.hir.andras@uni-nke.hu <p>The aviation industry's increasing reliance on technology has led to concerns about state-sponsored cyberattacks, which pose cybersecurity challenges for both military and civil aviation. This paper analyses NATO's military air cargo capabilities. It examines relevant civil aviation cyberattacks as case studies in light of potential cyber threats to NATO military aviation. Summarising these findings, the authors conclude their implications. They then use an analytical-evaluative method to identify categories of cyberspace assets that are key to protecting aviation IT infrastructure and highlight the differences and overlaps between IT-OT and Platforms in a military context. In addition, a comprehensive presentation of ways to effectively defend civil and NATO military aviation systems against cyber-attacks will be presented, which is essential to ensure a secure aviation system and address evolving cyber threats.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Paráda István, Tóth András https://folyoirat.ludovika.hu/hadmernok/article/view/7824 From HAIS-Q to SAM: Modernising Security Awareness Measurement 2025-01-14T19:47:27+01:00 Répás József repas.jozsef@uni-nke.hu Berek László berek.laszlo@uni-obuda.hu Bak Gerda bak.gerda@uni-obuda.hu Oláh Norbert olah.norbert@inf.unideb.hu Ujhegyi Péter ujhegyi.peter@uni-obuda.hu <p>Cybersecurity is one of the most critical challenges of our time, requiring continuous evolution and adaptation. As technology evolves exponentially, cyberattacks has become more sophisticated, increasing the threat to individuals and organisations. In this dynamically changing environment, security awareness is crucial, and its measurement is essential to developing effective protection strategies and identifying areas for improvement.</p> <p>Several tools are available to measure security awareness, most notably the HAISQ (Human Aspects of Information Security Questionnaire) model. The present research proposes a new SAM (Security Awareness Model), which builds on the HAISQ model and significantly extends and modernises its approach to measuring security awareness. The SAM examines seven main dimensions: authentication, use of internet services, information management, use of devices, incident management, regulation and human awareness.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Répás József, Berek László, Bak Gerda, Oláh Norbert, Ujhegyi Péter https://folyoirat.ludovika.hu/hadmernok/article/view/7814 Possibilities for Digital Recording and Evaluation of On-Scene Data of a Terrorist Attack by Bombing 2025-01-22T09:00:41+01:00 Volarics József volaricsjozsef@gmail.com <p>The topic of my study is the equipment and methods for recording and evaluating on-scene data of terrorist attacks committed by improvised explosive devices (IEDs), and the possibilities of including them in an integrated system.</p> <p>In the introduction, I define the essential elements of the concept of terrorism according to my criteria using the definitions used by NATO and criminology. I briefly present the methods most frequently used in terrorist attacks using physical force. I summarise the characteristics of terrorist attacks committed by IEDs, the primary tasks following perpetration, and the significance of the data that can be obtained during the investigation.</p> <p>I discuss in detail the investigation tasks from the perspective of the explosive device used, such as documenting its effect and collecting object fragments and material residues. I present the possibilities of digitising visual data while preparing on-scene documentation with the advantages of 3D technology. I discuss in detail the methods of digital evaluation of building damage and the resulting crater about the physical effects caused by the explosion. I will describe the digital devices suitable for detecting the fragments from explosive devices and explosives residues.</p> <p>In the summary, I will outline the possibility of integrated application of the presented technologies and the advantages of applying them as a system.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Volarics József https://folyoirat.ludovika.hu/hadmernok/article/view/7766 New Approaches in the Education of Software Engineers in the Field of Cybersecurity 2025-01-21T08:46:44+01:00 Zlatko Čović chole@vts.su.ac.rs <p>This paper presents innovative methodologies for cybersecurity education, with a focus on their application at Subotica Tech – College of Applied Sciences. The study highlights hackathon-based learning (HBL), challenge-based learning (CBL), and the integration of Artificial Intelligence (AI) tools to enhance teaching effectiveness. These approaches are incorporated into professional courses related to the development of web applications and integrated web systems, emphasising practical work and real-world scenarios to better prepare students for industry challenges. The primary objective of this paper is to introduce these novel educational approaches and provide a detailed description of their implementation, underscoring the importance of hands-on experience and student engagement in real-world systems and business environments. The results of the research on the impact of hackathon participation on final exam performance are presented. Additionally, the increasing use of AI tools in software engineering education is explored, with examples of their application. Finally, the paper outlines future research directions based on feedback from the current implementation of these methodologies.</p> 2025-07-04T00:00:00+02:00 Copyright (c) 2025 Zlatko Čović