Military Engineer https://folyoirat.ludovika.hu/index.php/hadmernok <p>The <strong>Military Engineer</strong> journal is the military technical science thematic publication of the National University of Public Service Faculty of Military Science and Officer Training and Military Technical Doctoral School. The purpose of the journal is to publish researches of academics, PhD and university students about in the field of military engineering sciences and related topics.</p> hu-HU farkas.tibor@uni-nke.hu (Farkas Tibor, főszerkesztő) olah.andrea@uni-nke.hu (Oláh Andrea) Fri, 04 Jul 2025 11:55:14 +0200 OJS 3.3.0.10 http://blogs.law.harvard.edu/tech/rss 60 The Effect of Shelterbelt Forest on Combat Activities: https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7696 <p>Homeland security includes complex preparational measures in forestry. Beyond fundamental forest management objectives, complete afforestation and shelterbelt forests can greatly enhance the defensive potential of exposed areas. Forest plantation can be used to hide manoeuvre tracks, provide concealment and anti-drone cover. The root system of trees has a soil-stabilising effect, which is essential for moving heavy armoury. Foresight is also required in the selection of appropriate tree species, focusing on the maximum trunk diameter available. The logging road network in forest plantations should match with defence plans. Dirt road maintenance should be a joint responsibility of the forest manager, landowner and the Hungarian Defence Forces. </p> Andras Halasz, Dominik Nagy, Mihaly Jancso, Krisztina Varga, Csilla Bojte, Istvan Csizi Copyright (c) 2025 Halász András, Nagy Dominik, Jancsó Mihály, Varga Krisztina, Bojté Csilla, Csízi István https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7696 Fri, 04 Jul 2025 00:00:00 +0200 The Dawn of a New Chapter in India–Africa Relationship https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7827 <p>India has come a long way from being a defence importer to becoming a major defence exporter. As India seeks to increase its own geopolitical clout and counterbalance the growing Chinese influence in the developing world, it is adapting to new avenues for partnership with the developing world. With a wide range of indigenous, cost-effective, and reliable weapons, India is seeking to forge a new chapter of defence export in its relations with various developing countries, especially Africa.</p> <p>While some instances of successes have given a boost to the Indian defence industry and increased its exports, challenges remain with competition from China, Russia, Turkey, the United States, and other Western nations in a growing African defence import market. The paper will explore the recent developments in the Indian defence industry, the trend of current exports to Africa, and the potential opportunities and challenges.</p> Aadi Rajesh Copyright (c) 2025 Aadi Rajesh https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7827 Fri, 04 Jul 2025 00:00:00 +0200 Cybersecurity in Urban Mobility, Focus on E-Scooters, Part 1 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7536 <p>The aim of the study was to thoroughly examine the cybersecurity aspects of electromobility devices, identify potential risks and threats, and explore the relationship between users and the cybersecurity of electric vehicles. In the first part of the study, the author presents the willingness of electromobility device users to adopt the technology, based on a survey conducted using the TAP model. The results of the research highlight that perceptions of cybersecurity risks associated with electromobility devices have a significant impact on the acceptance of these technologies and the use of such vehicles, which is crucial for the future development of electromobility.</p> Harangozó Valentin Copyright (c) 2025 Harangozó Valentin https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7536 Fri, 04 Jul 2025 00:00:00 +0200 Reusable Interoperability Software Components in NATO C2 Systems https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7723 <p>An increasingly important condition for the successful operation of military organisations participating in today’s multinational operations and cooperating with governmental and other (non-governmental) organisations is the interoperability of their systems. The development of NATO military IT systems, implementation and maintenance of their interoperability capabilities is done according to the interoperability requirements of the Federated Mission Networking (FMN) framework. Although development based on reusable software components reduces development time and costs and increases the quality of interoperability capabilities, such components are not available for NATO command and control systems, nor are their issues addressed in military literature.</p> <p>This publication validates the hypothesis that there are interoperability functions included in the NATO FMN requirements that can be implemented in the form of reusable software components, summarises the conceptual foundations of reusable interoperability components, explores their main types, comparing them with related NATO documents, and defines the purpose and main characteristics of each type.</p> Munk Sándor Copyright (c) 2025 Munk Sándor https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7723 Fri, 04 Jul 2025 00:00:00 +0200 5G Passive Sensing in Urban Areas https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7698 <p>The cost-efficiency, decreasing size, rapid deployment, variety of possible illumination sources and low detectability of passive radar solutions make them suitable for a wide range of military and civil applications. A passive radar system detects signals emitted by an illuminator of opportunity and reflected from the target. The potential of 5G technology can make it a remarkable illuminator. The chaotic physical and electromagnetic characteristics of the urban space may require the use of detection-enhancing technologies such as the Internet of Things and artificial intelligence. Based on relevant publications, this paper examines the potential of 5G as an illumination of opportunity for a passive radar ecosystem in an urban environment.</p> Ollári Viktor, Haig Zsolt Copyright (c) 2025 Ollári Viktor, Haig Zsolt https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7698 Fri, 04 Jul 2025 00:00:00 +0200 Evolutionary Analysis of the Elements of NATO’s Cyber Operations Organisations https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7885 <p>At the NATO’s Warsaw Summit in 2016, leaders agreed that cyberspace is a separated domain and that its defence is part of NATO’s collective defence mission. Accordingly, the rethinking of the previously fragmented capabilities and the system of tasks of the organisational elements responsible for managing them began, and the development of action plans necessary for the implementation of tasks. The aim of this publication is to examine the evolutionary elements of NATO’s cyber defence and cyber operations and to analyse what tasks can be identified during national implementation as a result. Obviously, this evolutionary process has not yet been completed, due to the peculiarity of this field, new tasks are constantly appearing even on a daily basis, and these changes also affect the formation of the organisational structure.</p> Pozderka Gábor Copyright (c) 2025 Pozderka Gábor https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7885 Fri, 04 Jul 2025 00:00:00 +0200 What Does Artificial Intelligence Give and Take Away from Us? https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7808 <p>The claim that Artificial Intelligence will change our lives is a bit of a cliché these days. It is changing. But how? Like all the new technologies we start using in our daily lives, as it happened when work processes started to be done by machines instead of by hand power? Or, is what is happening now a change even more profound, a radical change for civilisation as a whole? A change like that brought by the use of fire? The aim of this paper is to go beyond the clichés and provide a deeper, structured analysis of how artificial intelligence (AI) is reshaping our civilisation. To this end, I will use an analytical evaluation method to examine what AI has contributed to people’s well-being, security and sense of security in four main areas of AI application – research, health, transport, data security – and what it has done in the opposite direction. In this study, I want to focus on the impact of the use of AI in education as a key area for the future.</p> Szűcs Attila Copyright (c) 2025 Szűcs Attila https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7808 Fri, 04 Jul 2025 00:00:00 +0200 Opportunities for the Digitalisation of the Chain of Custody https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7870 <p>The chain of custody (CoC) process is essential in the management of forensic evidence, ensuring that the origin, integrity, and handling of evidence can be continuously traced and authenticated. Rapid advances in digitalisation offer opportunities to make traditionally paper-based and manually managed CoC processes more efficient and reliable. The use of digital solutions – such as blockchain technology, RFID chips, and smart contracts – can significantly increase the transparency and reliability of evidence handling, while reducing the risks arising from human error, fraud, or negligence. The aim of this paper is to explore the possibilities for CoC digitisation, with a focus on legal, technological, and data security aspects. The paper also addresses the challenges of implementing a digital CoC, such as compliance with personal data protection regulations and the integration of new systems with existing processes. Overall, digital chain-of-custody solutions can bring significant improvements in the accuracy and speed of evidence management, but their implementation requires thorough legal and technological analysis and preparation.</p> Kreitz Zsuzsanna Copyright (c) 2025 Kreitz Zsuzsanna https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7870 Fri, 04 Jul 2025 00:00:00 +0200 IT Education Curriculum in Hungary and Serbia https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7746 <p>IT has an important role in education, as acquiring user-level IT knowledge is becoming more important nowadays. Several studies deal with the IT education curriculum of Hungary and Serbia. As more and more users are using various smart devices these days, it is becoming more important that they have the right knowledge in this area and that they can use it with the right amount of care to protect their personal data. It is expected that more smart devices will be present in the future and smart device users generally do not know how to use their smart devices safely, many users do not even have basic knowledge. Therefore, it is important for users to be aware of the dangers of using smart devices. This study examines whether information security awareness can be found in the IT education curriculum of Hungary and Serbia, and whether there is a difference between the IT curriculum and password usage habits in the two countries.</p> Mandić Dorottya, Kiss Gábor Copyright (c) 2025 Mandić Dorottya, Kiss Gábor https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7746 Fri, 04 Jul 2025 00:00:00 +0200 Security and Operational Controls for a Public Cloud Service in a Financial Institution https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7782 <p>Today, cloud computing services are growing very fast. One of the main reasons for this is the increasing competition and innovation in the market, the increased demand for resources in IT systems and the demand for more complex knowledge-based solutions. Deploying a server and performing the associated tasks on your own infrastructure can often take weeks or months, while the same process takes only a few minutes with a cloud service provider. The use of cloud services has become commonplace for anyone using mobile devices, and for financial institutions, this technology is becoming inevitable in the short term. If an organisation carefully selects a service provider on the basis of legal, technical and information security criteria, and then monitors its operations on an ongoing basis, there is no reason why a financial institution should not use public cloud services, according to the criteria examined. It is important to stress, however, that our analysis did not cover all possible risk factors.</p> Oláh István, Magyar Sándor Copyright (c) 2025 Oláh István, Magyar Sándor https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7782 Fri, 04 Jul 2025 00:00:00 +0200 Cybersecurity Challenges for NATO Military Air Transport Operations https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7753 <p>The aviation industry's increasing reliance on technology has led to concerns about state-sponsored cyberattacks, which pose cybersecurity challenges for both military and civil aviation. This paper analyses NATO's military air cargo capabilities. It examines relevant civil aviation cyberattacks as case studies in light of potential cyber threats to NATO military aviation. Summarising these findings, the authors conclude their implications. They then use an analytical-evaluative method to identify categories of cyberspace assets that are key to protecting aviation IT infrastructure and highlight the differences and overlaps between IT-OT and Platforms in a military context. In addition, a comprehensive presentation of ways to effectively defend civil and NATO military aviation systems against cyber-attacks will be presented, which is essential to ensure a secure aviation system and address evolving cyber threats.</p> Paráda István, Tóth András Copyright (c) 2025 Paráda István, Tóth András https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7753 Fri, 04 Jul 2025 00:00:00 +0200 From HAIS-Q to SAM: Modernising Security Awareness Measurement https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7824 <p>Cybersecurity is one of the most critical challenges of our time, requiring continuous evolution and adaptation. As technology evolves exponentially, cyberattacks has become more sophisticated, increasing the threat to individuals and organisations. In this dynamically changing environment, security awareness is crucial, and its measurement is essential to developing effective protection strategies and identifying areas for improvement.</p> <p>Several tools are available to measure security awareness, most notably the HAISQ (Human Aspects of Information Security Questionnaire) model. The present research proposes a new SAM (Security Awareness Model), which builds on the HAISQ model and significantly extends and modernises its approach to measuring security awareness. The SAM examines seven main dimensions: authentication, use of internet services, information management, use of devices, incident management, regulation and human awareness.</p> Répás József, Berek László, Bak Gerda, Oláh Norbert, Ujhegyi Péter Copyright (c) 2025 Répás József, Berek László, Bak Gerda, Oláh Norbert, Ujhegyi Péter https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7824 Fri, 04 Jul 2025 00:00:00 +0200 Possibilities for Digital Recording and Evaluation of On-Scene Data of a Terrorist Attack by Bombing https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7814 <p>The topic of my study is the equipment and methods for recording and evaluating on-scene data of terrorist attacks committed by improvised explosive devices (IEDs), and the possibilities of including them in an integrated system.</p> <p>In the introduction, I define the essential elements of the concept of terrorism according to my criteria using the definitions used by NATO and criminology. I briefly present the methods most frequently used in terrorist attacks using physical force. I summarise the characteristics of terrorist attacks committed by IEDs, the primary tasks following perpetration, and the significance of the data that can be obtained during the investigation.</p> <p>I discuss in detail the investigation tasks from the perspective of the explosive device used, such as documenting its effect and collecting object fragments and material residues. I present the possibilities of digitising visual data while preparing on-scene documentation with the advantages of 3D technology. I discuss in detail the methods of digital evaluation of building damage and the resulting crater about the physical effects caused by the explosion. I will describe the digital devices suitable for detecting the fragments from explosive devices and explosives residues.</p> <p>In the summary, I will outline the possibility of integrated application of the presented technologies and the advantages of applying them as a system.</p> Volarics József Copyright (c) 2025 Volarics József https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7814 Fri, 04 Jul 2025 00:00:00 +0200 New Approaches in the Education of Software Engineers in the Field of Cybersecurity https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7766 <p>This paper presents innovative methodologies for cybersecurity education, with a focus on their application at Subotica Tech – College of Applied Sciences. The study highlights hackathon-based learning (HBL), challenge-based learning (CBL), and the integration of Artificial Intelligence (AI) tools to enhance teaching effectiveness. These approaches are incorporated into professional courses related to the development of web applications and integrated web systems, emphasising practical work and real-world scenarios to better prepare students for industry challenges. The primary objective of this paper is to introduce these novel educational approaches and provide a detailed description of their implementation, underscoring the importance of hands-on experience and student engagement in real-world systems and business environments. The results of the research on the impact of hackathon participation on final exam performance are presented. Additionally, the increasing use of AI tools in software engineering education is explored, with examples of their application. Finally, the paper outlines future research directions based on feedback from the current implementation of these methodologies.</p> Zlatko Čović Copyright (c) 2025 Zlatko Čović https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7766 Fri, 04 Jul 2025 00:00:00 +0200 Assessment of Operator’s Safety Management Practices for the Firewater Pollution Prevention in Logistics Warehouses https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7689 <p>The industrial accidents occurred at logistics facilities used for the storage of dangerous goods, as a result of contaminated water generated during fires can cause major environment consequences to the surface and ground waters. In this study, the authors assess the experience of operators’ safety organisation practices of logistics warehouses in the field of firewater pollution prevention.</p> Kátai-Urbán Maxim, Szakál Béla, Cimer Zsolt Copyright (c) 2025 Kátai-Urbán Maxim, Szakál Béla, Cimer Zsolt https://creativecommons.org/licenses/by-nc-nd/4.0 https://folyoirat.ludovika.hu/index.php/hadmernok/article/view/7689 Fri, 04 Jul 2025 00:00:00 +0200