Teljes szám
Katonai műszaki infrastruktúra
A STANAG 2021 szerinti katonai járműteherosztályok a polgári hídszabályzatok tükrében
The load classification of military vehicles and bridges shall be carried out according to the STANAG 2021. A related task is the military load classification of existing civil bridges. A quick method for classification could be the development of conversion procedures. This work requires a precise knowledge of the ideal vehicles according to STANAG 2021, a detailed analysis of their parameters and the identification of details that differ from the civil design codes.
" ["hu_HU"]=> string(478) "A katonai járművek és hidak teherbírási besorolási rendszerét a STANAG 2021 szabvány szerint kell végezni. Ehhez kapcsolódó feladat a meglévő polgári hidak katonai teherbírási besorolása. A besorolás gyors módszere lehet konverziós eljárások kidolgozása. A munkához szükséges a STANAG 2021 szerinti ideális járművek pontos ismerete, ezek paramétereinek részletes elemzése és a polgári szabályozástól eltérő részletek azonosítása.
" } ["title"]=> array(2) { ["en_US"]=> string(95) "Military Vehicle Classes According to the STANAG 2021 in the Light of Civil Bridge Design Codes" ["hu_HU"]=> string(93) "A STANAG 2021 szerinti katonai járműteherosztályok a polgári hídszabályzatok tükrében" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(12) "Hajós Bence" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#730 (6) { ["_data"]=> array(15) { ["id"]=> int(9209) ["email"]=> string(26) "elsolanchid@elsolanchid.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7368) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0008-8621-470X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(45) "a:1:{s:5:"hu_HU";s:19:"Első Lánchíd Bt.";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Hajós" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Bence" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(11) "STANAG 2021" [1]=> string(4) "híd" [2]=> string(13) "hdszabályzat" [3]=> string(12) "teherbírás" [4]=> string(11) "méretezés" } ["en_US"]=> array(5) { [0]=> string(11) "STANAG 2021" [1]=> string(6) "bridge" [2]=> string(11) "bridge code" [3]=> string(13) "load capacity" [4]=> string(18) "static calculation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#776 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35594) ["id"]=> int(6000) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7368) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Bepattanó kötések helye, szerepe, valamint 3D-nyomtatási technikával történő előállításának lehetősége a haditechnikában
As technology evolves, so does the range of materials used. In automotive engineering, plastic parts are becoming more and more common, which then have to be fixed to each other or to other materials in some way. A wide range of fasteners and bonding methods ensure that elements can be fastened together in a releasable or non-releasable manner. Snap-fit fasteners are known to everyone, as many of their embodiments can be found in households, e.g. battery compartment cover for remote controls, quick fasteners or bag and belt buckles. As the use of plastic parts in the automotive industry spreads, snap-in joints are also spreading and developing. The article describes and explains the different fastening methods, their main characteristics and their placement and role of snap-fit among these fastening methods. 3D printing is increasingly taking its place in the production of parts for military equipment. This article examines the possibilities of producing snap-in joints using 3D printing.
" ["hu_HU"]=> string(1164) "A technika fejlődésével együtt jár az alkalmazott anyagok körének változása is. A gépjárműtechnikában egyre jobban elterjedtek a műanyag alkatrészek, amelyeket valamilyen módon egymáshoz vagy más anyagból készült elemekhez kell rögzíteni. A kötőelemek és kötési módok széleskörűsége biztosítja, hogy az elemeket oldhatóan vagy oldhatatlan módon kössük egymáshoz. A bepattanó kötések ismertek mindenki számára, mivel sok megvalósulási formája a háztartásokban is megtalálható, például a távirányító elemtartójának fedele, gyorskötöző vagy pedig táska- és övcsat. A gépjárműtechnikában a műanyag alkatrészek elterjedésével párhuzamosan a bepattanó kötések is terjednek és fejlődnek. A cikk ismerteti és bemutatja a különböző kötési módokat, főbb jellemzőiket és ezen kötésmódok között a bepattanó kötések helyét és szerepét. A 3D-nyomtatás mind nagyobb mértékben van jelen az alkatrész előállításban a haditechnikai eszközök vonatkozásában is. A cikk megvizsgálja a 3D-nyomtatással készült bepattanó kötések előállítási lehetőségeit.
" } ["title"]=> array(2) { ["en_US"]=> string(91) "The Place, Role and Possibilities of 3D Printing of Snap-on Bindings in Military Technology" ["hu_HU"]=> string(136) "Bepattanó kötések helye, szerepe, valamint 3D-nyomtatási technikával történő előállításának lehetősége a haditechnikában" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(77) "Vég Róbert, Kálmán Dénes, Daruka Norbert, Kovács Zoltán, Ember István" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(5) { [0]=> object(Author)#794 (6) { ["_data"]=> array(15) { ["id"]=> int(9297) ["email"]=> string(22) "vegh.robert@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9786-6702" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(4) "Vég" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Róbert" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#795 (6) { ["_data"]=> array(15) { ["id"]=> int(9298) ["email"]=> string(27) "denes.kalman.1975@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-2951-7172" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Kálmán" ["hu_HU"]=> string(8) "Kálmán" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Dénes" ["hu_HU"]=> string(6) "Dénes" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#791 (6) { ["_data"]=> array(15) { ["id"]=> int(9299) ["email"]=> string(22) "daruka.norbi@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7102-1787" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Daruka" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Norbert" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [3]=> object(Author)#786 (6) { ["_data"]=> array(15) { ["id"]=> int(9296) ["email"]=> string(24) "kovacs.zoltan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-9098-1997" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(37) "National University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kovács" ["hu_HU"]=> string(7) "Kovács" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [4]=> object(Author)#784 (6) { ["_data"]=> array(15) { ["id"]=> int(9300) ["email"]=> string(23) "ember.istvan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9877-0366" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Ember" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(13) "3D nyomtatás" [1]=> string(18) "erőzáró kötés" [2]=> string(18) "alakzáró kötés" [3]=> string(18) "bepattanó kötés" } ["en_US"]=> array(4) { [0]=> string(11) "3D printing" [1]=> string(19) "force-locking joint" [2]=> string(18) "form-locking joint" [3]=> string(15) "snap-on binding" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#788 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35595) ["id"]=> int(6001) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7428) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Környezetbiztonság, ABV- és katasztrófavédelem
Possibilities for Improving the Technical Equipment of Disaster Management Mobile Command Points
The use of disaster management command centres is typically implemented in a static way, however, the experiences of the past period have shown that for their effective operation, it is necessary to use solutions that enable the monitoring of events, as well as rapid relocation and deployment. An obvious solution for creating the aforementioned capabilities is the use of mobile command centres to support driving groups. Currently, the professional disaster management organisation has several devices that can be used as mobile command points, but their capacity does not allow the work of larger teams. The purpose of this thesis is to examine capabilities, with the implementation of which both the capacity of the disaster management organisation and the effectiveness of the interventions can be increased, taking into account domestic and international development trends.
" } ["title"]=> array(1) { ["en_US"]=> string(96) "Possibilities for Improving the Technical Equipment of Disaster Management Mobile Command Points" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(61) "Győző-Molnár Árpád, Kátai-Urbán Lajos, Bleszity János" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#755 (6) { ["_data"]=> array(14) { ["id"]=> int(9135) ["email"]=> string(25) "arpad.gyozo@katved.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7314) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-2046-8658" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(98) "Békés County Directorate for Disaster Management, Disaster Management Branch Office of Orosháza" ["hu_HU"]=> string(95) "Békés Megyei Katasztrófavédelmi Igazgatóság, Orosházi Katasztrófavédelmi Kirendeltség" } ["biography"]=> array(2) { ["en_US"]=> string(33) "civil protection inspector
" ["hu_HU"]=> string(36) "polgári védelmi felügyelő
" } ["familyName"]=> array(2) { ["en_US"]=> string(15) "Győző-Molnár" ["hu_HU"]=> string(15) "Győző-Molnár" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Árpád" ["hu_HU"]=> string(7) "Árpád" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#779 (6) { ["_data"]=> array(15) { ["id"]=> int(9136) ["email"]=> string(22) "Katai.Lajos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7314) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9035-2450" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(86) "Nemzeti Közszolgálati Egyetem Rendészettudományi Kar Katasztrófavédelmi Intézet" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(13) "Kátai-Urbán" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Lajos" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#780 (6) { ["_data"]=> array(15) { ["id"]=> int(9137) ["email"]=> string(25) "Bleszity.Janos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7314) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-6803-3154" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(86) "Nemzeti Közszolgálati Egyetem Rendészettudományi Kar Katasztrófavédelmi Intézet" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Bleszity" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(19) "disaster management" [1]=> string(22) "mobile command centers" [2]=> string(11) "development" [3]=> string(19) "technical equipment" [4]=> string(7) "Hungary" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#757 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35596) ["id"]=> int(6002) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7314) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Védelmi elektronika, informatika, kommunikáció
Empirical Studies of Russian– Ukrainian War Related Fake News – Part 2
The Russian–Ukrainian war, which broke out on 24 February 2022, resulted in several paradigm shifts in cyberwarfare. One aspect of these changes is psychological operations. Russia and Ukraine have conducted extensive psychological operations campaigns to fulfil their war aims, which have since been intense along modified objectives. This series of studies examines the impact of war-related fake news through various empirical research. In the first part of the paper, the authors read the emergence of psychological operations and related terms in the international academic literature using network analysis methodology. In the second part of the paper, the authors use sentiment and network analysis to investigate the spread of different fake news. In the third study, the authors measure the attitudes toward the perception of the Hungarian Defence Forces from the perspective of the war in the neighbouring country.
" ["hu_HU"]=> string(933) "The Russian–Ukrainian war, which broke out on 24 February 2022, resulted in several paradigm shifts in cyberwarfare. One aspect of these changes is psychological operations. Russia and Ukraine have conducted extensive psychological operations campaigns to fulfil their war aims, which have since been intense along modified objectives. This series of studies examines the impact of war-related fake news through various empirical research. In the first part of the paper, the authors read the emergence of psychological operations and related terms in the international academic literature using network analysis methodology. In the second part of the paper, the authors use sentiment and network analysis to investigate the spread of different fake news. In the third study, the authors measure the attitudes toward the perception of the Hungarian Defence Forces from the perspective of the war in the neighbouring country.
" } ["title"]=> array(2) { ["en_US"]=> string(74) "Empirical Studies of Russian– Ukrainian War Related Fake News – Part 2" ["hu_HU"]=> string(74) "Empirical Studies of Russian– Ukrainian War Related Fake News – Part 2" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(62) "Bányász Péter, Dub Máté, Kugler Péter, Ináncsi Mátyás" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(4) { [0]=> object(Author)#746 (6) { ["_data"]=> array(15) { ["id"]=> int(8810) ["email"]=> string(24) "banyasz.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7308-9304" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(28) "University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(9) "Bányász" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#729 (6) { ["_data"]=> array(15) { ["id"]=> int(8812) ["email"]=> string(19) "dub.mate@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-9036-4112" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(28) "University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(3) "Dub" ["hu_HU"]=> string(3) "Dub" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Máté" ["hu_HU"]=> string(6) "Máté" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#723 (6) { ["_data"]=> array(15) { ["id"]=> int(8811) ["email"]=> string(26) "kugler.peti@protonmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7265-6736" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Kugler" ["hu_HU"]=> string(6) "Kugler" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [3]=> object(Author)#722 (6) { ["_data"]=> array(15) { ["id"]=> int(8809) ["email"]=> string(25) "inancsi.matyas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-6017-3921" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(32) "a:1:{s:5:"hu_HU";s:7:"NKE-HHK";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(8) "Ináncsi" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(8) "Mátyás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(22) "Russian- Ukraninan war" [1]=> string(6) "PSYOPS" [2]=> string(12) "Cyberwarfare" [3]=> string(16) "Network analysis" [4]=> string(18) "Sentiment analysis" } ["en_US"]=> array(5) { [0]=> string(22) "Russian- Ukraninan war" [1]=> string(6) "PSYOPS" [2]=> string(12) "Cyberwarfare" [3]=> string(16) "Network analysis" [4]=> string(18) "Sentiment analysis" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#760 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35597) ["id"]=> int(6003) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7101) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }No Drone’s Sky: Full Spectrum Drone Surveillance and Neutralisation Concept for Enhanced Counter-UAS Framework (Part 1, Surveillance)
Unmanned Aircraft Systems (UAS), commonly known as drones, have witnessed substantial global proliferation in the past decade. Their constructive applications hold the promise of being a useful, yet critical component in creating a more efficient society with the enhancement of safety, efficiency, and facilitating advancements in various domains, ultimately contributing to our modern daily lives. However, the escalating dependence on computer and communication technologies renders, especially small, UAS susceptible to various threats, posing risks to public safety, national security, and individual privacy. Addressing these concerns necessitates the development of innovative technologies designed to detect, track, identify, and eliminate UAS in a manner that upholds safety, security, and privacy. A Counter-Unmanned Aircraft System (C-UAS) is defined as a system or apparatus capable of legally and securely incapacitating, disrupting, or assuming control over an UAS. Recent years have witnessed significant research endeavours aimed at detecting and eliminate drone threats. Detection methodologies encompass acoustic, visual, passive radio frequency, radar, and data fusion techniques, while neutralisation strategies encompass physical capture and jamming approaches. This paper, delving into the realm of small drone surveillance, is the opening segment of a three-part series aims to envision a C-UAS framework; it provides an exhaustive review of existing literature in the domain of UAS surveillance, delineating the challenges associated with countering unauthorised or unsafe drone operations, and evaluating the trajectory of detection to prepare against UAS-induced threats. Therefore, the fundamental objective of this paper is to offer a comprehensive surveillance baseline for a structured vision to a C-UAS framework, thus fostering a research community dedicated to the secure integration of drones into the airspace system.
" } ["subtitle"]=> array(1) { ["en_US"]=> string(22) "(Part 1, Surveillance)" } ["title"]=> array(1) { ["en_US"]=> string(112) "No Drone’s Sky: Full Spectrum Drone Surveillance and Neutralisation Concept for Enhanced Counter-UAS Framework" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(15) "Horváth Gábor" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#781 (6) { ["_data"]=> array(14) { ["id"]=> int(9176) ["email"]=> string(20) "ghorvath87@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7345) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-2939-1426" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(39) "HUN MoD State Aviation Department (MAA)" ["hu_HU"]=> string(32) "HM Állami Légügyi Főosztály" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(41) "főtiszt / Senior ATM Officer
" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Horváth" ["hu_HU"]=> string(8) "Horváth" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(10) "anti-drone" [1]=> string(11) "counter-uas" [2]=> string(13) "drone sensing" [3]=> string(20) "drone neutralization" [4]=> string(18) "drone surveillance" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#778 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35598) ["id"]=> int(6004) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7345) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Kiberbiztonsági kihívások a légi közlekedésben – Kronológiai folyamat a Boeing elleni kibertámadások tükrében
In this article, the authors present an information subsystem of air transport, its IT solution, as well as its potential cyber threats and risks. To this end, the authors determine certain IT components of air transport with particular regard to communication, data link, and onboard flight systems, such as the so-called electronic flight bags (EFB), which have special significance due to cyber incidents. Following this, the authors describe the cyber
attacks that occurred recently at Boeing, including their chronological order, and then, by summarising all these, they inductively draw logical conclusions about their impacts, as well as about new forms of response against the attacks.
Jelen cikkben a szerzők bemutatják a légi közlekedés egyik információs alrendszerét, informatikai megoldását, valamint annak potenciális kibertéri veszélyeit és kockázatait. Ehhez a szerzők egy elemző-értékelő módszerrel meghatározzák a légi közlekedés bizonyos informatikai elemeit, elsősorban a kommunikációs, adatkapcsolati és fedélzeti repülési rendszereket, például az úgynevezett electronic flight bag-eket (EFB), amelyek kiberincidensek következtében kiemelt jelentőségűek. Ezt követően a szerzők ismertetik a Boeing vállalatnál a közelmúltban bekövetkezett kibertámadásokat, illetve azok kronológiai sorrendjét, majd mindezeket összegezve logikai következtetéseket vonnak le azok hatásairól, illetve a támadás elleni fellépések újabb formájáról.
" } ["subtitle"]=> array(2) { ["en_US"]=> string(43) "– Timeline of Cyber Crimes against Boeing" ["hu_HU"]=> string(69) "– Kronológiai folyamat a Boeing elleni kibertámadások tükrében" } ["title"]=> array(2) { ["en_US"]=> string(32) "Cybersecurity Issues in Aviation" ["hu_HU"]=> string(52) "Kiberbiztonsági kihívások a légi közlekedésben" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(45) "Hunorfi Péter, Paráda István, Farkas Tibor" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(3) { [0]=> object(Author)#792 (6) { ["_data"]=> array(15) { ["id"]=> int(9230) ["email"]=> string(30) "hunorfi.peter@phd.uni-obuda.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7382) ["seq"]=> int(3) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0000-3578-1909" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(15) "Óbudai Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(19) "Doktorandusz
" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Hunorfi" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(14) "Hunorfi Péter" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#803 (6) { ["_data"]=> array(15) { ["id"]=> int(9232) ["email"]=> string(22) "paradaistvan@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7382) ["seq"]=> int(3) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-3083-6015" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Paráda" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#787 (6) { ["_data"]=> array(15) { ["id"]=> int(9231) ["email"]=> string(29) "farkas.tibor@bgk.uni-obuda.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7382) ["seq"]=> int(3) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-8868-9628" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(15) "Óbudai Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(22) "egyetemi docens
" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Farkas" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Tibor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(17) "légiközlekedés" [1]=> string(3) "EFB" [2]=> string(6) "NOTAMS" [3]=> string(6) "Boeing" [4]=> string(13) "Kibervédelem" [5]=> string(10) "Ransomware" } ["en_US"]=> array(6) { [0]=> string(8) "aviation" [1]=> string(3) "EFB" [2]=> string(6) "NOTAMS" [3]=> string(6) "Boeing" [4]=> string(13) "Cyber Defence" [5]=> string(10) "Ransomware" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#802 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35599) ["id"]=> int(6005) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7382) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Emerging Challenges and New Responses, Building Capabilities to Counter Threats in Cyberspace Questions and Answers on How to Improve Cybersecurity
Cyberspace phenomena are changing rapidly at international and national levels. Growing threats, new vulnerabilities and protection against them require continuous action at the level of the EU, NATO and national competent authorities and organisations. Adequate protection of critical infrastructure and cyberspace is a vital strategic, operational and technical challenge for the EU, NATO and therefore nations. Cross-border impacts, threat actors and malicious actions require coordination of international and national procedures, mechanisms and cooperation. This article presents the most important phenomena and trends experienced today, as well as EU and NATO initiatives and requirements at the strategic level, illustrating what changes can be expected in cybersecurity.
" } ["subtitle"]=> array(1) { ["en_US"]=> string(53) "Questions and Answers on How to Improve Cybersecurity" } ["title"]=> array(1) { ["en_US"]=> string(93) "Emerging Challenges and New Responses, Building Capabilities to Counter Threats in Cyberspace" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Kassai Károly" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#807 (6) { ["_data"]=> array(15) { ["id"]=> int(9261) ["email"]=> string(23) "karoly.kassai@yahoo.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7402) ["seq"]=> int(4) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0009-9398-6158" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(28) "a:1:{s:5:"hu_HU";s:3:"HVK";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Kassai" ["hu_HU"]=> string(6) "Kassai" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Károly" ["hu_HU"]=> string(7) "Károly" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(14) "cyber security" [1]=> string(34) "critical infrastructure protection" [2]=> string(12) "cyber threat" [3]=> string(13) "vulnerability" [4]=> string(20) "security requirement" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#805 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35600) ["id"]=> int(6006) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7402) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Észak-Korea kiberképességei az északkelet-ázsiai régió műveleti környezetében
The paper discusses the organisational structure of cyber capabilities and a hypothetical cyber warfare strategy of the Democratic People’s Republic of Korea (hereinafter referred to as the DPRK or North Korea). It aims to provide a holistic view of North Korean offensive cyberspace activities in the context of security policy in the Northeast Asian region, with a particular focus on the risks posed by strategic cooperation with the People’s Republic of China. The research was based on secondary data collection through analysis of academic literature, press reports and publicly available case studies.
" ["hu_HU"]=> string(652) "A tanulmány bemutatja a Koreai Népi Demokratikus Köztársaság (továbbiakban KNDK vagy Észak-Korea) kiberképességeinek szervezeti felépítését és feltételezhető kiberhadviselési stratégiáját. A kutatás célja, hogy átfogó képet adjon Észak-Korea offenzív kibertéri tevékenységének biztonságpolitikai összefüggéseiről az északkeletázsiai régió vonatkozásában, különös tekintettel a Kínai Népköztársasággal történő stratégiai együttműködés jelentette kockázatokra. A kutatás szekunder adatgyűjtésre épült a rendelkezésre álló szakirodalom, sajtóhírek és esetpéldák elemzésével.
" } ["title"]=> array(2) { ["en_US"]=> string(92) "North Korean Cyber Capabilities in the Operational Environment of the Northeast Asian Region" ["hu_HU"]=> string(87) "Észak-Korea kiberképességei az északkelet-ázsiai régió műveleti környezetében" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Lendvai Tünde" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#809 (6) { ["_data"]=> array(15) { ["id"]=> int(9148) ["email"]=> string(29) "lendvai.tunde.tunde@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7322) ["seq"]=> int(5) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-3934-667X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(28) "a:1:{s:5:"hu_HU";s:3:"NKE";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Lendvai" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Tünde" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(12) "Észak-Korea" [1]=> string(15) "kiberműveletek" [2]=> string(15) "kiberstratégia" [3]=> string(4) "KNDK" [4]=> string(16) "kiberhadviselés" } ["en_US"]=> array(5) { [0]=> string(11) "North Korea" [1]=> string(4) "DPRK" [2]=> string(16) "cyber operations" [3]=> string(14) "cyber strategy" [4]=> string(12) "cyberwarfare" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#810 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35601) ["id"]=> int(6007) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7322) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }Fórum
Coups, Regional Security Complexes and the Impact of Nigeria’s Peacekeeping in West Africa, 1960– 2022
Over the years, Africa has continued to experience conflicts caused by civil wars and the tussle for power through military coups. Despite having the Mediation & Security Council within ECOWAS, it has been unable to create sustainable peace within the region. The many porous borders between the countries further exacerbate the complexities of its regional security. The consequences of these problems usually affect neighbouring countries, thereby resulting in regional security complexes and the consequent challenges of peacekeeping operations. This paper uses historical, descriptive and comparative analysis by focusing on coups as precursors to security challenges in the region of West Africa and the resulting peacekeeping operations by countries such as Nigeria. Based on the premise of ECOWAS, it introduces some conflicts caused by coups; the challenges of Regional Security Complex in West Africa and the examination of Nigerian Peacekeeping efforts. Furthermore, it offers some recommendations towards sustainable regional peace. Results show that there is a need for the African Union (AU) to do more to secure the continent. Reliance on non-African countries to support its internal security problems has become counterproductive. It recommends that Nigeria should temporarily suspend its peacekeeping operations and channel its resources towards addressing its internal security challenges; that the AU must establish a standing army as a quick response force to address the various continental crises before they become exponential threats and that ECOWAS should implement its common currency plan. Finally, the African Union must develop best practices that can alleviate poverty and guarantee security in line with the 17 UN Sustainable Development Goals.
" } ["title"]=> array(1) { ["en_US"]=> string(106) "Coups, Regional Security Complexes and the Impact of Nigeria’s Peacekeeping in West Africa, 1960– 2022" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(25) "Frederick Omoyama Odorige" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#777 (6) { ["_data"]=> array(15) { ["id"]=> int(9193) ["email"]=> string(20) "fodorige@hotmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7354) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0004-3435-3602" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(63) "a:1:{s:5:"hu_HU";s:37:"National University of Public Service";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(17) "Frederick Omoyama" ["hu_HU"]=> string(17) "Frederick Omoyama" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Odorige" ["hu_HU"]=> string(7) "Odorige" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(7) "Nigeria" [1]=> string(6) "ECOWAS" [2]=> string(16) "security complex" [3]=> string(12) "peacekeeping" [4]=> string(6) "region" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#783 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35602) ["id"]=> int(6008) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7354) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }