Teljes szám

Katonai műszaki infrastruktúra

object(Publication)#118 (6) { ["_data"]=> array(28) { ["id"]=> int(7368) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:35" ["primaryContactId"]=> int(9209) ["sectionId"]=> int(54) ["seq"]=> int(1) ["submissionId"]=> int(7244) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(3962) "- 33.034/1910 K.M. rendelet: Szabályrendelet a közúti hidak tervezéséről, forgalomba helyezéséről, próbaterheléséről és időszakos megvizsgálásáról (Közúti hídszabályzat). Online: https://hidak.hu/konyvek/KHSZ1910.pdf AEP-3.12.1.5 NATO Standard Military Load Classification of Bridges, Ferries, Rafts and Vehicles. Edition A Version 1, September 2017. e-UT 07.01.12:2011 Erőtani számítás, Közúti hidak tervezése (KHT) 2. Útügyi Műszaki Előírás. Online: https://ume.kozut.hu/dokumentum/205 STANAG 2021 Standardization Agreement, Military Load Classification of Bridges, Ferries, Rafts and Vehicles. Edition 8, 14 September 2018 NSO/1074(2017)MILENG/2021. ARNDT, Rob [é. n.]: Panzerkampfwagen VIII Maus (1943–1945). Online: https://web.archive.org/web/20130629194425/http://strangevehicles.greyfalcon.us/PANZERKAMPFWAGEN%20VIII%20MAUS.htm BARTUS Róbert – KŐVÁRI Ákos Róbert – NÉMETH Gábor (2023): Észrevételek és javaslatok a készülő új e-UT 07.01.12 közúti hidak erőtani számítása – Útügyi Műszaki Előíráshoz. Útügyi Lapok, 11(18), 1–19. Online: https://doi.org/10.36246/UL.2023.2.01 DEÁK Ferenc – HAVASI Zoltán – NAGY Zsolt (2001): A magyar katonai hídszabályzat kidolgozásának története és a vonatkozó NATO STANAG rövid bemutatása. Közúti és Mélyépítési Szemle, 51(5), 180–186. FARKAS Zoltán (2020): Új típusú nehézgépszállító szerelvények. Haditechnika, 54(5), 62–69. Online: https://doi.org/10.23713/HT.54.5.13 GULYÁS András (2002): Az érvényben lévő hídtervezési előírások és a hidak terhelési osztályba sorolása a STANAG 2021 szerint. Műszaki Katonai Közlöny, 12(1–2), 53–68. Online: https://folyoirat.ludovika.hu/index.php/mkk/article/view/3181/2428 GULYÁS András (2003): STANAG 2021 bevezetésének feladatai az országos konferencia tapasztalatai alapján. Műszaki Katonai Közlöny, 13(1–4), 125–133. Online: https://folyoirat.ludovika.hu/index.php/mkk/article/view/3086/2337 GULYÁS András – HAVASI Zoltán (2003): Hidak terhelési osztályba sorolása. Műszaki Katonai Közlöny, 13(1–4), 105–124. Online: https://folyoirat.ludovika.hu/index.php/mkk/article/view/3085/2336 GULYÁS András (2009): Új építési technológiák alkalmazása a Magyar Honvédség béketámogató műveletei katonai építési gyakorlatában. PhD-disszertáció. Zrínyi Miklós Nemzetvédelmi Egyetem, Katonai Műszaki Doktori Iskola. Online: https://tudasportal.uni-nke.hu/xmlui/handle/20.500.12944/12155 HAJÓS Bence (2023): Szempontok és javaslatok a közúti hídtervezés hasznos ideális jármű teherszintjének meghatározásához a készülő új Útügyi Műszaki Előírásban, Útügyi Lapok, 11(18), 30–43. Online: https://doi.org/10.36246/UL.2023.2.03 HAJÓS Bence (2024): Paradigmaváltás a közúti hídtervezésben a hasznos járműterhek vonatkozásában. Katonai alapterhek helyett polgári járműterhek bevezetéséről. Műszaki Katonai Közlöny, megjelenés alatt. HAVASI Zoltán (2007): A Magyar Honvédség ideiglenes hídhelyreállítási képességeinek, lehetőségeinek vizsgálata. PhD-disszertáció. Zrínyi Miklós Nemzetvédelmi Egyetem, Hadtudományi Doktori Iskola. Online: http://hdl.handle.net/20.500.12944/12072 LUKÁCS László (2003): Hidak terhelési osztályba sorolása – országos konferencia. Műszaki Katonai Közlöny, 13(1–4), 103–104. Online: https://folyoirat.ludovika.hu/index.php/mkk/article/view/3084/2335 POLÓNYI Tibor (2018): A közúti és vasúti hidak teherbírásának számítása és osztályozása katonai módszerekkel és az ilyen irányú fejlesztések jelenlegi helyzete. Seregszemle, 16(3–4), 46–56. Online: https://honvedelem.hu/files/files/116326/seregszemle_2018_34.pdf TÓTH András (2022): A Leopard harckocsi magyar típusváltozata: a Leopard 2A7HU. Haditechnika, 56(6), 27–32. Online: https://doi.org/10.23713/HT.56.6.05" ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(4) "5-20" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.1" ["abstract"]=> array(2) { ["en_US"]=> string(479) "

The load classification of military vehicles and bridges shall be carried out according to the STANAG 2021. A related task is the military load classification of existing civil bridges. A quick method for classification could be the development of conversion procedures. This work requires a precise knowledge of the ideal vehicles according to STANAG 2021, a detailed analysis of their parameters and the identification of details that differ from the civil design codes.

" ["hu_HU"]=> string(478) "

A katonai járművek és hidak teherbírási besorolási rendszerét a STANAG 2021 szabvány szerint kell végezni. Ehhez kapcsolódó feladat a meglévő polgári hidak katonai teherbírási besorolása. A besorolás gyors módszere lehet konverziós eljárások kidolgozása. A munkához szükséges a STANAG 2021 szerinti ideális járművek pontos ismerete, ezek paramétereinek részletes elemzése és a polgári szabályozástól eltérő részletek azonosítása.

" } ["title"]=> array(2) { ["en_US"]=> string(95) "Military Vehicle Classes According to the STANAG 2021 in the Light of Civil Bridge Design Codes" ["hu_HU"]=> string(93) "A STANAG 2021 szerinti katonai járműteherosztályok a polgári hídszabályzatok tükrében" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(12) "Hajós Bence" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#730 (6) { ["_data"]=> array(15) { ["id"]=> int(9209) ["email"]=> string(26) "elsolanchid@elsolanchid.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7368) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0008-8621-470X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(45) "a:1:{s:5:"hu_HU";s:19:"Első Lánchíd Bt.";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Hajós" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Bence" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(11) "STANAG 2021" [1]=> string(4) "híd" [2]=> string(13) "hdszabályzat" [3]=> string(12) "teherbírás" [4]=> string(11) "méretezés" } ["en_US"]=> array(5) { [0]=> string(11) "STANAG 2021" [1]=> string(6) "bridge" [2]=> string(11) "bridge code" [3]=> string(13) "load capacity" [4]=> string(18) "static calculation" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#776 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35594) ["id"]=> int(6000) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7368) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#119 (6) { ["_data"]=> array(28) { ["id"]=> int(7428) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:34" ["primaryContactId"]=> int(9296) ["sectionId"]=> int(54) ["seq"]=> int(2) ["submissionId"]=> int(7304) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(2437) "BASF Corporation (2007): Snap-Fit Design Manual. BONENBERGER, Paul R. (2016): The First Snap-Fit Handbook. Creating and Managing Attachments for Plastics Parts. München: Carl Hanser Verlag. Online: https://doi.org/10.3139/9781569905968 Böllhoff Group [é. n.]: SNAPLOC®. Online: https://www.boellhoff.com/hu-hu/termekek/kueloenleges-koetoelemek/snaploc-rezges-es-zajmentesito-dugaszolhato-oesszekoettetes/ FAZEKAS Lajos (2013): Válogatott fejezetek a gépészeti alapismeretekből. Budapest: TERC Kft. GÁL Bence – NÉMETH András (2019): Additív gyártástechnológiák katonai alkalmazásának vizsgálata, különös tekintettel a katonai elektronika területére. Hadmérnök, 14(1), 231–249. Online: https://doi.org/10.32567/hm.2019.1.19 GÁVAY György Viktor (2023): Logisztikai járművek alkatrészpótlása 3D nyomtatási technológia alkalmazásával. Katonai Logisztika, 31(3–4), 208–232. Online: https://doi.org/10.30583/2023-3-4-208 GYARMATI József (2023): Lánctalpas jármű kormányzása és ennek 3D modellezése. Műszaki Katonai Közlöny, 33(3), 51–61. Online: https://doi.org/10.32562/mkk.2023.3.5 HEGEDŰS Ernő (2023): Szálerősítéses anyagok 3D-s nyomtatásának hadiipari alkalmazási lehetőségei I. rész. UAV-k és könnyű járművek a haderőben és a katonai logisztikában. Haditechnika, 57(4), 62–66. Online: https://doi.org/10.23713/HT.57.4.12 JAKAB Sándor – KODÁCSY János (2011): Szerelés és javítástechnika. Budapest: Typotex. LUKÁCS Pál (1998): Új anyagok és technológiák az autógyártásban I. Budapest: Maróti-Godai. NÉMETH András – CZIGÁNY Tibor (1999): Hegesztett poliamid állapotvizsgálata és törési tulajdonságai. Gép, 51(5), 59–62. VÉGVÁRI Zsolt (2023): A 3D nyomtatás felhasználási lehetőségei a műveleti logisztikában. Katonai Logisztika, 33(1–2), 177–198. Online: https://doi.org/10.30583/2023-1-2-177 WELTSCH Zoltán (2019): Járműipari kötéstechnológiák. Budapest: Akadémiai. Online: https://doi.org/10.1556/9789634543305 ZENTAY Péter – HEGEDŰS Ernő – VÉGVÁRI Zsolt (2022): A 3D-s nyomtatás és katonai alkalmazásának lehetőségei 3. rész. Haditechnika, 57(2), 57–62. Online: https://doi.org/10.23713/HT.57.2.11 ZSÁRY Árpád (1984): Gépelemek I. rész. Szilárdsági méretezés, kötések és kötőelemek, csővezetékek, tartályok, tengelyek, tengelykapcsolók. Budapest: Tankönyvkiadó. " ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "21-40" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.2" ["abstract"]=> array(2) { ["en_US"]=> string(1009) "

As technology evolves, so does the range of materials used. In automotive engineering, plastic parts are becoming more and more common, which then have to be fixed to each other or to other materials in some way. A wide range of fasteners and bonding methods ensure that elements can be fastened together in a releasable or non-releasable manner. Snap-fit fasteners are known to everyone, as many of their embodiments can be found in households, e.g. battery compartment cover for remote controls, quick fasteners or bag and belt buckles. As the use of plastic parts in the automotive industry spreads, snap-in joints are also spreading and developing. The article describes and explains the different fastening methods, their main characteristics and their placement and role of snap-fit among these fastening methods. 3D printing is increasingly taking its place in the production of parts for military equipment. This article examines the possibilities of producing snap-in joints using 3D printing.

" ["hu_HU"]=> string(1164) "

A technika fejlődésével együtt jár az alkalmazott anyagok körének változása is. A gépjárműtechnikában egyre jobban elterjedtek a műanyag alkatrészek, amelyeket valamilyen módon egymáshoz vagy más anyagból készült elemekhez kell rögzíteni. A kötőelemek és kötési módok széleskörűsége biztosítja, hogy az elemeket oldhatóan vagy oldhatatlan módon kössük egymáshoz. A bepattanó kötések ismertek mindenki számára, mivel sok megvalósulási formája a háztartásokban is megtalálható, például a távirányító elemtartójának fedele, gyorskötöző vagy pedig táska- és övcsat. A gépjárműtechnikában a műanyag alkatrészek elterjedésével párhuzamosan a bepattanó kötések is terjednek és fejlődnek. A cikk ismerteti és bemutatja a különböző kötési módokat, főbb jellemzőiket és ezen kötésmódok között a bepattanó kötések helyét és szerepét. A 3D-nyomtatás mind nagyobb mértékben van jelen az alkatrész előállításban a haditechnikai eszközök vonatkozásában is. A cikk megvizsgálja a 3D-nyomtatással készült bepattanó kötések előállítási lehetőségeit.

" } ["title"]=> array(2) { ["en_US"]=> string(91) "The Place, Role and Possibilities of 3D Printing of Snap-on Bindings in Military Technology" ["hu_HU"]=> string(136) "Bepattanó kötések helye, szerepe, valamint 3D-nyomtatási technikával történő előállításának lehetősége a haditechnikában" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(77) "Vég Róbert, Kálmán Dénes, Daruka Norbert, Kovács Zoltán, Ember István" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(5) { [0]=> object(Author)#794 (6) { ["_data"]=> array(15) { ["id"]=> int(9297) ["email"]=> string(22) "vegh.robert@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9786-6702" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(4) "Vég" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Róbert" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#795 (6) { ["_data"]=> array(15) { ["id"]=> int(9298) ["email"]=> string(27) "denes.kalman.1975@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-2951-7172" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Kálmán" ["hu_HU"]=> string(8) "Kálmán" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Dénes" ["hu_HU"]=> string(6) "Dénes" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#791 (6) { ["_data"]=> array(15) { ["id"]=> int(9299) ["email"]=> string(22) "daruka.norbi@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7102-1787" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Daruka" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Norbert" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [3]=> object(Author)#786 (6) { ["_data"]=> array(15) { ["id"]=> int(9296) ["email"]=> string(24) "kovacs.zoltan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-9098-1997" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(37) "National University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Kovács" ["hu_HU"]=> string(7) "Kovács" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Zoltán" ["hu_HU"]=> string(7) "Zoltán" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [4]=> object(Author)#784 (6) { ["_data"]=> array(15) { ["id"]=> int(9300) ["email"]=> string(23) "ember.istvan@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7428) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9877-0366" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Ember" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(4) { [0]=> string(13) "3D nyomtatás" [1]=> string(18) "erőzáró kötés" [2]=> string(18) "alakzáró kötés" [3]=> string(18) "bepattanó kötés" } ["en_US"]=> array(4) { [0]=> string(11) "3D printing" [1]=> string(19) "force-locking joint" [2]=> string(18) "form-locking joint" [3]=> string(15) "snap-on binding" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#788 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35595) ["id"]=> int(6001) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7428) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF

Környezetbiztonság, ABV- és katasztrófavédelem

object(Publication)#184 (6) { ["_data"]=> array(28) { ["id"]=> int(7314) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:36" ["primaryContactId"]=> int(9135) ["sectionId"]=> int(56) ["seq"]=> int(1) ["submissionId"]=> int(7190) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(3753) "BM OKF (2021): Speciális tehergépjárművekkel bővült a katasztrófavédelem eszközparkja. 5 May 2021. Online: https://katasztrofavedelem.hu/611/szechenyi-2020/19/251261/specialis-tehergepjarmuvekkel-bovult-a-katasztrofavedelem-eszkozparkja Bundesanstalt Technisches Hilfswerk (2018): Weltweite Kommunikation für die VN. Online: https://www.thw.de/SharedDocs/Meldungen/DE/Veranstaltungen/international/2018/05/meldung_002_mcc_berlin.html?nn=922620¬First=true&idImage=10924654#sprungmarke CIMER, Zsolt – VASS, Gyula – ZSITNYÁNYI, Attila – KÁTAI-URBÁN, Lajos (2021): Application of Chemical Monitoring and Public Alarm Systems to Reduce Public Vulnerability to Major Accidents Involving Dangerous Substances. Symmetry, 13(8), 1528. Online: https://doi.org/10.3390/sym13081528 ÉRCES, Gergő – RÁCZ, Sándor – VASS, Gyula – VARGA, Ferenc (2023a): Fire Safety in Smart Cities in Hungary With Regard to Urban Planning. IDRiM Journal, 13(2), 104–128. Online: https://doi.org/10.5595/001c.91474 ÉRCES, Gergő – VASS, Gyula – AMBRUSZ, József (2023): Épületek károsító hatásokkal szembeni rezilienciájának jellemzői. Polgári Védelmi Szemle, 15(DAREnet Special), 117–130. GYŐZŐ-MOLNÁR, Árpád (2021): Kritikus infrastruktúravédelmi bevetési egységek a katasztrófavédelem alkalmazásában. Műszaki Katonai Közlöny, 31(4), 79–90. Online: https://doi.org/10.32562/mkk.2021.4.6 GYŐZŐ-MOLNÁR, Árpád (2022): Mobil vezetési pontok a magyar katasztrófavédelemben In FÖLDI, László (ed.): Szemelvények a katonai műszaki tudományok eredményeiből III. Budapest: Ludovika, 121–128. GYŐZŐ-MOLNÁR, Árpád – NÉGYESI, Imre (2019): Katasztrófavédelmi sugárfelderítő egység mobil vezetési pontként történő alkalmazása. Hadtudományi Szemle, 12(2), 129–138. Online: https://doi.org/10.32563/hsz.2019.2.9 HELL, Péter Miksa (2022): Drónok alkalmazhatóságának vizsgálata rendkívüli helyzetekben. PhD dissertation. Budapest: Óbudai Egyetem. HORVÁTH, Zoltán (2013): A HUNOR hivatásos katasztrófavédelmi mentőszervezet tábori elhelyezésének sajátosságai. Műszaki Katonai Közlöny, 23(1), 138–153. Online: https://folyoirat.ludovika.hu/index.php/mkk/article/view/2538 KÁTAI-URBÁN, Maxim – BÍRÓ, Tibor – KÁTAI-URBÁN, Lajos – VARGA, Ferenc – CIMER, Zsolt (2023): Identification Methodology for Chemical Warehouses Dealing with Flammable Substances Capable of Causing Firewater Pollution. Fire, 6(9), 345. Online: https://doi.org/10.3390/fire6090345 MUHORAY, Árpád (2019): A katasztrófavédelmi műveletek tervezése és szervezése. In HÁBERMAYER, Tamás (ed.): II. Tolna Megyei Polgári Védelmi Munkaműhely. Szekszárd: Tolna Megyei Katasztrófavédelmi Igazgatóság, 12–33. TÓTH, Rudolf (2011): A repülő eszközök alkalmazásának lehetséges területei és korlátai katasztrófák esetén. Repüléstudományi Közlemények, 23(2). Online: https://epa.oszk.hu/02600/02694/00055/pdf/EPA02694_rtk_2011_2_Toth_Rudolf.pdf TAG 42 Inflatable Tent (2020). https://www.plastecomilano.com/en/special-products/self-erecting-tent-model-tag-29-tag-42-tag-56/ ZSITNYÁNYI, Attila (2022): A katasztrófavédelem iparbiztonsági műszaki technikai eszközrendszerének kutatása és fejlesztése. PhD dissertation. Budapest: Nemzeti Közszolgálati Egyetem. Legal sources Measure No. 33/2020 of the NDGDM on the standby equipment of professional fire brigades and disaster management stations and the rules for the organisation of their services Measure No. 12/2023 of the NDGDM on the establishment of disaster management operational working units, the conditions under which they operate, their organisational structure and their tasks" ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "41-54" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.3" ["abstract"]=> array(1) { ["en_US"]=> string(888) "

The use of disaster management command centres is typically implemented in a static way, however, the experiences of the past period have shown that for their effective operation, it is necessary to use solutions that enable the monitoring of events, as well as rapid relocation and deployment. An obvious solution for creating the aforementioned capabilities is the use of mobile command centres to support driving groups. Currently, the professional disaster management organisation has several devices that can be used as mobile command points, but their capacity does not allow the work of larger teams. The purpose of this thesis is to examine capabilities, with the implementation of which both the capacity of the disaster management organisation and the effectiveness of the interventions can be increased, taking into account domestic and international development trends.

" } ["title"]=> array(1) { ["en_US"]=> string(96) "Possibilities for Improving the Technical Equipment of Disaster Management Mobile Command Points" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(61) "Győző-Molnár Árpád, Kátai-Urbán Lajos, Bleszity János" } ["locale"]=> string(5) "en_US" ["authors"]=> array(3) { [0]=> object(Author)#755 (6) { ["_data"]=> array(14) { ["id"]=> int(9135) ["email"]=> string(25) "arpad.gyozo@katved.gov.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7314) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-2046-8658" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(98) "Békés County Directorate for Disaster Management, Disaster Management Branch Office of Orosháza" ["hu_HU"]=> string(95) "Békés Megyei Katasztrófavédelmi Igazgatóság, Orosházi Katasztrófavédelmi Kirendeltség" } ["biography"]=> array(2) { ["en_US"]=> string(33) "

civil protection inspector

" ["hu_HU"]=> string(36) "

polgári védelmi felügyelő

" } ["familyName"]=> array(2) { ["en_US"]=> string(15) "Győző-Molnár" ["hu_HU"]=> string(15) "Győző-Molnár" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Árpád" ["hu_HU"]=> string(7) "Árpád" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#779 (6) { ["_data"]=> array(15) { ["id"]=> int(9136) ["email"]=> string(22) "Katai.Lajos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7314) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9035-2450" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(86) "Nemzeti Közszolgálati Egyetem Rendészettudományi Kar Katasztrófavédelmi Intézet" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(13) "Kátai-Urbán" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Lajos" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#780 (6) { ["_data"]=> array(15) { ["id"]=> int(9137) ["email"]=> string(25) "Bleszity.Janos@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7314) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-6803-3154" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(86) "Nemzeti Közszolgálati Egyetem Rendészettudományi Kar Katasztrófavédelmi Intézet" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Bleszity" ["hu_HU"]=> string(0) "" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "János" ["hu_HU"]=> string(0) "" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(19) "disaster management" [1]=> string(22) "mobile command centers" [2]=> string(11) "development" [3]=> string(19) "technical equipment" [4]=> string(7) "Hungary" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#757 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35596) ["id"]=> int(6002) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7314) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF (English)

Védelmi elektronika, informatika, kommunikáció

Empirical Studies of Russian– Ukrainian War Related Fake News – Part 2

Bányász Péter, Dub Máté, Kugler Péter, Ináncsi Mátyás
doi: 10.32567/hm.2024.1.4
55-83.
object(Publication)#708 (6) { ["_data"]=> array(28) { ["id"]=> int(7101) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:36" ["primaryContactId"]=> int(8810) ["sectionId"]=> int(59) ["seq"]=> int(1) ["submissionId"]=> int(6977) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(1568) "BÁNYÁSZ, Péter – NAGY, Gréta – MOLNÁR, Ákos (2023): Empirical Studies of COVID-19 Related Fake News. Hadtudomány, 33(E), 20–36. Online: https://doi.org/10.17047/Hadtud.2023.33.E.20 BÁNYÁSZ, Péter – TÓTH, András – LÁSZLÓ, Gábor (2022): A koronavírus oltással kapcsolatos állampolgári attitűd vizsgálata szentimentanalízis segítségével. Információs Társadalom, 22(1), 99–125. Online: https://doi.org/10.22503/inftars.XXII.2022.1.6 BARRETT, Paul – HENDRIX, Justin – SIMS, Grant (2021): How Tech Platforms Fuel U.S. Political Polarization and What Government Can Do About It. Brookings.edu, 27 September 2021. Online: https://www.brookings.edu/articles/how-tech-platforms-fuel-u-s-political-polarization-and-what-government-can-do-about-it/. BUNDTZEN, Sara – MATLACH, Paula – MATHELEMUSE, Nora (2022): Hashtag Pairing Is Being Used on Twitter to Facilitate Soviet Propaganda Tactic »Whataboutism«. ISD – Institute for Strategic Dialogue (blog), 15 March 2022. Online: https://www.isdglobal.org/digital_dispatches/hashtag-pairing-is-being-used-on-twitter-to-facilitate-soviet-propaganda-tactic-whataboutism/ COLLINS, Ben – KORECKI, Natasha (2022): Twitter Bans over 100 Accounts That Pushed #IStandWithPutin. NBC News, 4 March 2022. Online: https://www.nbcnews.com/tech/internet/twitter-bans-100-accounts-pushed-istandwithputin-rcna18655 NEMETH, William J. (2002): Future War and Chechnya: A Case for Hybrid Warfare. Calhoun Naval Postgraduate School, Monterey. Online: https://core.ac.uk/download/pdf/36699567.pdf" ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "55-83" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.4" ["abstract"]=> array(2) { ["en_US"]=> string(933) "

The Russian–Ukrainian war, which broke out on 24 February 2022, resulted in several paradigm shifts in cyberwarfare. One aspect of these changes is psychological operations. Russia and Ukraine have conducted extensive psychological operations campaigns to fulfil their war aims, which have since been intense along modified objectives. This series of studies examines the impact of war-related fake news through various empirical research. In the first part of the paper, the authors read the emergence of psychological operations and related terms in the international academic literature using network analysis methodology. In the second part of the paper, the authors use sentiment and network analysis to investigate the spread of different fake news. In the third study, the authors measure the attitudes toward the perception of the Hungarian Defence Forces from the perspective of the war in the neighbouring country.

" ["hu_HU"]=> string(933) "

The Russian–Ukrainian war, which broke out on 24 February 2022, resulted in several paradigm shifts in cyberwarfare. One aspect of these changes is psychological operations. Russia and Ukraine have conducted extensive psychological operations campaigns to fulfil their war aims, which have since been intense along modified objectives. This series of studies examines the impact of war-related fake news through various empirical research. In the first part of the paper, the authors read the emergence of psychological operations and related terms in the international academic literature using network analysis methodology. In the second part of the paper, the authors use sentiment and network analysis to investigate the spread of different fake news. In the third study, the authors measure the attitudes toward the perception of the Hungarian Defence Forces from the perspective of the war in the neighbouring country.

" } ["title"]=> array(2) { ["en_US"]=> string(74) "Empirical Studies of Russian– Ukrainian War Related Fake News – Part 2" ["hu_HU"]=> string(74) "Empirical Studies of Russian– Ukrainian War Related Fake News – Part 2" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(62) "Bányász Péter, Dub Máté, Kugler Péter, Ináncsi Mátyás" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(4) { [0]=> object(Author)#746 (6) { ["_data"]=> array(15) { ["id"]=> int(8810) ["email"]=> string(24) "banyasz.peter@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7308-9304" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(28) "University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(9) "Bányász" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#729 (6) { ["_data"]=> array(15) { ["id"]=> int(8812) ["email"]=> string(19) "dub.mate@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-9036-4112" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(28) "University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(3) "Dub" ["hu_HU"]=> string(3) "Dub" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Máté" ["hu_HU"]=> string(6) "Máté" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#723 (6) { ["_data"]=> array(15) { ["id"]=> int(8811) ["email"]=> string(26) "kugler.peti@protonmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-7265-6736" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Kugler" ["hu_HU"]=> string(6) "Kugler" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Péter" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [3]=> object(Author)#722 (6) { ["_data"]=> array(15) { ["id"]=> int(8809) ["email"]=> string(25) "inancsi.matyas@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7101) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0001-6017-3921" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(32) "a:1:{s:5:"hu_HU";s:7:"NKE-HHK";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(8) "Ináncsi" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(8) "Mátyás" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(22) "Russian- Ukraninan war" [1]=> string(6) "PSYOPS" [2]=> string(12) "Cyberwarfare" [3]=> string(16) "Network analysis" [4]=> string(18) "Sentiment analysis" } ["en_US"]=> array(5) { [0]=> string(22) "Russian- Ukraninan war" [1]=> string(6) "PSYOPS" [2]=> string(12) "Cyberwarfare" [3]=> string(16) "Network analysis" [4]=> string(18) "Sentiment analysis" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#760 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35597) ["id"]=> int(6003) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7101) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF (English)
object(Publication)#114 (6) { ["_data"]=> array(29) { ["id"]=> int(7345) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:34" ["primaryContactId"]=> int(9176) ["sectionId"]=> int(59) ["seq"]=> int(2) ["submissionId"]=> int(7221) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(14467) "AKER, Cemal – KALKAN, Sinan (2017): Using Deep Networks for Drone Detection. In 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Lecce, Italy. Online: https://doi.org/10.1109/AVSS.2017.8078539 ANDRAŠI, Petar – RADIŠIĆ, Tomislav – MUŠTRA, Mario – IVOŠEVIĆ, Jurica (2017): Night-time Detection of UAVs using Thermal Infrared Camera. Transportation Research Procedia, 28, 183–190. Online: https://doi.org/10.1016/j.trpro.2017.12.184 BERNARDINI, Andrea – MANGIATORDI, Federica – PALLOTTI, Emiliano – CAPODIFERRO, Licia (2017): Drone Detection by Acoustic Signature Identification. In Symposium on Electronic Imaging: Imaging and Multimedia Analytics in a Web and Mobile World, 60–64. Online: https://doi.org/10.2352/ISSN.2470-1173.2017.10.IMAWM-168 BÖNIGER, Urs – OTTO, Beat – WELLIG, Peter (2016): Detection of Mini-UAVs in the Presence of Strong Topographic Relief: A Multisensor Perspective. SPIE Security and Defence, Edinburgh, https://doi.org/10.1117/12.2241757 BRIESE, Christoph – SEEL, Andreas – ANDERT, Franz (2018): Vision-Based Detection of Non-Cooperative UAVs Using Frame Differencing and Temporal Filter. In International Conference on Unmanned Aircraft Systems (ICUAS), Dallas, TX, 606–613. Online: https://doi.org/10.1109/ICUAS.2018.8453372 BUSSET, Joël – PERRODIN, Florian – WELLIG, Peter – OTT, Beat – HEUTSCHI, Kurt – RÜHL, Torben – NUSSBAUMER, Thomas (2015): Detection and Tracking of Drones Using Advanced Acoustic Cameras. SPIE Unmanned/Unattended Sensors and Sensor Networks XI; and Advanced Free-Space Optical Communication Techniques and Applications, 96470F, Toulouse. Online: https://doi.org/10.1117/12.2194309 CASE, Ellen – ZELNIO, Anne – RIGLING, Brian (2008): Low-Cost Acoustic Array for Small UAV Detection and Tracking. In IEEE National Aerospace and Electronics Conference, Dayton, OH, 110–113. Online: https://doi.org/10.1109/NAECON.2008.4806528 CHADWICK, Andrew (2017): Micro-Drone Detection using Software-Defined 3G Passive Radar. In International Conference on Radar Systems (Radar 2017), Belfast, 1–6. Online: https://doi.org/10.1049/cp.2017.0419 CHANG, Xianyu – YANG, Chaoqun – WU, Junfeng – SHI, Xiufang – SHI, Zhiguo (2018): A Surveillance System for Drone Localization and Tracking Using Acoustic Arrays. In IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM), Sheffield, UK, 573–577. Online: https://doi.org/10.1109/SAM.2018.8448409 CHEN, Hongwei (2010): No Man’s Land: a Variation on Harold Pinter’s Theme of Menace. Journal of Language Teaching and Research, 1(2), 169–174. Online: https://doi.org/10.4304/jltr.1.2.169-174 CHRISTNACHER, Frank – HENGY, Sébastien – LAURENZIS, Martin – MATWYSCHUK, Alexis – NAZ, Pierre – SCHERTZER, Stéphane – SCHMITT, Gwenael (2016): Optical and Acoustical UAV Detection. In Proceedings of SPIE Security and Defence, 9988, Edinburgh, UK. Online: https://doi.org/10.1117/12.2240752 COLUCCIA, Angelo – GHENESCU, Marian – PIATRIK, Tomas – DE CUBBER, Geert – SCHUMANN, Arne – SOMMER, Lars – KLATTE, Johannes – SCHUCHERT, Tobias – BEYERER, Juergen – FARHADI, Mohammad et al. (2017): Drone-vs-Bird Detection Challenge. In 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Lecce, Italy. Online: https://doi.org/10.1109/AVSS.2017.8078464 DUQUE DE QUEVEDO, Álvaro – IBAÑEZ URZAIZ, Fernando – GISMERO MENOYO, Javier – LÓPEZ ASENSIO, Alberto (2018): Drone Detection With X-Band Ubiquitous Radar. In 19th International Radar Symposium (IRS), Bonn, Germany, 1–10. Online: https://doi.org/10.23919/IRS.2018.8447942 DONG, Qiang – ZOU, Qinghua (2017): Visual UAV Detection Method with Online Feature Classification. IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 429–432. Online: https://doi.org/10.1109/ITNEC.2017.8284767 FARAGÓ, Bence (2022): Drónok Harca – Az orosz–ukrán háborúban jelen lévő drónok felértékelődése, működésük taktikai és stratégiai vonatkozásai a megváltozó hadviselési környezetben [Game of Drones – The Increasing Importance of Drones in the Russian-Ukrainian War, Their Tactical and Strategic Implications in the Changing Warfare Environment]. Nemzet és Biztonság, 15(2), 36–54. Online: https://doi.org/10.32576/nb.2022.2.3 FREILICH, Chuck (2023): Israel and the Palestinians: The Day After. Survival: Global Politics and Strategy, 65(6), 67–73. Online: https://doi.org/10.1080/00396338.2023.2285602 GAJDÁCS, László (2022): Pilóta nélküli légi jármű érzékelésének lehetséges megoldásai [Possible Solutions for Unmanned Aircraft Vehicle Detection]. Hadmérnök, 17(4), 17–28. Online: https://doi.org/10.32567/hm.2022.4.2 GHAZALLI, Nasyitah – BALLERI, Alessio – JAHANGIR, Mohammed (2021): Passive Radar Detection of Drones with Staring Illuminators of Opportunity. In CLEMENTE, Carmine – FIORANELLI, Francesco – COLONE, Fabiola – LI, Gang (eds.): Radar Countermeasures for Unmanned Aerial Vehicles. (eBook). Institution of Engineering and Technology. Online: https://doi.org/10.1049/SBRA543E_ch5 LIU, Hao – WEI, Zhiqiang – CHEN, Yitong – PAN, J. – LIN, L. – REN, Y. (2017a): Drone Detection Based on an Audio-Assisted Camera Array. In IEEE Third International Conference on Multimedia Big Data (BigMM), Laguna Hills, CA, 402–406. Online: https://doi.org/10.1109/BigMM.2017.57 HOSEINI, Sahar – ORCHARD, Garrick – YOUSEFZADEH, A. – DEVERAKONDA, B. – SERRANO-GOTARREDONA, T. – LINARES-BARRANCO, B. (2017): Passive Localization and Detection of Quadcopter UAVs by Using Dynamic Vision Sensor. In 5th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), Qazvin, Iran, 81–85. Online: https://doi.org/10.1109/CFIS.2017.8003662 JAHANGIR, Mohammed – BAKER, Chris (2016): Robust Detection of Micro-UAS Drones with L-Band 3-D Holographic Radar. In Sensor Signal Processing for Defence (SSPD), Edinburgh, UK, 1–5. Online: https://doi.org/10.1109/SSPD.2016.7590610 JAHANGIR, Mohammed – WHITE, Daniel (2021): Good Practices and Approaches for Counter UAV System Developments – An Industrial Perspective. In CLEMENTE, Carmine – FIORANELLI, Francesco – COLONE, Fabiola – LI, Gang (eds.): Radar Countermeasures for Unmanned Aerial Vehicles. (eBook). Institution of Engineering and Technology. Online: https://doi.org/10.1049/SBRA543E_ch12 JANG, Beomhui – SEO, Yoojeong – ON, Baeksan – IM, Sungbin (2018): Euclidean Distance Based Algorithm for UAV Acoustic Detection. In International Conference on Electronics, Information, and Communication (ICEIC), Honolulu, HI, 1–2. Online: https://doi.org/10.23919/ELINFOCOM.2018.8330557 JEON, Sungho – SHIN, Jong-Woo – LEE, Young-Jun – KIM, Woong-Hee (2017): Empirical Study of Drone Sound Detection in Real-Life Environment with Deep Neural Networks. In 25th European Signal Processing Conference (EUSIPCO), Kos, Greece, 1858–1862. Online: https://doi.org/10.23919/EUSIPCO.2017.8081531 JIAN, Michael – LU, Zhenzhong – CHEN, Victor (2018): Drone Detection and Tracking Based on Phase-Interferometric Doppler Radar. In IEEE Radar Conference (RadarConf18), Oklahoma City, 1146–1149. Online: https://doi.org/10.1109/RADAR.2018.8378723 KÁROLY, Bianka – SÁGHI, Balázs (2021): Assessing the Unmanned Aerial Vehicles’ Surveillance Problems and Actual Solution Options from the Different Stakeholders' Viewpoint. Periodica Polytechnica Transportation Engineering, 49(1), 32–41. Online: https://doi.org/10.3311/PPtr.13749 KIM, Juhyun – PARK, Cheonbok – AHN, Jinwoo – KO, Youlim – PARK, Junghyun – GALLAGHER, John C. (2017): Real-time UAV Sound Detection and Analysis System. In IEEE Sensors Applications Symposium (SAS), Glassboro, NJ, 1–5. Online: https://doi.org/10.1109/SAS.2017.7894058 KLARE, Jens – BIALLAWONS, Oliver – CERUTTI-MAORI, Delphine (2017): UAV Detection with MIMO Radar. In 18th International Radar Symposium (IRS), Prague, 1–8. Online: https://doi.org/10.23919/IRS.2017.8008140 KLOCHKO, Vladimir – STROTOV, Valery – SMIRNOV, Sergey (2019): Multiple Objects Detection and Tracking in Passive Scanning Millimeter-Wave Imaging Systems. In Millimetre Wave and Terahertz Sensors and Technology XII, Strasbourg, France. Online: https://doi.org/10.1117/12.2532546 KRAJNC, Zoltán (2018): A drónok elleni stratégia és eljárások [Counter Drone Strategy and Procedures]. Repüléstudományi Közlemények, 30(3), 139–148. KRÁTKÝ, Miroslav – FUXA, Luboš (2015): Mini UAVs detection by radar, International Conference on Military Technologies (ICMT), Brno, Czech Republic, 1–5. Online: https://doi.org/10.1109/MILTECHS.2015.7153647 KWAG, Young-Kil – WOO, In-Sang – KWAK, Ho-Young – JUNG, Young-Ho (2016): Multi-mode SDR Radar Platform for Small Air-Vehicle Drone Detection. In CIE International Conference on Radar (RADAR), Guangzhou, China, 1–4. Online: https://doi.org/10.1109/RADAR.2016.8059254 LIU, Yuqi – WAN, Xianrong – TANG, Hui – YI, Jianxin – CHENG, Yiyao – ZHANG, Xun (2017b): Digital Television Based Passive Bistatic Radar System for Drone Detection. In IEEE Radar Conference (RadarConf), Seattle, 1493–1497. Online: https://doi.org/10.1109/RADAR.2017.7944443 MARTELLI, T. – MURGIA, F. – COLONE, F. – BONGIOANNI, C. – LOMBARDO, P. (2017): Detection and 3D Localization of Ultralight Aircrafts and Drones with a WiFi-based Passive Radar. In International Conference on Radar Systems (Radar 2017), Belfast, Institution of Engineering and Technology, 1–6. Online: https://doi.org/10.1049/cp.2017.0423 MÜLLER, Wilmuth – SANDER, Jennifer – KUWERTZ, Achim – MÜHLENBERG, Dirk (2018): High-Level Data Fusion Component for Drone Classification and Decision Support in Counter UAV. In Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation, Orlando, FL. Online: https://doi.org/10.1117/12.2306148 NAKAMURA, Ryohei – HADAMA, Hisaya (2017): Characteristics of Ultra-Wideband Radar Echoes from a Drone. IEICE Communications Express, 6(9), 530–534. Online: https://doi.org/10.1587/comex.2017XBL0079 PALIK, Mátyás (2013): A pilóta nélküli légijárművek katonai alkalmazása. In PALIK, Mátyás (ed.): Pilóta nélküli repülés profiknak és amatőröknek. Budapest: Nemzeti Közszolgálati Egyetem, 281–298. PARK, Seungwoon – PARK, Seong-Ook (2017): Configuration of an X-band FMCW Radar Targeted for Drone Detection. In International Symposium on Antennas and Propagation (ISAP), Phuket, Thailand, 1–2. Online: https://doi.org/10.1109/ISANP.2017.8228912 PERSCHKE, Thomas – MOREN, Konrad – MÜLLER Thomas (2018): Real-Time Detection of Drones at Large Distances with 25 Megapixel Cameras. In Emerging Imaging and Sensing Technologies for Security and Defence III; and Unmanned Sensors, Systems, and Countermeasures, Berlin. Online: https://doi.org/10.1117/12.2324678 ROSS, William, David (1976): Plato’s Theory of Ideas. Westport: Greenwood Press. SACCO, Giulia – PITTELLA, Erika – PISA, Stefano – PIUZZI, Emanuele (2018): A MISO Radar System for Drone Localization. In 5th IEEE International Workshop on Metrology for AeroSpace (MetroAeroSpace), Rome, 549–553. Online: https://doi.org/10.1109/MetroAeroSpace.2018.8453572 SAQIB, Muhammad – KHAN, Sultan Daud – SHARMA, Nabin – BLUMENSTEIN, Michael (2017): A Study on Detecting Drones Using Deep Convolutional Neural Networks. In 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Lecce, Italy, 1–5. Online: https://doi.org/10.1109/AVSS.2017.8078541 SHUKLA, Sandeep (2016): Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures. In 29th International Conference on VLSI Design, Kolkata, India, 30–31. Online: https://doi.org/10.1109/VLSID.2016.153 SINEGLAZOV, Victor (2015): Multi-Functional Integrated Complex of Detection and Identification of UAVs. In IEEE International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), Kyiv, Ukraine, 320–323. Online: https://doi.org/10.1109/APUAVD.2015.7346631 SOLOMITCKII, Dmitrii – GAPEYENKO, Margarita – SEMKIN, Vasilii – ANDREEV, Sergey – KOUCHERYAVY, Yevgeni (2018): Technologies for Efficient Amateur Drone Detection in 5G Millimeter-Wave Cellular Infrastructure. IEEE Communications Magazine, 56(1), 43–50. Online: https://doi.org/10.1109/MCOM.2017.1700450 SONG, Houbing – RAVI, Srinivasan – TAMIM, Sookoor – JESCHKE, Sabina (2017): Smart Cities: Foundations, Principles, and Applications. Hoboken: Wiley. Online: https://doi.org/10.1002/9781119226444 SONG, Houbing – WANG Jian, – LIU, Yongxin – YUE, Xuejun – YOUNG, Thomas – YUAN, Jiawei – SEKER, Remzi (2018): Integrating Ground Surveillance with Aerial Surveillance for Enhanced Amateur Drone Detection. In Disruptive Technologies in Information Sciences, Orlando, FL. Online: https://doi.org/10.1117/12.2304531 STASIAK, Krzysztof – CIESIELSKI, Marek – KUROWSKA, Anna – PRZYBYSZ, Wojciech (2018): A study on using different kinds of continuous-wave radars operating in C-band for drone detection. In 22nd International Microwave and Radar Conference (MIKON), Poznan, Poland, 521–526. Online: https://doi.org/10.23919/MIKON.2018.8405275 VILÍMEK, Jakub – BUŘITA, Ladislav (2017): Ways for Copter Drone Acoustic Detection. In International Conference on Military Technologies (ICMT), Brno, Czech Republic, 349–353. Online: https://doi.org/10.1109/MILTECHS.2017.7988783 XIAOQI, Yang – KAI, Huo – WEIDONG, Jiang – JINGJING, Zhao – ZHAOKUN Qiu (2016): A Passive Radar System for Detecting UAV Based on the OFDM Communication Signal. Progress in Electromagnetic Research Symposium (PIERS), Shanghai, 2757–2762. Online: https://doi.org/10.1109/PIERS.2016.7735118 ZEMMARI, Reda – BROETJE, Martina – BATTISTELLO, Giulia – NICKEL, Ulrich (2014): GSM Passive Coherent Location System: Performance Prediction and Measurement Evaluation. IET Radar Sonar Navigation, 8(2), 94–105. Online: https://doi.org/10.1049/iet-rsn.2013.0206 ZHAO, Yichao – SU, Yi (2018): Cyclostationary Phase Analysis on Micro-Doppler Parameters for Radar-Based Small UAVs Detection. IEEE Transactions on Instrumentation and Measurement, 67(9), 2048–2057. Online: https://doi.org/10.1109/TIM.2018.2811256" ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "85-99" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.5" ["abstract"]=> array(1) { ["en_US"]=> string(1959) "

Unmanned Aircraft Systems (UAS), commonly known as drones, have witnessed substantial global proliferation in the past decade. Their constructive applications hold the promise of being a useful, yet critical component in creating a more efficient society with the enhancement of safety, efficiency, and facilitating advancements in various domains, ultimately contributing to our modern daily lives. However, the escalating dependence on computer and communication technologies renders, especially small, UAS susceptible to various threats, posing risks to public safety, national security, and individual privacy. Addressing these concerns necessitates the development of innovative technologies designed to detect, track, identify, and eliminate UAS in a manner that upholds safety, security, and privacy. A Counter-Unmanned Aircraft System (C-UAS) is defined as a system or apparatus capable of legally and securely incapacitating, disrupting, or assuming control over an UAS. Recent years have witnessed significant research endeavours aimed at detecting and eliminate drone threats. Detection methodologies encompass acoustic, visual, passive radio frequency, radar, and data fusion techniques, while neutralisation strategies encompass physical capture and jamming approaches. This paper, delving into the realm of small drone surveillance, is the opening segment of a three-part series aims to envision a C-UAS framework; it provides an exhaustive review of existing literature in the domain of UAS surveillance, delineating the challenges associated with countering unauthorised or unsafe drone operations, and evaluating the trajectory of detection to prepare against UAS-induced threats. Therefore, the fundamental objective of this paper is to offer a comprehensive surveillance baseline for a structured vision to a C-UAS framework, thus fostering a research community dedicated to the secure integration of drones into the airspace system.

" } ["subtitle"]=> array(1) { ["en_US"]=> string(22) "(Part 1, Surveillance)" } ["title"]=> array(1) { ["en_US"]=> string(112) "No Drone’s Sky: Full Spectrum Drone Surveillance and Neutralisation Concept for Enhanced Counter-UAS Framework" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(15) "Horváth Gábor" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#781 (6) { ["_data"]=> array(14) { ["id"]=> int(9176) ["email"]=> string(20) "ghorvath87@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7345) ["seq"]=> int(2) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-2939-1426" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(39) "HUN MoD State Aviation Department (MAA)" ["hu_HU"]=> string(32) "HM Állami Légügyi Főosztály" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(41) "

főtiszt / Senior ATM Officer

" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Horváth" ["hu_HU"]=> string(8) "Horváth" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Gábor" ["hu_HU"]=> string(6) "Gábor" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(10) "anti-drone" [1]=> string(11) "counter-uas" [2]=> string(13) "drone sensing" [3]=> string(20) "drone neutralization" [4]=> string(18) "drone surveillance" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#778 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35598) ["id"]=> int(6004) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7345) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF (English)
object(Publication)#785 (6) { ["_data"]=> array(29) { ["id"]=> int(7382) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:35" ["primaryContactId"]=> int(9230) ["sectionId"]=> int(59) ["seq"]=> int(3) ["submissionId"]=> int(7258) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(5512) "A repülésben használt NOTAM-ok különböző típusai [é. n.]. Online: https://hu.motonoticias.com/different-types-notams-used-aviation-82278 ATEŞ, Savaş Selahattin (2017): Electronic Flight Bag in the Operation of Airline Companies: Application in Turkey. Computer Science and Information Technology, 5(4), 128–134. Online: https://doi.org/10.13189/csit.2017.050402 BABB, Tyler A. (2017a): Professional Pilot Commercial Off-the-Shelf (COTS) EFB Usage, Policies and Reliability. International Journal of Aviation, Aeronautics, and Aerospace, 4(1), 1–29. Online: https://doi.org/10.15394/ijaaa.2017.1159 BABB, Tyler A. (2017b): Electronic Flight Bag Policies at Collegiate Aviation Programs. International Journal of Aviation, Aeronautics, and Aerospace, 4(4), 1–22. Online: https://doi.org/10.58940/2374-6793.1190 Boeing Subsidiary Jeppesen Suffers Cyberattack (2023). Binary Defense, 2023. április 18. Online: https://www.binarydefense.com/threat_watch/boeing-subsidiary-jeppesen-suffers-cyberattack/ BRITTON, Niki (2022): ’Cyber Incident’ Affected Flight Planning. Boeing Subsidiary Jeppesen Apparently Targeted. AOPA, 2022. november 9. Online: https://www.aopa.org/news-and-media/all-news/2022/november/09/cyber-incident-affected-flight-planning Cyber Attacks on the Aviation Industry in 2022. Statistics: Ransomware, Data Breaches, DDoS Attacks (2023). KonBriefing, 2023. február 28. Online: https://konbriefing.com/en-topics/cyber-attacks-2022-ind-aviation.html FLORENT, R. (2020): Aerospace Cybersecurity: Building Resilience in the Hailstorm. CyberInflight, 2020. május 10. Online: https://www.cyberinflight.com/?p=1081 GATES, Dominic (2018): Boeing Hit by WannaCry Virus, But Says Sttack Caused Little Damage. The Seattle Times, 2018. március 28. Online: https://www.seattletimes.com/business/boeing-aerospace/boeing-hit-by-wannacry-virus-fears-it-could-cripple-some-jet-production/ GATLAN, Sergiu (2023): Boeing Confirms Cyberattack Amid LockBit Ransomware Claims. Bleeping Computer, 2023. november 2. Online: https://www.bleepingcomputer.com/news/security/boeing-confirms-cyberattack-amid-lockbit-ransomware-claims/ GONDA Zsuzsanna (2005): Repülési informatika. Bicske: SZAK. Online: https://real.mtak.hu/170257/1/Gonda-Zsuzsanna-Repulesi-Informatika-konyv-SZAK-Kiado-2005-NJSZT-publikacio.pdf HORVÁTH József (2020): A repülés elleni kibertámadás. Hadmérnök, 15(3), 179–196. Online: https://doi.org/10.32567/hm.2020.3.10 ILASCU, Ionut (2023): LockBit Ransomware Leaks Gigabytes of Boeing Data. Bleeping Computer, 2023. november 12. Online: https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/ KLINT, Matthew (2022): Breaking: Boeing’s Jeppesen Subsidiary Hit with Potential Ransomware Attack. Live and Let’s Fly, 2022. november 3. Online: https://liveandletsfly.com/boeing-jeppesen-ransomware-attack/ KOVÁCS László (2023): Hadviselés a 21. században: kiberműveletek. Budapest: Ludovika. OHME, Marty (2014): Use of Tablet Computer as Electronic Flight Bags in General Aviation. Aviation / Aeronautics / Aerospace International Research Conference, 37. Online: https://commons.erau.edu/aircon/2014_Challenges_Facing_our_Industry/january-17-2014/37 ÖZKAN, N. Fırat – AKSOY, Emre – ŞENSOY, Gökberk (2021): Evaluation of Jeppesen and Garmin Electronic Flight Bags (EFBs) Applications in Terms of Cognitive Workload and Availability. International Journal of Multidisciplinary Studies and Innovative Technologies, 5(1), 36–45. PEREDY Zoltán – VENCZEL Márk (2020): Nemzetközi repülőterek kiberbiztonsági kihívásai. Repüléstudományi Közlemények, 32(2), 165–180. Online: https://doi.org/10.32560/rk.2020.2.12 Personal Wings [@PersonalWings] (2022): Aviation Cyber Security and Recent Boeing Jeppesen Ransomware Hack. YouTube, 2022. november 6. Online: https://www.youtube.com/watch?v=RhLeTHTKxoU PUFAHL, Alexander (2022): Global NOTAM Campaign. Online: https://www.icao.int/NACC/Documents/Meetings/2022/AIMTF5/AIMTF5-P04.pdf RAJ, Aaron (2023): Boeing Hack: Should the Airline Manufacturer Negotiate with Cybercriminals? Tech Wire Asia, 2023. november 6. https://techwireasia.com/2023/11/boeing-hack-should-the-airline-manufacturer-negotiate-with-cybercriminals/ SUPPIAH, Saravanan et al. (2020): Impact of Electronic Flight Bag (EFB) on Single Pilot Performance and Workload. International Journal of Aviation, Aeronautics, and Aerospace, 7(4), 1–14. Online: https://doi.org/10.15394/ijaaa.2020.1531 SZABÓ Sándor – TÓTH Rudolf (2013): Repülőterek kialakítása, létesítményeinek kritikus elemei, védelmük lehetséges műszaki megoldásai. Repüléstudományi Közlemények, 25(2), 89–113. Online: www.repulestudomany.hu/kulonszamok/2013_cikkek/2013-2-07-Szabo_Sandor-Toth_Rudolf.pdf THURBER, Matt (2022): Jeppesen Planning, Chart Products Suffer ’Technical Issues’. AIN Online, 2022. november 4. Online: https://www.ainonline.com/aviation-news/business-aviation/2022-11-04/jeppesen-planning-chart-products-suffer-technical-issues TÓTH András (2022): A digitális állam információbiztonsági kihívásai. Budapest: Ludovika. U.S. Department of Transportation (2015): Federal Aviation Administration: Advisory Circular, 90-100A. Online: https://www.faa.gov/documentLibrary/media/Advisory_Circular/AC_90-100A_CHG_2.pdf ZEE, Mark (2022): Jetplanner, FD Pro, Charts – Down. OPS Group, 2022. november 3. Online: https://ops.group/blog/jetplanner-fd-pro-charts-down/" ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(7) "101-120" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.6" ["abstract"]=> array(2) { ["en_US"]=> string(705) "

In this article, the authors present an information subsystem of air transport, its IT solution, as well as its potential cyber threats and risks. To this end, the authors determine certain IT components of air transport with particular regard to communication, data link, and onboard flight systems, such as the so-called electronic flight bags (EFB), which have special significance due to cyber incidents. Following this, the authors describe the cyber
attacks that occurred recently at Boeing, including their chronological order, and then, by summarising all these, they inductively draw logical conclusions about their impacts, as well as about new forms of response against the attacks.

" ["hu_HU"]=> string(826) "

Jelen cikkben a szerzők bemutatják a légi közlekedés egyik információs alrendszerét, informatikai megoldását, valamint annak potenciális kibertéri veszélyeit és kockázatait. Ehhez a szerzők egy elemző-értékelő módszerrel meghatározzák a légi közlekedés bizonyos informatikai elemeit, elsősorban a kommunikációs, adatkapcsolati és fedélzeti repülési rendszereket, például az úgynevezett electronic flight bag-eket (EFB), amelyek kiberincidensek következtében kiemelt jelentőségűek. Ezt követően a szerzők ismertetik a Boeing vállalatnál a közelmúltban bekövetkezett kibertámadásokat, illetve azok kronológiai sorrendjét, majd mindezeket összegezve logikai következtetéseket vonnak le azok hatásairól, illetve a támadás elleni fellépések újabb formájáról.

" } ["subtitle"]=> array(2) { ["en_US"]=> string(43) "– Timeline of Cyber Crimes against Boeing" ["hu_HU"]=> string(69) "– Kronológiai folyamat a Boeing elleni kibertámadások tükrében" } ["title"]=> array(2) { ["en_US"]=> string(32) "Cybersecurity Issues in Aviation" ["hu_HU"]=> string(52) "Kiberbiztonsági kihívások a légi közlekedésben" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(45) "Hunorfi Péter, Paráda István, Farkas Tibor" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(3) { [0]=> object(Author)#792 (6) { ["_data"]=> array(15) { ["id"]=> int(9230) ["email"]=> string(30) "hunorfi.peter@phd.uni-obuda.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7382) ["seq"]=> int(3) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0000-3578-1909" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(15) "Óbudai Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(19) "

Doktorandusz

" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Hunorfi" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Péter" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(14) "Hunorfi Péter" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#803 (6) { ["_data"]=> array(15) { ["id"]=> int(9232) ["email"]=> string(22) "paradaistvan@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7382) ["seq"]=> int(3) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-3083-6015" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Paráda" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "István" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [2]=> object(Author)#787 (6) { ["_data"]=> array(15) { ["id"]=> int(9231) ["email"]=> string(29) "farkas.tibor@bgk.uni-obuda.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7382) ["seq"]=> int(3) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-8868-9628" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(15) "Óbudai Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(22) "

egyetemi docens

" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Farkas" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(5) "Tibor" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(6) { [0]=> string(17) "légiközlekedés" [1]=> string(3) "EFB" [2]=> string(6) "NOTAMS" [3]=> string(6) "Boeing" [4]=> string(13) "Kibervédelem" [5]=> string(10) "Ransomware" } ["en_US"]=> array(6) { [0]=> string(8) "aviation" [1]=> string(3) "EFB" [2]=> string(6) "NOTAMS" [3]=> string(6) "Boeing" [4]=> string(13) "Cyber Defence" [5]=> string(10) "Ransomware" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#802 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35599) ["id"]=> int(6005) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7382) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#782 (6) { ["_data"]=> array(29) { ["id"]=> int(7402) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:35" ["primaryContactId"]=> int(9261) ["sectionId"]=> int(59) ["seq"]=> int(4) ["submissionId"]=> int(7278) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(11990) "BÁNYÁSZ, Péter – KRASZNAY, Csaba – TÓTH, András (2022): A kibervédelem szakpolitikai szintjének helyzete és kihívásai Magyarországon, az EU-ban és a NATO-ban [Situation and Challenges at the Policy Level of Cyber Defence in Hungary, the EU and NATO]. Military and Intelligence Cyber Security Research Paper 2022/8. BIHALY, Barbara (2021): A kibervédelem szerepe az Európai Unió közös biztonsági és védelmi politikájában [The Role of Cyber Defence in the European Union’s Common Security and Defence Policy]. Hadtudományi Szemle, 14(3), 45–55. Online: https://doi.org/10.32563/hsz.2021.3.4 Centre for Cybersecurity Belgium (2023): Cybersecurity Priorities in the Upcoming Belgian Presidency Agenda. Online: https://ccb.belgium.be/en/news/cybersecurity-priorities-upcoming-belgian-eu-presidency-agenda The Council of the European Union (2022): Council Recommendation of 8 December 2022 on a Union-wide coordinated approach to strengthen the resilience of critical infrastructure. 2023/C 20/01. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32023H0120(01) The Council of the European Union (2023): Council Conclusions on the EU Space Strategy for Security and Defence. 14512/23. Online: https://data.consilium.europa.eu/doc/document/ST-14512-2023-INIT/en/pdf ENISA (2020): National Cybersecurity Strategies. Retrieved 02 19, 2024, from https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ ENISA (2023a): Cybersecurity Support Action. Online: https://www.enisa.europa.eu/publications/cybersecurity-support-action ENISA (2023b): Foresight 2030 Threats. Online: https://www.enisa.europa.eu/publications/foresight-2030-threats ENISA (2023c): ENISA Threat Landscape 2023 (July 2022 to June 2023). Online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023 European Commission (2020): Joint Communication to the European Parliament and the Council. The EU's Cybersecurity Strategy for the Digital Decade. JOIN(2020) 18 final. Online: https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A52020JC0018 European Commission (2021): Proposal for a Regulation of the European Parliament and of the Council Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act) and Amending Certain Union Legislative Acts. COM(2021) 206 final. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A52021PC0206 European Commission (2022): Proposal for a Regulation of the European Parliament and of the Council on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020. COM/2022/454 final. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A52022PC0454 European Commission (2023a): Commission Recommendation of 03 October 2023 on critical technology areas for the EU's economic security for further risk assessment with Member States. C(2023) 6689 final. Online: https://defence-industry-space.ec.europa.eu/commission-recommendation-03-october-2023-critical-technology-areas-eus-economic-security-further_en European Commission (2023b): Joint Communication to the European Parliament and the Council. European Union Space Strategy for Security and Defence. JOIN(2023) 9 final. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52023JC0009 European Commission (2023c): Joint Communication to the European Parliament, the European Council and the Council on “European Economic Security Strategy”. JOIN(2023) 20 final. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52023JC0020 European Commission (2023d): Proposal for a Council Recommendation on a Blueprint to coordinate a Union-level response to disruptions of critical infrastructure with significant cross-border relevance. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52023DC0526 European Commission (2023e): Proposal for a Regulation of the European Parliament and of the Council amending Regulation (EU) 2019/881 as regards managed security services. COM(2023) 208 final. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM%3A2023%3A208%3AFIN European Commission (2023f): Proposal for a Regulation of the European Parliament and of the Council Laying Down Measures to Strengthen Solidarity and Capacities in the Union to Detect, Prepare for and Respond to Cybersecurity Threats and Incidents. COM(2023) 209 final. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52023PC0209 European Cybersecurity Competence Centre and Network (2023): Strategic Agenda. Online: https://cybersecurity-centre.europa.eu/strategic-agenda_en European Parliament (2023b): Artificial Intelligence Act: Deal on Comprehensive Rules for Trustworthy AI. Online: https://www.europarl.europa.eu/news/en/press-room/20231206IPR15699/artificial-intelligence-act-deal-on-comprehensive-rules-for-trustworthy-ai European Union (2023c): European Declaration on Quantum Technologies. Online: https://ec.europa.eu/newsroom/dae/redirection/document/100585 European Union External Action (2022): A Strategic Compass for Security and Defence. For a European Union that protects its citizens, values and interests and contributes to international peace and security. Brussels, 21 March 2022. Online: https://www.eeas.europa.eu/sites/default/files/documents/strategic_compass_en3_web.pdf European External Action Service (2023): EU Statement – UN Open-Ended Working Group on ICT: Existing and Potential Threats. Online: https://www.eeas.europa.eu/delegations/un-new-york/eu-statement-–-un-open-ended-working-group-ict-existing-and-potential-threats_en ICRI (2023a): CRI Joint Statement on Ransomware Payments (2 November 2023). Online: https://www.gov.uk/government/publications/cri-joint-statement-on-ransomware-payments/cri-joint-statement-on-ransomware-payments ICRI (2023b): International Counter Ransomware Initiative 2023 Joint Statement (1 November 2023). Online: https://www.whitehouse.gov/briefing-room/statements-releases/2023/11/01/international-counter-ransomware-initiative-2023-joint-statement/ JACUCH, Andrzej (2020): Countering Hybrid Threats: Resilience in the EU and NATO’s Strategies. The Copernicus Journal of Political Studies, (1), 5–26. Online: https://doi.org/10.12775/CJPS.2020.001 KÁDÁR, Pál (2022): A kibertér és a kibertér műveleti képességek jelentősége a védelmi és biztonsági tevékenységek összehangolásában [The Importance of Cyberspace and Cyberspace Operational Capabilities in Improving Coordination of Defence and Security Activities]. Military and Intelligence CyberSecurity Research Paper 2022/7. KERSÁNSZKY, Tamás (2022): The Burden of Cyber Defense in the Common Security and Defence Policy of the EU. Safety and Security Sciences Review, 4(4), 69–79. KOVÁCS, László (2018): Cyber Security Policy and Strategy in the European Union and NATO. Land Forces Academy Review, 23(1), 16–24. Online: https://doi.org/10.2478/raft-2018-0002 KOVÁCS, László (2020): A kiberbiztonság és a kiberműveletek megjelenése Magyarország új Nemzeti Biztonsági Stratégiájában [The Appearance of Cybersecurity and Cyber Operations in the New National Security Strategy of Hungary]. Honvédségi Szemle, 148(5), 3–18. Online: https://doi.org/10.35926/HSZ.2020.5.1 Magyarország Kormánya (2023): Biztonsági osztályba sorolás és alkalmazandó védelmi intézkedések min. rendelet. Online: https://kormany.hu/dokumentumtar/biztonsagi-osztalyba-sorolas-es-alkalmazando-vedelmi-intezkedesek-min-rendelet MÓGOR, Judit – ANGYAL, István (2022): A létfontosságú rendszerek védelmére vonatkozó szabályozás fejlesztése [Development of the Regulations of the Critical Infrastructure Protection]. Scientia et Securitas, 3(2), 118–125. Online: https://doi.org/10.1556/112.2022.00102 NATO (2016a): Commitment to Enhance Resilience. Online: https://www.nato.int/cps/en/natohq/official_texts_133180.htm NATO (2016b): Cyber Defence Pledge. Online: https://www.nato.int/cps/en/natohq/official_texts_133177.htm NATO (2016c): Resilience, Civil Preparedness and Article 3. Online: https://www.nato.int/cps/en/natohq/topics_132722.htm NATO (2021a): Cyber Defence. Retrieved 02 14, 2024, from https://www.nato.int/cps/en/natohq/topics_78170.htm NATO (2021b): Strengthened Resilience Commitment. Online: https://www.nato.int/cps/en/natohq/official_texts_185340.htm NATO (2022a): Madrid Summit Declaration. Online: https://www.nato.int/cps/en/natohq /official_texts_196951.htm NATO (2022b): NATO 2022 Strategic Concept. Online: https://www.nato.int/nato_static_fl2014/assets/pdf/2022/6/pdf/290622-strategic-concept.pdf NATO (2023): Vilnius Summit Communiqué. Online: https://www.nato.int/cps/en/natohq/official_texts_217320.htm NOVÁK-VARRÓ, Virág (2021): Az „ellenálló képesség”, mint a békeépítés eszköze [Resilience as a Tool of Peacebuilding]. Hadtudomány, (3), 32–43. Online: https://doi.org/10.17047/HADTUD.2021.31.3.32 PEDERSEN, Torbjørn (2023): A Small State’s Cyber Posture: Deterrence by Punishment and Beyond Scandinavian Journal of Military Studies, 6(1), 58–68. Online: https://doi.org/10.31374/sjms.191 ROEPKE, Wolf-Diether – THANKEY, Hasit (2019): The First Line of Defence. The Three Swords Magazine, 34/2019. Online: https://www.jwc.nato.int/images/stories/_news_items_/2019/three-swords/ResilienceTotalDef.pdf STOLTENBERG, Jens (2022): Keynote address by NATO Secretary General Jens Stoltenberg at the NATO Cyber Defence Pledge Conference in Italy. Online: https://www.nato.int/cps/en/natohq/opinions_208925.htm STOLTENBERG, Jens (2023): Speech by NATO Secretary General Jens Stoltenberg at the first annual NATO Cyber Defence Conference. Online: https://www.nato.int/cps/en/natohq/opinions_219806.htm SZENES, Zoltán (2021): A hibrid fenyegetések elleni szakpolitika Magyarországon [Governmental Policy against Hybrid Threats in Hungary]. Hadtudomány, 31(4), 39–56. Online: https://doi.org/10.17047/HADTUD.2021.31.4.39 SZENES, Zoltán (2022): Elrettentés és védelem: a NATO új haderőmodellje [Deterrence and Defence: The New NATO Force Model]. Hadtudomány, 32(2), 3–17. Online: https://doi.org/10.17047/HADTUD.2022.32.2.3 United Nations (2022): Report of the Open-Ended Working Group on Security of and in the Use of Information and Communications Technologies 2021–2025. A/77/275, 8 August 2022. Legal sources 1139/2013 (III. 21.) Government Decision on the National Cyber Security Strategy of Hungary 1838/2018 (XII. 28.) Government Decision on the Strategy for the security of network and information systems in Hungary Act L of 2013 on Electronic information security of state and municipal bodies Act XCIII of 2021 on the coordination of security and defence activities Act XXIII of 2023 on cyber certification and cybersecurity authority Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive) (Text with EEA relevance). Online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022L2555 Directive (EU) 2022/2557 of the European Parliament and of the Council of 14 December 2022 on the resilience of critical entities and repealing Council Directive 2008/114/EC. Online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022L2557 Government Decree 214/2020 (V. 18.) on the Electronic Information Security Early Warning System Regulation (EU) 2022/2554 of the European Parliament and of the Council of 14 December 2022 on digital operational resilience for the financial sector and amending Regulations (EC) No 1060/2009, (EU) No 648/2012, (EU) No 600/2014, (EU) No 909/2014 and (EU) 2016/1011 (Text with EEA relevance) Online: https://eur-lex.europa.eu/eli/reg/2022/2554/oj " ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(7) "121-141" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.7" ["abstract"]=> array(1) { ["en_US"]=> string(786) "

Cyberspace phenomena are changing rapidly at international and national levels. Growing threats, new vulnerabilities and protection against them require continuous action at the level of the EU, NATO and national competent authorities and organisations. Adequate protection of critical infrastructure and cyberspace is a vital strategic, operational and technical challenge for the EU, NATO and therefore nations. Cross-border impacts, threat actors and malicious actions require coordination of international and national procedures, mechanisms and cooperation. This article presents the most important phenomena and trends experienced today, as well as EU and NATO initiatives and requirements at the strategic level, illustrating what changes can be expected in cybersecurity.

" } ["subtitle"]=> array(1) { ["en_US"]=> string(53) "Questions and Answers on How to Improve Cybersecurity" } ["title"]=> array(1) { ["en_US"]=> string(93) "Emerging Challenges and New Responses, Building Capabilities to Counter Threats in Cyberspace" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Kassai Károly" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#807 (6) { ["_data"]=> array(15) { ["id"]=> int(9261) ["email"]=> string(23) "karoly.kassai@yahoo.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7402) ["seq"]=> int(4) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0009-9398-6158" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(28) "a:1:{s:5:"hu_HU";s:3:"HVK";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Kassai" ["hu_HU"]=> string(6) "Kassai" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Károly" ["hu_HU"]=> string(7) "Károly" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(14) "cyber security" [1]=> string(34) "critical infrastructure protection" [2]=> string(12) "cyber threat" [3]=> string(13) "vulnerability" [4]=> string(20) "security requirement" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#805 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35600) ["id"]=> int(6006) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7402) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF (English)
object(Publication)#796 (6) { ["_data"]=> array(28) { ["id"]=> int(7322) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:36" ["primaryContactId"]=> int(9148) ["sectionId"]=> int(59) ["seq"]=> int(5) ["submissionId"]=> int(7198) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(15850) "BARTÓK András (2018): „Korlátok nélküli hadviselés” (超限战) – Egy kínai nézőpont a 21. század hatalmi versengéséről”. Hadtudományi Szemle, 11(3), 338–346. Online: https://folyoirat.ludovika.hu/index.php/hsz/article/view/3995/3261 BARTÓK András (2020): Sárkányok és kistigrisek: Kelet-Ázsia regionális fegyverkezési versenyének általános és országspecifikus jellemzői a Kínával kapcsolatos fenyegetettségpercepciójú országok esetében 1. Nemzet és Biztonság, 13(4), 80–101. Online: https://doi.org/10.32576/nb.2020.4.6 BARTÓK András (2022): Sokan tartanak Kína tajvani inváziójától, megnéztük a forgatókönyveket. Telex, 2022. augusztus 25. Online: https://telex.hu/velemeny/2022/08/25/tajvan-kina-aggodalmak-szembenallo-erok-invazio-forgatokonyvek-usa-japan-tamogatas BARTÓK András – WAGNER Péter (2021): A kínai A2/AD és a válaszreakciók Kelet-Ázsiában (2.). KKI Elemzések, 2021/7, 3–18. Online: https://doi.org/10.47683/KKIElemzesek.E-2021.07 BARNHART, Michael et al. (2023): Assessed Cyber Structure and Alignments of North Korea in 2023. Mandiant, 2023. október 10. Online: https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023 BERZSENYI Dániel (2023): Különleges kiberműveletek. A kiber különleges műveleti képesség és kialakításának vizsgálata. PhD-disszertáció. Nemzeti Közszolgálati Egyetem Hadtudományi Doktori Iskola. Online: https://doi.org/10.17625/NKE.2023.012 CHA, Victor – LIM, Andy (2024): Slow Boil: What to Expect from the DPRK in 2024. CSIS, 2024. január 16. Online: https://www.csis.org/analysis/slow-boil-what-expect-dprk-2024 Chainalysis Team (2023): 2022 Biggest Year Ever For Crypto Hacking with $3.8 Billion Stolen, Primarily from DeFi Protocols and by North Korea-linked Attackers. Chainalysis, 2023. február 1. Online: https://www.chainalysis.com/blog/2022-biggest-year-ever-for-crypto-hacking/ CHEONG, Wa Dae (2018): Pyongyang Joint Declaration of September 2018. Online: https://www.mofa.go.kr/eng/brd/m_5476/view.do?seq=319608&srchFr=&srchTo=&srchWord CSOMA Mózes (2006): A koreai félsziget politikai viszonyai és azok biztonságpolitikai aspektusai. PhD-disszertáció. Zrínyi Miklós Nemzetvédelmi Egyetem Hadtudományi Doktori Iskola. Online: https://nkerepo.uni-nke.hu/xmlui/bitstream/handle/123456789/12047/ertekezes.pdf;jsessionid=D2CBB0501C9C3852B9F788A081906D14?sequence=1 DEYOUNG, Karen – NAKASHIMA, Ellen – RAUHALA, Emily (2017): Trump Signed Presidential Directive Ordering Actions to Pressure North Korea. The Washington Post, 2017. szeptember 30. Online: https://www.washingtonpost.com/world/national-security/trump-signed-presidential-directive F. YANG, Fan (2022): The Problem with Ill-Substantiated Public Cyber Attribution: A Legal Perspective. In LEVITE, Ariel E. et al. (2023): Managing U.S.-China Tensions Over Public Cyber Attribution. Washington, D.C.: Carnegie Endowment for International Peace. Online: https://carnegieendowment.org/files/Perkovich_et_al_Cyber_Attribution_web.pdf GAUSE, Ken E. (2015): North Korea’s Provocation and Escalation Calculus: Dealing with the Kim Jong-un Regime. Washington: CNA Analysis & Solutions. Online: https://apps.dtic.mil/sti/tr/pdf/ADA621100.pdf GEIGENBERGER, Laura (2023): Russian Ambassador to Pyongyang Provides Insights into Current Trade with North Korea and the Status of its Weapons Development. Daily NK, 2023. május 30. Online: https://www.dailynk.com/english/russian-ambassador-to-pyongyang-provides-insights-into-current-trade-with-north-korea-and-the-status-of-its-weapons-development/ HA, Matthew (2022): The Evolution of Kim Jong Un’s ’All-Purpose Sword’. FDD, 2022. október 28. Online: https://www.fdd.org/analysis/2022/10/28/the-evolution-of-kim-jong-uns-all-purpose-sword/ HA, Mathew – MAXWELL, David (2018): Kim Jong Un’s ‘All-Purpose Sword’. North Korean Cyber-Enabled Economic Warfare. Washington, DC: FDD Press. HAIG Zsolt (2022): Kibertéri kognitív befolyásolás az információs műveletekben. Hadtudományi Szemle, 15(2), 115–130. Online: https://doi.org/10.32563/hsz.2022.2.7 HAMMER, Joshua (2018): The Billion-Dollar Bank Job. The New York Times, 2018. május 3. Online: https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-bangladesh-billion-dollar-bank-heist.html HAN, Sangmi (2016): North Korea sends 50 to 60 Talented Students to Study Abroad to Train as Cyber Agents. Voice of America, 2016. június 14. Online: https://www.voakorea.com/a/3375411.html JOHNSON, Jeff et al. (2023): 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible. Mandiant, 2023. április 20. Online: https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise JUN, Jenny – LAFOY, Scott – SOHN, Ethan (2015): North Korea’s Cyber Operations. Strategy and Responses. Lanham: Rowman & Littlefield. Online: https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/151216_Cha_NorthKoreasCyberOperations_Web.pdf KATO, Katsunobu (2017): Abductions of Japanese Citizens by North Korea. Tokyo: Secretariat of the Headquarters for the Abduction Issue. Online: https://www.mofa.go.jp/files/000433596.pdf KERTÉSZ Bence (2023): A lopakodó tigris: Észak-Korea rakétafejlesztésének titkos rekordéve. Biztonságpolitika.hu, 2023. február 11. Online: https://biztonsagpolitika.hu/kiemelt/a-lopakodo-tigris-eszak-korea-raketafejlesztesenek-titkos-rekordeve KONG, Ji-Young – LIM, Jong In – KIM, Kyoung Gon (2019): The All-Purpose Sword: North Korea’s Cyber Operations and Strategies. 11th International Conference on Cyber Conflict (CyCon), 1–20. Online: https://doi.org/10.23919/CYCON.2019.8756954 KOVÁCS László (2021): Offenzív kiberműveletek II.: Kibererők és képességeik. Hadmérnök, 16(3), 119–137. Online: https://doi.org/10.32567/hm.2021.3.7 KRASZNAY Csaba (2022): Adatok és automatizáció a kiberbiztonság szemszögéből. Századvég, 2022/1, 29–46. Online: https://szazadvegfolyoirat.hu/wp-content/uploads/2023/09/Szazadveg_2022_01_teljes.pdf KRASZNAY Csaba (2020): Kiberbiztonsági K+F+I Európában. In TÖRÖK Bernát (szerk.): Információ- és kiberbiztonság. Budapest: Ludovika, 83–97. Online: https://tudasportal.uni-nke.hu/xmlui/static/pdfjs/web/viewer.html?file=https://tudasportal.uni-nke.hu/xmlui/bitstream/handle/20.500.12944/16195/TKP_Kiberbiztonsag_01_25.pdf?sequence=1&isAllowed=y#page=84 KIM, Yonho (2014): Cell Phones in North Korea. Has North Korea Entered the Telecommunications Revolution? Washington: US–Korea Institute at SAIS – Voice of America. Online: https://38north.org/wp-content/uploads/2014/03/Kim-Yonho-Cell-Phones-in-North-Korea.pdf Kyodo News (2020): Suspected ringleader of huge, coordinated ATM scam entered N. Korea. Kyodo News (South Korea), 2020. április 5. Online: https://english.kyodonews.net/news/2020/04/2b45db5e313b-suspected-ringleader-of-huge-coordinated-atm-scam-entered-n-korea.html LEE, Yaecan (2018): Japan’s North Korean Diaspora. The Diplomat, 2018. január 5. Online: https://thediplomat.com/2018/01/japans-north-korean-diaspora/ Malpedia (2024): Lazarus Group. Online: https://malpedia.caad.fkie.fraunhofer.de/actor/lazarus_group McAffee (2011): Ten Days of Rain. Expert analysis of distributed denial-of-service attacks targeting South Korea. Online: https://www.mcafee.com/blogs/wp-content/uploads/2011/07/McAfee-Labs-10-Days-of-Rain-July-2011.pdf MCLEARY, Paul – HUDSON, Lee (2022): Better call Seoul: U.S. watches nervously as Europe turns to South Korea for weapons. Politico, 2022. november 1. Online: https://www.politico.com/news/2022/11/01/europe-south-korea-weapons-00064427 MILLER, Steve (2018): Where Did North Korea’s Cyber Army Come From? VOA News, 2018. november 20. Online: https://www.voanews.com/a/north-korea-cyber-army/4666459.html Missile Defense Project (2023): North Korean Missile Launches & Nuclear Tests: 1984–Present. Missile Threat, 2023. április 25. Online: https://missilethreat.csis.org/north-korea-missile-launches-1984-present/ MITRE ATT&CK (2023): Lazarus Group. Online: https://attack.mitre.org/versions/v7/groups/G0032/ MITRE ATT&CK (2022): Andariel. Online: https://attack.mitre.org/groups/G0138/ MONTLAKE, Simon (2012). Pyongyang Calling For Egyptian Telecoms Tycoon Naguib Sawiris. Forbes, 2012. november 19. Online: https://www.forbes.com/sites/simonmontlake/2012/11/18/pyongyang-calling-for-egyptian-telecoms-tycoon-naguib-sawiris/ NATO CCDCOE [é. n.]: Sony Pictures Entertainment attack (2014). Online: https://cyberlaw.ccdcoe.org/wiki/Sony_Pictures_Entertainment_attack_(2014) Letöltés ideje: 2020. 07. 07. NOLAND, Marcus (2009) Telecommunications in North Korea: Has Orascom Made the Connection? North Korean Review, 5(1), 62–74. Online: http://www.jstor.org/stable/43910262. PARK, Kyoung Jae – PARK, Sung Mi – JAMES, Joshua I. (2017): A Case Study of the 2016 Korean Cyber Command Compromise. European Conference on Information Warfare and Security, 315–321. Online: https://arxiv.org/pdf/1711.04500 RAHMAN, Mizanur (2016): A Forensic View of Bangladesh Bank Reserve Heist. University of Dhaka. Online: https://doi.org/10.13140/RG.2.2.35280.51200 RAMANI, Samuel (2023): North Korea’s Covert Alliance With Iran Aligned Militias in the Middle East. 38north, 2023. október 23. Online: https://www.38north.org/2023/10/north-koreas-covert-alliance-with-iran-aligned-militias-in-the-middle-east/ Recorded Future – Insikt Group (2020): How North Korea Revolutionized the Internet as a Tool for Rogue Regimes. Online: https://www.recordedfuture.com/blog/north-korea-internet-tool Republic of Korea Ministry of Foreign Affairs (2018): Panmunjom Declaration for Peace, Prosperity and Unification of the Korean Peninsula. 2018. április 27. Online: https://www.mofa.go.kr/eng/brd/m_5478/view.do?seq=319130&srchFr=&srchTo=&srchWord=&srchTp=&multi_itm_seq=0&itm_seq_1=0&itm_seq_2=0&company_cd=&company_nm=&page=1&titleNm= ROK Ministry of National Defense (2018): Defence White Paper: Changes and Challenges in the Security Environment – North Korea’s Military Command Structure. 28. 2018. december 31. Online: https://www.mnd.go.kr/user/mndEN/upload/pblictn/PBLICTNEBOOK_201908070153390840.pdf Sankei News (2016): 朝鮮大学校元幹部逮捕 「スパイ天国・日本」狙い撃ち 北朝鮮の指示役、韓国大統領選でも暗躍 (magyar nyelven: A Korea Egyetem előző intézményvezetőjének letartóztatása, „Kémek Paradicsoma, Japán” – Az észak-koreai ügynökök a dél-koreai elnökválasztással kapcsolatban is tevékenykedtek). Sankei News. 2016. Online: https://www.sankei.com/affairs/news/160202/afr1602020050-n1.html SHIM, Elizabeth (2021): Report: North Korea’s trade with China declined 80% in 2020. UPI, 2021. február 22. Online: https://www.upi.com/Top_News/World-News/2021/02/22/Report-North-Koreas-trade-with-China-declined-80-in-2020/2431614020515/ Symantec Threat Hunter Team (2023). X_Trader Supply Chain Attack Affects. Critical Infrastructure Organizations in U.S. and Europe. Symantech Enterprise Blogs, 2023. április 21. Online: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/xtrader-3cx-supply-chain SZABOLCS Laura (2020): Európai stratégiai autonómia – A közös védelem alapjai és korlátjai. Nemzet és Biztonság, 13(3), 15–35. Online: https://doi.org/10.32576/nb.2020.3.3 Taiwan National Computer Emergency Response Team (2022): Annual Report 2021. Online: https://www.twncert.org.tw/Download/TWNCERT%20Annual%20Report%202021.pdf TARAKANOV, Dmitry (2013): The „Kimsuky” Operation: A North Korean APT? Securelist, 2013. szeptember 11. Online: https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/ TÓTH András (2022): A Katonai Egységes Felhőalapú Eszközrendszer fogalmi rendszerének meghatározása. Hadtudomány, 32(4), 112–125. Online: https://doi.org/10.17047/Hadtud.2022.32.4.112 United Nations Security Council (2012): Security Council Committee Determines Entities, Goods Subject to Measures Imposed on Democratic People’s Republic of Korea by Resolution 1718 (2006). New York, 2012. május 2. Online: https://www.un.org/press/en/2012/sc10633.doc.html US Department of Defense (2023): Joint Press Statement for the 22nd Korea-U.S. Integrated Defense Dialogue. 2023. április 12. Online: https://www.defense.gov/News/Releases/Release/Article/3360919/joint-press-statement-for-the-22nd-korea-us-integrated-defense-dialogue/ Hozzáférés: 2023. 05. 31. US Department of Justice (2018): North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions. 2018. szeptember 6. Online: https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and US Department of the Treasury (2020): Guidance on the North Korean Cyber Threat. Online: https://ofac.treasury.gov/sanctions-programs-and-country-information/north-korea-sanctions US Department of Treasury (2022): Guidance on the Democratic People’s Republic of Korea information technology workers. 2022. május 16. Online: https://ofac.treasury.gov/media/923131/download?inline US Cybersecurity and Infrastructure Security Agency (2020): Guidance on the North Korean Cyber Threat. Online: https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-106a US Cybersecurity and Infrastructure Security Agency (2021): AppleJeus: Analysis of North Korea’s Cryptocurrency Malware. Online: https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-048a US Cybersecurity and Infrastructure Security Agency. (2022): North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector. 2022. július 7. Online: https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-187a WILLIAMS, Martyn (2011): North Korea’s Chinese IP addresses. 38.North, 2011. június 26. Online: https://www.northkoreatech.org/2011/06/26/north-koreas-chinese-ip-addresses/ WILLIAMS, Martyn (2014): Internet coming to Kaesong Industrial Zone. 38North, 2014. február 10. Online: https://www.northkoreatech.org/2014/02/10/internet-coming-to-kaesong-industrial-zone/ WILLIAMS, Martyn (2015): Koryolink Faces Big Problems with Cash, Competition. 38North, 2015. június 25. Online: https://www.northkoreatech.org/2015/06/25/koryolink-faces-big-problems-with-cash-competition/ WILLIAMS, Martyn (2017): Russia Provides New Internet Connection to North Korea. 38North, 2017. október 1. Online: https://www.38north.org/2017/10/mwilliams100117/ WILLIAMS, Martyn (2019): North Korea’s Koryolink: Built for Surveillance and Control. 38North, 2019. július 26. Online: https://www.northkoreatech.org/2019/07/26/north-koreas-koryolink-built-for-surveillance-and-control/ WILLIAMS, Martyn (2023a): North Korean Programmers Used a Hosted Laptop to Freelance Online, Says FBI. 38North, 2023. október 24. Online: https://www.northkoreatech.org/2023/10/24/north-korean-programmers-used-a-hosted-laptop-to-freelance-online-says-fbi/ WILLIAMS, Martyn (2023b): Is 4G on the Horizon for North Korea? 38North, 2023. november 4. Online: https://www.northkoreatech.org/2023/11/04/is-4g-on-the-horizon-for-north-korea/ WAGSTAFF, Jeremy – AUCHARD, Eric – KISELYOVA, Maria (2017): Russian Firm Provides New Internet Connection to North Korea. Reuters, 2017. október 2. Online: https://www.reuters.com/article/us-nkorea-internet-idINKCN1C70D2 YAU, Hon-min (2020): Evolving Toward a Balanced Cyber Strategy in East Asia: Cyber Deterrence or Cooperation? Issues & Studies, 56(3). Online: https://doi.org/10.1142/S1013251120400111" ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(7) "143-176" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.8" ["abstract"]=> array(2) { ["en_US"]=> string(619) "

The paper discusses the organisational structure of cyber capabilities and a hypothetical cyber warfare strategy of the Democratic People’s Republic of Korea (hereinafter referred to as the DPRK or North Korea). It aims to provide a holistic view of North Korean offensive cyberspace activities in the context of security policy in the Northeast Asian region, with a particular focus on the risks posed by strategic cooperation with the People’s Republic of China. The research was based on secondary data collection through analysis of academic literature, press reports and publicly available case studies.

" ["hu_HU"]=> string(652) "

A tanulmány bemutatja a Koreai Népi Demokratikus Köztársaság (továbbiakban KNDK vagy Észak-Korea) kiberképességeinek szervezeti felépítését és feltételezhető kiberhadviselési stratégiáját. A kutatás célja, hogy átfogó képet adjon Észak-Korea offenzív kibertéri tevékenységének biztonságpolitikai összefüggéseiről az északkeletázsiai régió vonatkozásában, különös tekintettel a Kínai Népköztársasággal történő stratégiai együttműködés jelentette kockázatokra. A kutatás szekunder adatgyűjtésre épült a rendelkezésre álló szakirodalom, sajtóhírek és esetpéldák elemzésével.

" } ["title"]=> array(2) { ["en_US"]=> string(92) "North Korean Cyber Capabilities in the Operational Environment of the Northeast Asian Region" ["hu_HU"]=> string(87) "Észak-Korea kiberképességei az északkelet-ázsiai régió műveleti környezetében" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(14) "Lendvai Tünde" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#809 (6) { ["_data"]=> array(15) { ["id"]=> int(9148) ["email"]=> string(29) "lendvai.tunde.tunde@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7322) ["seq"]=> int(5) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-3934-667X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(28) "a:1:{s:5:"hu_HU";s:3:"NKE";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(7) "Lendvai" } ["givenName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(6) "Tünde" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(2) { ["hu_HU"]=> array(5) { [0]=> string(12) "Észak-Korea" [1]=> string(15) "kiberműveletek" [2]=> string(15) "kiberstratégia" [3]=> string(4) "KNDK" [4]=> string(16) "kiberhadviselés" } ["en_US"]=> array(5) { [0]=> string(11) "North Korea" [1]=> string(4) "DPRK" [2]=> string(16) "cyber operations" [3]=> string(14) "cyber strategy" [4]=> string(12) "cyberwarfare" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#810 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35601) ["id"]=> int(6007) ["isApproved"]=> bool(false) ["locale"]=> string(5) "hu_HU" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7322) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF

Fórum

object(Publication)#182 (6) { ["_data"]=> array(28) { ["id"]=> int(7354) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2024-09-09" ["lastModified"]=> string(19) "2024-09-09 12:34:35" ["primaryContactId"]=> int(9193) ["sectionId"]=> int(71) ["seq"]=> int(1) ["submissionId"]=> int(7230) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(8743) "ADEBAJO, Adekeye (2021): The Dog That Did Not Bark: Why Has Sierra Leone Not Returned to War After Peacekeepers Left? In MCNAMEE, Terence – MUYANGWA, Monde (eds.): The State of Peacebuilding in Africa. Cham: Palgrave Macmillan, 343–361. Online: https://doi.org/10.1007/978-3-030-46636-7_19 African Union (2014): Press statement of the 432nd meeting of the PSC on ‘Unconstitutional changes of Governments and popular uprisings in Africa’. 29 April 2014. Online: https://www.peaceau.org/en/article/press-statement-of-the-432nd-meeting-on-unconstitutional-changes-of-governments-and-popular-uprisings-in-africa African Union suspends Gabon’s membership after military coup. Al Jazeera, 31 August 2023. Online: https://www.aljazeera.com/news/2023/8/31/african-union-meets-on-gabon-situation-after-military-coup American University (2017): ICE Case Studies. The Biafran War. 14 February 2017. Online: https://web.archive.org/web/20170214103207/http://www1.american.edu/ted/ice/biafra.htm Amnesty International: Nigeria 2022. Amnesty.org, https://www.amnesty.org/en/location/africa/west-and-central-africa/nigeria/report-nigeria/ ANING, Kwesi (2021): Cote d’Ivoire. Journal of International Peacekeeping, 24(3–4), 336–366. Online: https://doi.org/10.1163/18754112-24030004 ASADU, Chinedu (2021): Gunmen Kidnap 73 Students in Latest Attack on Nigeria School. AP News, 1 September 2021. Online: https://apnews.com/article/africa-education-nigeria-9408a6c2d1895d1a465cc3045c004cbd BERTSCH, Gary K. – CLARK, Robert P. – WOOD, David M. (1978): Comparing Political Systems. Power and Policy in Three Worlds. New York: Wiley. Britannica, T. Editors of Encyclopaedia (2024): Laurent Kabila. Encyclopedia Britannica, 25 April, 2024. Online: https://www.britannica.com/biography/Laurent-Kabila Business Day (2014): Nigeria’s porous borders, 28 April 2014. Online: https://businessday.ng/editorial/article/nigerias-porous-borders/ Business Day (2020): Nigeria re-elected UN Peacekeeping Committee chair. 7 March 2020. Online: https://businessday.ng/uncategorized/article/nigeria-re-elected-un-peacekeeping-committee-chair/ BUZAN, Barry – WÆVER, Ole (2003): Patterns of Regional Security post-Cold War. In Regions and Powers: The Structure of International Security. Cambridge: Cambridge University Press, xxvi–xxvi. Online: https://doi.org/10.1017/CBO9780511491252.003 BUZAN, Barry – WÆVER, Ole (2003): Regions and Powers: The Structure of International Society. Cambridge: The Press Syndicate of the University of Cambridge. Online: https://doi.org/10.1017/CBO9780511491252 BUZAN, Barry – WÆVER, Ole – DE WILDE, Jaap (1998): Security: A New Framework for Analysis. Boulder, Colo.: Lynne Rienner. Online: https://doi.org/10.1515/9781685853808 CLAPHAM, Christopher (1996): Africa and the International System: The Politics of State Survival. Cambridge: Cambridge University Press. Cameroon’s President Biya reshuffles top military brass. TRT Afrika, 31 August 2023. Online: https://www.trtafrika.com/africa/cameroons-president-biya-reshuffles-top-military-brass-14757982 COLLINS, Alan ed. (2016): Contemporary Security Studies (4th ed.). Oxford: Oxford University Press. DIALLO, Tiemoko – ROSS, Aaron (2020): U.S. Halts Military Cooperation with Mali as Coup Supporters Celebrate. Reuters, 21 August, 2020. Online: https://www.reuters.com/article/mali-security-idINKBN25H1A9/ DUNNE, Tim – SCHMIDT, Brian (2001): Realism. In BAYLIS, John – SMITH, Steve (eds.): The Globalization of World Politics: An Introduction to International Relations. New York: Oxford University Press. DUZOR, Megan – WILLIAMSON, Brian (2023): Coups in Africa. Voice of America News, 3 October 2023. Online: https://projects.voanews.com/african-coups/ EROMOSELE, Fortune (2022): Insecurity: 6,895 persons killed in 2021 – Report. Vanguard, 27 May 2022. Online: https://www.vanguardngr.com/2022/05/insecurity-6895-persons-killed-in-2021-report/ History (2018): Former Liberian president Charles Taylor found guilty of war crimes. 18 May 2018. Online: https://www.history.com/this-day-in-history/former-liberian-president-charles-taylor-found-guilty-of-war-crimes Human Rights Watch (1997): Nigeria’s Intervention in Sierra Leone. Online: https://www.hrw.org/reports/1997/nigeria/Nigeria-09.htm#P602_157494 Insecurity: 63,111 Persons Killed in Buhari’s Eight Years (2023). Vanguard, 20 May 2023. Online: https://www.vanguardngr.com/2023/05/insecurity-63111-persons-killed-in-buharis-eight-years/#:~:text=A%20new% ISILOW, Hassan (2023): Chains of Colonialism. Western Powers in Africa vying for Control, Geopolitical Edge. Anadolu Agency, 27 July 2023. Online: https://www.aa.com.tr/en/africa/-chains-of-colonialism-western-powers-in-africa-vying-for-control-geopolitical-edge/2956190 JOWETT, Philip (2016). Modern African Wars. The Nigerian-Biafran War 1967–70. Oxford: Osprey. MOLNÁR, D. (2008): ECOMOG: The Example of a Viable Solution for African Conflicts. AARMS – Academic and Applied Research in Military and Public Management Science, 7:1 55–61. MOLNÁR, D. (2009): Charles Taylor’s Trial: It has Started. AARMS – Academic and Applied Research in Military and Public Management Science, 8(1), 83–89. OMOTUYI, Sunday (2021): Reassessing the Power of a Sub-Regional Security Provider: The Case of Nigeria in the Gambian Crisis. The African Review, 48(2), 359–380. Online: https://doi.org/10.1163/1821889X-12340056 Nigeria Police Force n.d. Peacekeeping office. Online: https://www.npf.gov.ng/info/peace_keeping.php NUGENT, Paul (2009): Nkrumah and Rawlings: Political Lives in Parallel? Transactions of the Historical Society of Ghana, (12), 35–56. NUHU, Salome (2019): All Africans Travelling to Nigeria Can Get Visa on Arrival from 2019 – Official. Premium Times, 11 December 2019. https://www.premiumtimesng.com/news/headlines/367865-all-africans-travelling-to-nigeria-can-get-visa-on-arrival-from-2019-official.html Nigerian Ministry of Foreign Affairs, (n.d): Foreign Policy. Online: https://foreignaffairs.gov.ng/about-us/foreign-policy/ OGUNDIPE, Samuel (2018): Buhari blames Gaddafi for killings across Nigeria. Premium Times, 12 April 2018. Online: https://www.premiumtimesng.com/news/top-news/264764-buhari-blames-gaddafi-for-killings-across-nigeria.html PALMISANO, Laura – MOMODU, Sulaiman (2013): UNHCR Completes Repatriation of 155,000 Liberians. unhcr.org, 4 January 2013. Online: https://www.unhcr.org/news/stories/unhcr-completes-repatriation-155000-liberians POWELL, Jonathan M. – THYNE, Clayton L. (2011): Global Instances of Coups from 1950 to 2010: A new Dataset. Journal of Peace Research, 48(2), 249–259. Online: https://doi.org/10.1177/0022343310397436 Punch (2023): Nigeria spent $8bn to restore peace in Liberia, says Irabor. 24 May 2023. Online: https://punchng.com/nigeria-spent-8bn-to-restore-peace-in-liberia-says-irabor/ Reuters (2023): Mali, Niger and Burkina Faso Sign Sahel Security Pact. 16 September 2023. Online: https://www.reuters.com/world/africa/mali-niger-burkina-faso-sign-sahel-security-pact-2023-09-16 Rwanda’s Kagame Fires Slew of Military Officials in Big Shake-Up. Al Jazeera, 7 June 2023. Online: https://www.aljazeera.com/news/2023/6/7/rwandas-kagame-fires-slew-of-military-officials-in-major-shakeup Sahara Reporters (2023): ECOWAS Imposes ‘Stiff’ Sanctions Against Niger Republic, Coup Leaders And Families. 30 July 2023. Online: https://saharareporters.com/2023/07/30/ecowas-imposes-stiff-sanctions-against-niger-republic-coup-leaders-and-families Twenty-first conference of heads of states, Decision A/DEC.5/10/98 Relating to the regulations on Transhumance between ECOWAS Member States (1998). ECOWAS Official Journal, 35, 1–14. Online: https://www.ecpf.ecowas.int/wp-content/uploads/2016/01/Decision-1998-English.pdf UCHE, Chibuike (2008): Oil, British Interests and the Nigerian Civil War. The Journal of African History, 49(1), 111–135. Online: https://doi.org/10.1017/S0021853708003393 UNICEF (2022): Global Annual Results Report 2022. Online: https://www.unicef.org/media/142921/file/Global%20annual%20results%20report%202022:%20Goal%20area%202.pdf UN Nigeria (2023): We salute Nigerian UN Peacekeepers, past and present – Schmale. 30 May 2023. Online: https://nigeria.un.org/en/234801-we-salute-nigerian-un-peacekeepers-past-and-present War in Ukraine: What Does the Death Toll Mean? Arolsen Archives, 6 October, 2022. Online: https://arolsen-archives.org/en/news/war-in-ukraine-what-does-the-death-toll-mean/ War Crimes Court Finds Charles Taylor Guilty (2012). Al Jazeera, 27 April 2012. Online: https://www.aljazeera.com/news/2012/4/27/war-crimes-court-finds-charles-taylor-guilty#:~:text=According" ["copyrightYear"]=> int(2024) ["issueId"]=> int(545) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(7) "177-195" ["pub-id::doi"]=> string(20) "10.32567/hm.2024.1.9" ["abstract"]=> array(1) { ["en_US"]=> string(1786) "

Over the years, Africa has continued to experience conflicts caused by civil wars and the tussle for power through military coups. Despite having the Mediation & Security Council within ECOWAS, it has been unable to create sustainable peace within the region. The many porous borders between the countries further exacerbate the complexities of its regional security. The consequences of these problems usually affect neighbouring countries, thereby resulting in regional security complexes and the consequent challenges of peacekeeping operations. This paper uses historical, descriptive and comparative analysis by focusing on coups as precursors to security challenges in the region of West Africa and the resulting peacekeeping operations by countries such as Nigeria. Based on the premise of ECOWAS, it introduces some conflicts caused by coups; the challenges of Regional Security Complex in West Africa and the examination of Nigerian Peacekeeping efforts. Furthermore, it offers some recommendations towards sustainable regional peace. Results show that there is a need for the African Union (AU) to do more to secure the continent. Reliance on non-African countries to support its internal security problems has become counterproductive. It recommends that Nigeria should temporarily suspend its peacekeeping operations and channel its resources towards addressing its internal security challenges; that the AU must establish a standing army as a quick response force to address the various continental crises before they become exponential threats and that ECOWAS should implement its common currency plan. Finally, the African Union must develop best practices that can alleviate poverty and guarantee security in line with the 17 UN Sustainable Development Goals.

" } ["title"]=> array(1) { ["en_US"]=> string(106) "Coups, Regional Security Complexes and the Impact of Nigeria’s Peacekeeping in West Africa, 1960– 2022" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(25) "Frederick Omoyama Odorige" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#777 (6) { ["_data"]=> array(15) { ["id"]=> int(9193) ["email"]=> string(20) "fodorige@hotmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(7354) ["seq"]=> int(1) ["userGroupId"]=> int(184) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0009-0004-3435-3602" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(63) "a:1:{s:5:"hu_HU";s:37:"National University of Public Service";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(17) "Frederick Omoyama" ["hu_HU"]=> string(17) "Frederick Omoyama" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Odorige" ["hu_HU"]=> string(7) "Odorige" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(7) "Nigeria" [1]=> string(6) "ECOWAS" [2]=> string(16) "security complex" [3]=> string(12) "peacekeeping" [4]=> string(6) "region" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#783 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(35602) ["id"]=> int(6008) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(7354) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF (English)