Authors:József Kovács, László Márkus, and Gábor Halupka
, OK, EPA/600/2-85/0108, p. 163. - In: R. Gogu, A. Dassargues 1998: A short overview on groundwater vulnerability assessment - basic statements for use in the framework of the COST 620 Action.
COST Action 65 1995
Authors:Adrian Parke, Mark Griffiths, Julie Pattinson, and David Keatley
uses descriptors to classify level of illness and physical vulnerability, ranging from 1 (“ very fit ”) to 7 (“ severely frail and completely dependent on others for activities for daily living; or terminally ill ”). The instrument is recognized as
Authors:Bryant P. H. Hui, Anise M. S. Wu, and Ngai Pun
, we conducted a large study ( N = 3,348) in nine Chinese vocational schools, which contain the largest proportion of vulnerable online gamers, and structural equation modeling (SEM) was employed to test our hypotheses.
Összefoglalás. Jelen cikk célja a járműipar egyes területeit érintő
kiberbiztonsági kockázatok vizsgálata. Fentiekkel összhangban a cikk első részében a
járműipar kiberbiztonsági szempontból releváns területei kerülnek meghatározásra. Ezt
követően megtörténik a 2018. évben rögzített járműipari kibertámadások kockázatalapú
Summary. Nowadays, cybersecurity has a critical impact to our lives. The
Internet has also got a substantial role in our days since many people are constantly
connected to the Internet (e.g., through online social networks) . Besides,
numerous personal and individual devices are connected. The growing number of
connected devices and cyberspace expansion make our lives easier. However, this
affects our privacy, with the potential for unauthorized use of personal information.
In summary, life in a networked world carries unknown dangers.
In the future, many new risk factors are expected to occur, which will significantly
increase the level of cybersecurity threats. Examining the aspects of the automotive
industry, we should mention the summary of which explores the field’s problems through novel theoretical
solutions and related practical considerations. The book pays special attention to
vehicle communication and networked systems. This book examines three main scientific
directions for 5G-compliant vehicle-to-vehicle communication and cooperative vehicle
control: modeling and testing capabilities for vehicle-to-vehicle communication,
state-of-the-art technologies related to the physical layer, and MAC design
Cheng and colleagues examined the communication channels currently applied in
the automotive industry or that are expected to be applied soon. Particular attention
has been paid to examining the tasks and challenges that need to be addressed in
order to support the spread of the connected transport systems in the future. The
evaluation focused on the cooperation of connected vehicles. Their study also
outlined the most important security risks and challenges associated with new
In the light of the above-mentioned considerations, it can be said that the emergence
of connected and autonomous vehicles can make a significant contribution to the
positive effects of cyberspace, but can also have a disadvantageous impact on the
vulnerability of transport processes.
In line with this, it is important to examine and understand the vulnerabilities of
connected and autonomous vehicles, the threats to vehicles. With this knowledge,
automotive cybersecurity professionals’ responsibility is to develop appropriate
security functions and capabilities for connected and autonomous vehicles and
transport systems. This enables the systems to detect, evaluate, and, if necessary,
treat different attacks and malicious interventions.
Along with the above objectives, many research studies in the automotive segment have
already focused on identifying cybersecurity assessment frameworks for motor
vehicles. Among these, it is worth highlighting the projects “HEAling Vulnerabilities
to ENhance Software Security and Safety” and “E-safety vehicle intrusion protected
Authors:Erika Dobó, Mária Fekete-Farkas, Mahesh Kumar Singh, and István Szûcs
Agricultural Vulnerability, World Summit on Sustainable Development, Johannesburg
IPCC, 2000, Summary for Policymakers, Emissions Scenarios, Special Report of IPCC Working Group III, Intergovernmental Panel on Climate