This HTML5 document contains 41 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n14http://purl.org/net/nknouf/ns/bibtex#
n4http://localhost/temp/predkladatel/
n18http://linked.opendata.cz/resource/domain/vavai/projekt/
n9http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n6http://linked.opendata.cz/ontology/domain/vavai/
n22https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n17http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F60162694%3AG43__%2F14%3A00520717%21RIV15-MV0-G43_____/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n11http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n21http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F60162694%3AG43__%2F14%3A00520717%21RIV15-MV0-G43_____
rdf:type
n6:Vysledek skos:Concept
rdfs:seeAlso
http://vavtest.unob.cz/registr
dcterms:description
The aim of the paper is to describe a possible way of assessments of the consequences when attacking on an object of critical infrastructure. Several characteristics of the impacts outcomes were obtained. For this reason, as well as for modelling of adversary´s behaviour impact, fuzzy logic tools have been used. The aim of the paper is to describe a possible way of assessments of the consequences when attacking on an object of critical infrastructure. Several characteristics of the impacts outcomes were obtained. For this reason, as well as for modelling of adversary´s behaviour impact, fuzzy logic tools have been used.
dcterms:title
Contribution to assessments of impacts on the critical infrastructure Contribution to assessments of impacts on the critical infrastructure
skos:prefLabel
Contribution to assessments of impacts on the critical infrastructure Contribution to assessments of impacts on the critical infrastructure
skos:notation
RIV/60162694:G43__/14:00520717!RIV15-MV0-G43_____
n3:aktivita
n7:P
n3:aktivity
P(VG20112015039)
n3:dodaniDat
n5:2015
n3:domaciTvurceVysledku
n9:5552575
n3:druhVysledku
n19:D
n3:duvernostUdaju
n8:S
n3:entitaPredkladatele
n17:predkladatel
n3:idSjednocenehoVysledku
8829
n3:idVysledku
RIV/60162694:G43__/14:00520717
n3:jazykVysledku
n21:eng
n3:klicovaSlova
vulnerability; critical infrastructure; diffusion processes; target identification
n3:klicoveSlovo
n11:target%20identification n11:critical%20infrastructure n11:vulnerability n11:diffusion%20processes
n3:kontrolniKodProRIV
[58D70BBE8F5B]
n3:mistoKonaniAkce
Bucharest, Romania
n3:mistoVydani
Switzerland
n3:nazevZdroje
Applied Mechanics and Materials
n3:obor
n16:JS
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
1
n3:projekt
n18:VG20112015039
n3:rokUplatneniVysledku
n5:2014
n3:tvurceVysledku
Vališ, David
n3:typAkce
n20:EUR
n3:zahajeniAkce
2014-01-01+01:00
s:numberOfPages
10
n14:hasPublisher
Trans Tech Publications
n22:isbn
978-3-03835-274-7
n4:organizacniJednotka
G43