This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n17http://localhost/temp/predkladatel/
n10http://purl.org/net/nknouf/ns/bibtex#
n16http://linked.opendata.cz/resource/domain/vavai/projekt/
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n15http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F60162694%3AG43__%2F14%3A00523325%21RIV15-MV0-G43_____/
n4http://linked.opendata.cz/ontology/domain/vavai/
n18https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n11http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n22http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n14http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F60162694%3AG43__%2F14%3A00523325%21RIV15-MV0-G43_____
rdf:type
n4:Vysledek skos:Concept
rdfs:seeAlso
http://vavtest.unob.cz/registr
dcterms:description
The frequency and sophistication of manmade attacks has been increasing in the past few years. As a result, it is becoming increasingly important to identify potential attacker targets for complex facilities of critical infrastructure. Potential targets need to be identified in order to be able to provide physical protection around these targets or areas of their location. Target identification is an essential part of the physical protection design and evaluation process. The paper presents information about the novel method of target identification and the tool TARGI. The developed method is to be demonstrated on a practical case and will be suggested areas of where it can be applied to critical infrastructure. The frequency and sophistication of manmade attacks has been increasing in the past few years. As a result, it is becoming increasingly important to identify potential attacker targets for complex facilities of critical infrastructure. Potential targets need to be identified in order to be able to provide physical protection around these targets or areas of their location. Target identification is an essential part of the physical protection design and evaluation process. The paper presents information about the novel method of target identification and the tool TARGI. The developed method is to be demonstrated on a practical case and will be suggested areas of where it can be applied to critical infrastructure.
dcterms:title
A Novel Tool and Method for Target Identification A Novel Tool and Method for Target Identification
skos:prefLabel
A Novel Tool and Method for Target Identification A Novel Tool and Method for Target Identification
skos:notation
RIV/60162694:G43__/14:00523325!RIV15-MV0-G43_____
n3:aktivita
n22:P
n3:aktivity
P(VG20112015040)
n3:dodaniDat
n14:2015
n3:domaciTvurceVysledku
n13:9842853 n13:3664635
n3:druhVysledku
n8:D
n3:duvernostUdaju
n19:S
n3:entitaPredkladatele
n15:predkladatel
n3:idSjednocenehoVysledku
1010
n3:idVysledku
RIV/60162694:G43__/14:00523325
n3:jazykVysledku
n12:eng
n3:klicovaSlova
security; physical protection; target identification; vital area identification; attack tree-based target identification
n3:klicoveSlovo
n11:target%20identification n11:physical%20protection n11:security n11:vital%20area%20identification n11:attack%20tree-based%20target%20identification
n3:kontrolniKodProRIV
[6BBD73CBE8AA]
n3:mistoKonaniAkce
Rome, Italy
n3:mistoVydani
New York, Spojené státy americké
n3:nazevZdroje
Proceedings of 48th Annual 2014 IEEE International Carnahan Conference on Security Technology (ICCST)
n3:obor
n9:JC
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
3
n3:projekt
n16:VG20112015040
n3:rokUplatneniVysledku
n14:2014
n3:tvurceVysledku
Malach, Jindřich Vintr, Zdeněk Malachová, Tereza
n3:typAkce
n20:WRD
n3:zahajeniAkce
2014-10-13+02:00
s:numberOfPages
5
n10:hasPublisher
IEEE
n18:isbn
978-1-4799-3530-7
n17:organizacniJednotka
G43