- Information and Cyber Security
- Blockchain Technology Applications and Security
- Hungarian Social, Economic and Educational Studies
- Smart Grid Security and Resilience
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Educational Challenges and Innovations
- Digital Transformation in Industry
- Advanced Malware Detection Techniques
- Cybersecurity and Cyber Warfare Studies
- Security and Verification in Computing
- Supply Chain Resilience and Risk Management
- Cybersecurity and Information Systems
- European and Russian Geopolitical Military Strategies
- Digital Platforms and Economics
- Education, Technology, and Ethics
- Cloud Computing and Resource Management
- Defense, Military, and Policy Studies
- Autonomous Vehicle Technology and Safety
- Impulse Buying and Technology Impacts
- Economic and Technological Systems Analysis
- User Authentication and Security Systems
- IoT Networks and Protocols
- Robotics and Automated Systems
- Software-Defined Networks and 5G
Obuda University
2016-2025
Buda Health Center
2022-2024
Advisory Board Company (United States)
2020
American Jewish Committee
2019
Aurel Vlaicu University of Arad
2019
Wakayama University
2019
Waseda University
2019
Boğaziçi University
2019
Sindh Madressatul Islam University
2019
Sapientia Hungarian University of Transylvania
2019
Industry 4.0, the digital transformation of industry, is enabled, and forced by rapid technology development. The fast changing environment presents huge challenges for enterprises, economies. Management enterprises must have a clear view their companies' preparedness this fourth industrial revolution making appropriate decisions to preserve or improve competitiveness. 4.0 readiness assessments, maturity models can support management at benchmarking, setting up roadmap company.
Digitization changes our world. Industry 4.0, the digital transformation of manufacturing labor market. The impacts rapid technology development fourth industrial revolution present huge challenges for society and policy makers. Are we facing reduction employment by automation rendering human work force uncompetitive with machines? Can creation new fields employment, types jobs compensate loss traditional market requirements?
A tanulmány a social engineering támadások és pszichológiai manipuláció szerepét vizsgálja az objektumvédelemben, kiemelten biztonsági személyzet befolyásolhatóságát. támadók humán tényezőt célozzák, kihasználva kognitív torzításokat döntéshozatali hibákat. kutatás elemzi pretexting, tailgating, phishing, tekintélyelvű stressz indukció hatékonyságát. Esettanulmányok igazolják, hogy képzés, technológiai védelem szervezeti protokollok kombinációja csökkenti kockázatát. jövőbeni fenyegetések...
In the near future, drivers will be supported with an intelligent traffic system everywhere by early warning signals. Moreover, this can help to minimize vehicle collisions; increase safe road; decrease fatal injury for pedestrians, passengers, and drivers; inter-vehicle communication. These are some benefits of communication (V2V). With development technology, these vehicles communicate together infrastructure or Road Side Units (RSU). article, authors explored basic concepts Furthermore,...
Abstract The information society is a complex network of interconnected public and private entities human beings. Many them choose certain level technological development from the generally available solutions to support internal processes attaining objectives that operations, creating dependence via or external services communication technologies (ICTs). Due caused by ICTs, society-wide political need has arisen for tackling security requirements cyberspace in several sectors satisfy...
Nowadays, organizational success depends on internal efforts and how organizations can manage a global supply chain network. Due to the growing complexity of chains number stakeholders involved, tracking products services in real time making quick decisions is even more critical. Therefore, digital transformation network needed. Such change be accelerated through 5G technology focusing communications between several sensors, devices, machines. This article highlighted importance...
This Article highlights the rapid evolution of mobile technology from 4G to 5G, particularly in Middle East and North Africa (MENA) region. By 2030, 5G is expected dominate with 5.3 billion connections, offering improved network security, encryption, threat detection. CISOs organizations can leverage 5G's speed AI for better identification resolution. However, it also introduces security challenges, including cybersecurity threats, supply chain vulnerabilities, privacy concerns, IoT device...
Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. development is increasing fast while related drop behind, example the mass awareness security. However new generation upload videos pictures without reason to storage, but only few know about data privacy, management proprietary stored in cloud. In an enterprise environment users have rule usage, however they little knowledge traditional IT It...
The rapid development of new technologies has led to a change in the ways manufacturing industrial organizations.As result this development, many companies and factories started look for forms organizational structure implementation their process.In context, CAD/CAM/CAE systems play crucial role process generally transition digital manufacturing, as basis revolution.This paper presents application product life-cycle, namely an advanced system support lean initiative SMMEs Kosovo means...
Significant advancements in communication and processing technology over the past two decades have led to emergence of new intelligent objects known as "Internet Things" (IoT). These "things" range from wearable technology, such smartwatches, infrastructures for transportation, energy, information, health care, financial services. They are linked through an Internet-connected control system order provide The majority modern industrial critical (CIs) rely on Supervisory Regulate Data...
The amount of information and the need for is fast increasing today, it will further multiply in coming years. critical infrastructure ensures welfare state its citizens. Everyday decision-making requires a large various types. present publication show relationship between Big Data. emergence use Data have been greatly emphasized recent conceptual practical manifestations phenomenon. history also be discussed, as well conditions possibilities applications, which serve next period economic...
An important element of current systems’ sustainability is to increase efficiency gains in every part the system. Because this, not only those systems are based on information and communication technology that exist cyberspace, but also have material manifestation. Cloud computing one building blocks technology. Therefore cloud has an impact all industries. This reason why result examination important. The purpose this paper synthesize general architecture standardize further studies...
An increasing number of wireless Internet users and deployed access points over the past several years have raised importance security issues.The absolute majority are not IT professionals, but a population unaware types, settings importance.Wireless assessment analytics can help in raising awareness their skills, leading to improvement entire situation.In this paper short overview history is presented.The methodology tools for more accurate assessment, including data acquisition, processing...
The increasing interconnectivity and reliance on Supervisory Control And Data Acquisition (SCADA) systems have introduced new challenges in securing critical infrastructures. Among these challenges, the threat of malware attacks SCADA has emerged as a significant concern. This article aims to provide an in-depth analysis targeting systems, examining their potential impact, techniques employed by attackers, consequences operational functionality. Additionally, it explores effective...
Blockchain technology has the potential to provide a secure digital ledger for tracking financial transactions across internet. Which is projected serve as conceptual foundation "Distributed autonomous organizations (DAOs), were launched destabilize existing hierarchical management structure and drastically cut enterprises' communication, management, cooperation costs. Meanwhile, DAOs continue confront other obstacles, including security privacy concerns, an unknown legal position, etc....
5G networks play a fundamental role in the EU development efforts due to advanced capabilities for improving existing services and advancing new technologies multidisciplinary fields. This paper uses Spain as an example of deployment implementation practices. It presents actual state Spanish 5G, frameworks, updated applications, opportunities. will illustrate some initiatives that have been useful performing well regarding objectives towards productivity, resilience, growth.
The 5G networks will be governed by laws on supply chain cybersecurity since they are crucial for the digital transformation of economy and societies [1]. Numerous European documents emphasize cyber vulnerabilities in call Member States to pass legislation allowing suppliers risk-assessed. According EU Toolbox, these analyses should consider technical non- concerns, such as supplier's dependency foreign nations [2]. Many countries have yet implement this area, proposed law establishing a...
One of the main objectives smart city is to improve quality life.The information and communication technology (ICT) components are used as vital parts system.Increasing efficiency base city's sustainability.Therefore increase ICT crucial.Although cloud just one possible building block infrastructure its theoretical study by important because technologies can be extended use other technologies.Because these possibilities, should potential regularities operation which affects among things,...
Analyzing security issues in systems can depend on many parameters. The purpose of this paper is to develop a modeling that be applied uniformly all systems. For purpose, system parameters found every examined. background the research problem safety. topic examine relationships between components determine safety without exact interpretation standardization process based philosophical main topics. Elements model derived from abstract categories human thinking. study cybernetics with energy...
One of the basic components smart city concept is infocommunication infrastructure.The purpose system is, among others, to transmit information.Generally, besides necessary information provided in a transmission, some additional displayed as well.In public communication destination not specific person or object.Therefore, can be obtained by anyone.Thus, such facilitates unwanted acquisition and its later use.The present study illustrates role obtaining through an example online game.This...
SCADA is the acronym for Supervisory Control and Data Acquisition. This system helps users to monitor control complex processes in industry aspects. Nowadays, operates private companies governmental institutions. However, vulnerabilities threats are rapidly increasing among these systems, especially with deployment of 5G network. Therefore, effect a security breach can be widely spread economy community. Moreover, breaches systems lead severe consequences due nature infrastructure they...
5G stands for the fifth and latest generation in wireless networks. It offers three main technological advances compared to previous standards: more speed network, reduced latency, higher bandwidth. These improvements bring many applications different industries such as manufacturing, healthcare, transportation, more. However, it also faces various issues regarding spectrum, deployment, security. This paper aims provide an updated overview of this technology, opportunities, challenges raise...