All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

SOFTWARE METHODOLOGY FOR SOFT TARGET IDENTIFICATION BASET ON METHODS OF IDENTIFICATION OF SOFT TARGETS

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F20%3A63526210" target="_blank" >RIV/70883521:28140/20:63526210 - isvavai.cz</a>

  • Result on the web

    <a href="http://trilobit.fai.utb.cz/Data/Articles/PDF/a90988d0-00c3-442c-82a5-7ba337bf92d9.pdf" target="_blank" >http://trilobit.fai.utb.cz/Data/Articles/PDF/a90988d0-00c3-442c-82a5-7ba337bf92d9.pdf</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    SOFTWARE METHODOLOGY FOR SOFT TARGET IDENTIFICATION BASET ON METHODS OF IDENTIFICATION OF SOFT TARGETS

  • Original language description

    The paper aims to analyze soft targets. Basic terms are defined, one of the parts is terrorism and the next part describes the definition of soft targets. Risk analysis is described. Terrorism became perceived as the most serious threat. Modern technologies create preconditions for abuse for terrorist purposes. Terrorists often plan and implement attacks on soft targets, which are characterized as places with a high concentration of civilian population. Securing soft targets against a terrorist attack is very difficult. In the paper, the part focuses on selecting a suitable methodology for soft target analysis, making soft target analysis and designing MIST software to better identify soft targets. The soft target identification method implemented in the MIST software will show the highest values reaching the targets with minimal or no action and at a certain time, there are many civilian populations. Considerable attention should be given to them as they are easy targets for terrorists.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>ost</sub> - Miscellaneous article in a specialist periodical

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Trilobit

  • ISSN

    1804-1795

  • e-ISSN

  • Volume of the periodical

    Neuveden

  • Issue of the periodical within the volume

    1

  • Country of publishing house

    CZ - CZECH REPUBLIC

  • Number of pages

    6

  • Pages from-to

    1-6

  • UT code for WoS article

  • EID of the result in the Scopus database