Narrow your search

Library

KU Leuven (3)

ULB (3)

ULiège (3)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

VIVES (2)

Vlaams Parlement (2)

VUB (2)

More...

Resource type

book (6)

digital (2)


Language

English (6)


Year
From To Submit

2022 (2)

2021 (3)

2012 (1)

Listing 1 - 6 of 6
Sort by

Multi
Michael Palaiologos and the Publics of the Byzantine Empire in Exile, c.1223-1259
Author:
ISBN: 9783031092787 9783031092770 9783031092794 9783031092800 Year: 2022 Publisher: Cham Springer International Publishing, Imprint: Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book follows the public life of Michael Palaiologos from his early days and upbringing, through to his assumption of the Byzantine imperial throne in 1258. It explores multiple narratives, highlighting the various public communities in the Byzantine polity, primarily focusing on intellectuals and clerks rather than the emperor himself. Drawing on insights from power relations, studies of class and the public sphere, this book provides an account of thirteenth-century Byzantium that highlights the role of communicative and symbolic actions in the public sphere, and argues they were integral to Palaiologos' political success. Aleksandar Jovanović is Sessional Instructor in History at the University of the Fraser Valley in Abbotsford, Canada. .


Book
Michael Palaiologos and the Publics of the Byzantine Empire in Exile, c.1223-1259
Authors: ---
ISBN: 9783031092787 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Byzantine Empire --- History. --- History


Book
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry
Authors: --- ---
Year: 2021 Publisher: Norwell, Massachusetts : Now Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well.


Book
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry
Authors: --- ---
Year: 2021 Publisher: Norwell, Massachusetts : Now Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well.


Book
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry
Authors: --- ---
Year: 2021 Publisher: Norwell, Massachusetts : Now Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well.


Multi
Social Unrest
Authors: --- --- ---
ISBN: 9789264173460 Year: 2012 Publisher: Paris Organization for Economic Cooperation and Development

Loading...
Export citation

Choose an application

Bookmark

Abstract

This report develops a framework of social unrest within a complex understanding of systemic risk. The goal is to try to identify triggers (events that lead to social unrest) and drivers (causal roots) for the emergence of social unrest and, based on this functional analysis, to design policy options on how to avoid, mitigate or handle unrest. The framework should enable a better understanding of the circumstances that may trigger social unrest, how intensely that unrest is likely to materialize and what interventions promise to de-escalate the conflict or even prevent social unrest in the first place. Since social unrest is more a process of escalation than a finite state of the world, the term has been conceptualized in a step-by-step escalation scheme. Each step makes social unrest more severe. It is a gradual framework that identifies the different stages that make social unrest more and more probable. In order to identify relevant drivers and cluster of drivers, three case studies are investigated: pandemics, cyber-related risk and financial crises. The main question is how did or could these events cause social unrests. In a second step, an analytic model is used to capture the combined effects learned from the case study analysis. In a third step,the IRGC risk governance model for explaining the risk of social unrest or predicting the consequences of social unrest is applied. Finally , guidelines for normative governance with respect to social unrest are developed.

Keywords

Social conflict --- Research.

Listing 1 - 6 of 6
Sort by