Martin Hromada

Orcid: 0000-0003-0347-7528

According to our database1, Martin Hromada authored at least 24 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Importance of Resistance in the Context of Critical Infrastructure Resilience: An Extension of the CIERA Method.
Syst., October, 2023

2022
CBRN Weapons as a Threat to Critical Infrastructure Elements.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022

Analysis of Current Preventive Approaches in the Context of Cybersecurity.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2022

Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing Countries.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2022

Evaluation of the most important fire threats of the building.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2022

Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets - Self-defense part.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2022

Online Interactive Education of People in the Field of Protection of Soft Targets.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2022

2021
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment.
Int. J. Crit. Infrastructure Prot., 2021

The Concept of a Software Tool with an Interactive Map for Identification and Determination of Soft Targets of Transport Infrastructure.
Proceedings of the 2021 International Carnahan Conference on Security Technology, 2021

2020
Integrated Rescue System and the Use of Unmanned Aerial Vehicle not only for the Population Protection.
Proceedings of the ICMHI 2020: 4th International Conference on Medical and Health Informatics, 2020

2019
Complex approach to assessing resilience of critical infrastructure elements.
Int. J. Crit. Infrastructure Prot., 2019

The Use of Simulation Software for Emergency Supply Transport to the Hospital.
Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, 2019

Traffic Control Through Traffic Density.
Proceedings of the 3rd European Conference on Electrical Engineering and Computer Science, 2019

2018
Cascading Impact Assessment in a Critical Infrastructure System.
Int. J. Crit. Infrastructure Prot., 2018

The Soft Target Assessment and Software Tool.
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018

Novelty Detection System Based on Multi-criteria Evaluation in Respect of Industrial Control System.
Proceedings of the Cybernetics and Algorithms in Intelligent Systems, 2018

2017
The comparative analysis of crisis management information systems in the Czech Republic.
Proceedings of the 8th International Conference on Information, 2017

The proposal of the security and safety solution to the soft targets.
Proceedings of the 8th International Conference on Information, 2017

The proposal of software for transport infrastructure management.
Proceedings of the 8th International Conference on Information, 2017

Determination of Optimal Cluster Number in Connection to SCADA.
Proceedings of the Software Engineering Trends and Techniques in Intelligent Systems, 2017

2016
Quantitative evaluation of the synergistic effects of failures in a critical infrastructure system.
Int. J. Crit. Infrastructure Prot., 2016

Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems.
Proceedings of the Software Engineering Perspectives and Application in Intelligent Systems, 2016

The Proposal of the Soft Targets Security.
Proceedings of the Automation Control Theory Perspectives in Intelligent Systems, 2016

2015
Specification of the Current State Vulnerabilities Related to Industrial Control Systems.
Int. J. Online Eng., 2015


  Loading...