Logotyp: till Försvarshögskolans hemsida

fhs.se
Ändra sökning
Avgränsa sökresultatet
1 - 12 av 12
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT). University of Skövde, Skövde, Sweden.
    Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment2021Ingår i: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2021, nr 3, s. 36-53Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The SoDark cipher is used to protect transmitted frames in the second and third generation automatic link establishment (ALE) standards for high frequency (HF) radios. The cipher is primarily meant to prevent unauthorized linking and attacks on the availability of HF radio networks. This paper represents the first known security analysis of the cipher used by the second generation ALE protocol—the de facto world standard—and presents a related-tweak attack on the full eight round version of the algorithm. Under certain conditions, collisions of intermediate states several rounds into the cipher can be detected from the ciphertext with high probability. This enables testing against the intermediate states using only parts of the key. The best attack is a chosen-ciphertext attack which can recover the secret key in about an hour with 100% probability, using 29 chosen ciphertexts.

  • 2.
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT). University of Skövde, SWE.
    sboxgates: A program for finding low gate count implementations of S-boxes2021Ingår i: Journal of Open Source Software, E-ISSN 2475-9066, Vol. 6, nr 62, s. 1-3, artikel-id 2946Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    S-boxes are often the only nonlinear components in modern block ciphers. They are commonly selected to comply with very specific criteria in order to make a cipher secure against, for example, linear and differential attacks. An M x N S-box can be thought of as a lookup table that relates an M-bit input value to an N-bit output value, or as a set of N boolean functions of M variables (Schneier, 1996).

    Although cipher specifications generally describe S-boxes using their lookup tables, they can also be described as boolean functions or logic gate circuits. sboxgates, which is presented here, finds equivalent logic gate circuits for S-boxes, given their lookup table specification. Generated circuits are output in a human-readable XML format. The software can convert the output files into C or CUDA (a parallel computing platform for Nvidia GPUs) source code. The generated circuits can also be converted to the DOT graph description language for visualization with Graphviz (Ellson et al., 2002).

  • 3.
    Dansarie, Marcus
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review2024Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 12, s. 91101-91126Artikel, forskningsöversikt (Refereegranskat)
    Abstract [en]

    For applications where general-purpose communication systems, such as mobile telephony, do not satisfy user requirements, special-purpose digital wireless communication standards have been developed. Since these systems often support critical infrastructures, security issues can have far-reaching consequences. To study the extent of research on security issues in specialized communication standards, a systematic literature review was performed, using snowballing to maximize coverage. The found publications cover security issues in radio communication systems for three major areas: civil transportation, public safety and security, and telephony and satellite communication systems. The main results from the included publications are summarized. This is followed by an analysis that presents five common themes among the security issues: lack of encryption, lack of authentication, broken encryption, protocol vulnerabilities, and implementation vulnerabilities. Research tools and methods used across the different technology fields are systematized, showing that software-defined radio and open-source software appear to be enablers of research on the communication standards covered by the review. The systematization also reveals that the application of research methods to different standards is spotty. Finally, numerous open research directions are pointed out, including the need for more holistic research that goes beyond just finding technical flaws in single standards.

  • 4.
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Teknisk utveckling och hybridkrigföring2020Ingår i: Kungl Krigsvetenskapsakademiens Handlingar och Tidskrift, ISSN 0023-5369, nr 1, s. 162-165Artikel i tidskrift (Övrigt vetenskapligt)
  • 5.
    Dansarie, Marcus
    et al.
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem. University of Skövde, (SWE).
    Derbez, Patrick
    Univ Rennes, Centre National de la Recherche Scientifique (CNRS), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), (FRA).
    Leander, Gregor
    Ruhr University Bochum, (DEU).
    Stennes, Lukas
    Ruhr University Bochum, (DEU).
    Breaking HALFLOOP-242022Ingår i: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2022, nr 3, s. 217-238Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications. We present the first public cryptanalysis of HALFLOOP-24 and show that HALFLOOP-24, despite its key size of 128 bits, is far from providing 128 bit security. More precisely, we give attacks for ciphertext-only, known-plaintext, chosen-plaintext and chosen-ciphertext scenarios. In terms of their complexities, most of them can be considered practical. However, in the real world, the amount of available data is too low for our attacks to work. Our strongest attack, a boomerang key-recovery, finds the first round key with less than 210 encryption and decryption queries. In conclusion, we strongly advise against using HALFLOOP-24.

    Ladda ner fulltext (pdf)
    fulltext
  • 6.
    Fox Franke, Daniel
    et al.
    Akamai Technologies, Cambridge, (USA).
    Sibold, Dieter
    Physikalisch-Technische Bundesanstalt, Braunschweig, Germany, (DEU).
    Teichel, Kristof
    Physikalisch-Technische Bundesanstalt, Braunschweig, Germany, (DEU).
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Sundblad, Ragnar
    Netnod, Sweden, (SWE).
    Network Time Security for the Network Time Protocol2020Rapport (Refereegranskat)
    Abstract [en]

    This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).

    NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.

  • 7.
    Hult, Gunnar
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Almbladh, Therese
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Andersson, Kent
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Bull, Peter
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Granholm, Johan
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Lagg, Eva
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Technology Forecast 2021 – Military Utility of Future Technologies2021Rapport (Övrigt vetenskapligt)
    Abstract [en]

    For the purpose of Technology Forecast 2021 five reports from the German Fraunhofer Institute were chosen by FMV (and SwAF) and given to Systems Science for Defence and Security Division to analyse and assess within the timeframe up to 2040.

    The following research reports were reviewed by the working group at SEDU:

    ·       Adversarial Machine Learning 

    ·       High Entropy Ceramics

    ·       Large Unmanned Underwater Vehicles

    ·       Living Sensors

    ·       Machine Learning in Materials Development

    The aim of the Technology Forecast seminars and the finished product, this report, is to assess the potential military utility of the reviewed technologies and how they may contribute to the Swedish Armed Forces’ operational capabilities based on the presented concept(s) and scenario(s). 

    The military utility is categorised by one of four assessments: Significant, Moderate, Negligible or Uncertain.

    The following technologies were assessed to potentially have significant military utility:

    ·       High Entropy Ceramics

    ·       Machine Learning in Materials Development

    ·       Adversarial Machine Learning

    The following technology was assessed to potentially have moderate military utility:

    ·       Large Unmanned Underwater Vehicles 

    The following technology was assessed to have uncertain military utility:

    ·       Living Sensors

    Ladda ner fulltext (pdf)
    fulltext
  • 8.
    Hult, Gunnar
    et al.
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Almbladh, Therese
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Dansarie, Marcus
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Granholm, Johan
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Lagg, Eva
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Silfverskiöld, Stefan
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Thenander, Daniel
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Technology Forecast 2022 – Military Utility of Future Technologies2022Rapport (Övrigt vetenskapligt)
    Abstract [en]

    For the purpose of Technology Forecast 2022 five reports from the German Fraunhofer Institute were chosen by FMV (and SwAF) and given to the Department of Systems Science for Defence and Security to analyse and assess within the timeframe up to 2040.

    The following research reports were reviewed by the working group at SEDU:

    ·       AI Hardware 

    ·       Explainable Artificial Intelligence

    ·       Human-Agent Teaming

    ·       Photonic Radar

    ·       Satellite Independent Navigation 

    The aim of the Technology Forecast seminars and the finished product, this report, is to assess the potential military utility of the reviewed technologies and how they may contribute to the Swedish Armed Forces’ operational capabilities based on the presented concept(s) and scenario(s). 

    The military utility is categorised by one of four assessments: Significant, Moderate, Negligible or Uncertain. 

    The following technologies were assessed to potentially have significant military utility:

    ·       Explainable Artificial Intelligence

    ·       Human-Agent Teaming

    ·       Photonic Radar

    The following technologies were assessed to have uncertain military utility:

    ·       AI Hardware 

    ·       Satellite Independent Navigation 

    Ladda ner fulltext (pdf)
    fulltext
  • 9.
    Lundmark, Martin
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Amann, Daniel
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Löfgren, Lars
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Sturesson, Peter
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Technology Forecast 2018: Military Utility of Future Technologies2018Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Summary

    Four technology forecast reports from the Fraunhofer Institute and two reports from the Swedish Defence Research Agency (FOI) have been reviewed by staff at the Military Technology Division at the Swedish Defence University (SEDU). The task given by the Defence Materiel Administration (FMV) was to assess the military utility of the given technologies in a timeframe up to the year 2040, from a Swedish Armed Forces (SwAF) perspective.

    In the review, we assess the military utility of certain technologies as possible contributions to the operational capabilities of the SwAF, based on identified and relevant scenarios.

    The technologies are grouped into four classes of military utility: potentially significant, moderate, negligible or uncertain.

    The following technologies were assessed to have the potential for significant military utility:

    • Rapid field      identification of harmful microorganisms
    • Hypersonic      propulsion

     

    The following technologies were assessed to have a potential for moderate military utility:

    • Non-line-of-sight      imaging
    • Artificial      intelligence for military decision support

     

    The following technologies were assessed to have uncertain military utility:

    • Structural      energy storage
    • Triboelectric      nanogenerators

     

    No technology was found to have negligible military utility.

    The method used in this technology forecast report was to assign each report to one reviewer in the working group. Firstly, each forecast report was summarized. A new methodological step this year was for each reviewer to discuss the assigned technologies with researchers from FOI. This proved to be a valuable enhancement for understanding the technologies’ present state and likely future development.

    The chosen definition of military utility clearly affects the result of the study. The definition used here, ‘the military utility of a certain technology is its contribution to the operational capabilities of the SwAF, within identified relevant scenarios’ has been used in our Technology Forecasts since 2013.

    Our evaluation of the method used shows that there is a risk that assessments can be biased by the participating experts’ presumptions and experience from their own field of research. It should also be stressed that the six technologies’ potential military utility was assessed within the specific presented scenarios and their possible contribution to operational capabilities within those specific scenarios, not in general. When additional results have been found in the analysis, this is mentioned.

    The greatest value of the method used is its simplicity, cost effectiveness and that it promotes learning within the working group. The composition of the working group and the methodology used are believed to provide a broad and balanced coverage of the technologies being studied. This report should be seen as an executive summary of the research reports and the intention is to help the SwAF Headquarters to evaluate the military utility of emerging technologies within identified relevant scenarios.

    Overall, the research reports are considered to be balanced and of high quality in terms of their level of critical analysis regarding technology development. These reports are in line with our task to evaluate the military utility of the emerging technologies.

    Ladda ner fulltext (pdf)
    fulltext
  • 10.
    Lundmark, Martin
    et al.
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Andersson, Kent
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska system (MteS).
    Bull, Peter
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Technology Forecast 2019 – Military Utility of Future Technologies: A report from seminars at the Swedish Defence University’s (SEDU) Military Technology Division2019Rapport (Övrigt vetenskapligt)
    Abstract [en]

    Four technology forecast reports from the Fraunhofer Institute and two reports from the Swedish Defence Research Agency (FOI) have been reviewed by staff at the Military Technology Division at the Swedish Defence University (SEDU). The task given by the Defence Materiel Administration (FMV) was to assess the military utility of the given technologies in a timeframe up to the year 2040, from a Swedish Armed Forces (SwAF) perspective. The assessment centred on 5G has the perspective 2030, due to the rapid development of telecommunication standards.

    In the review, we assess the military utility of certain technologies as possible contributions to the operational capabilities of the SwAF, based on identified and relevant scenarios.

    The technologies are grouped into four classes of military utility potential: significant, moderate, negligible or uncertain.

    The following technology was assessed to have a potential for significant military utility:

    • Cognitive Radar

    The following technology was assessed to have a potential for moderate military utility:

    • 5G technologies in military applications

    The following technology was assessed to have an uncertain potential military utility:

    • Multi-Domain UxS

    The following technologies were assessed to have negligible military utility.

    • Blockchains
    • Optical Atomic Clocks

    The method used in this technology forecast report was to assign each report to one reviewer in the working group. Firstly, each forecast report was summarized. A new methodological step this year was for each reviewer to discuss the assigned technologies with researchers from FOI. This proved to be a valuable enhancement for understanding the technologies’ present state and likely future development.

    The chosen definition of military utility clearly affects the result of the study. The definition used here, ‘the military utility of a certain technology is its contribution to the operational capabilities of the SwAF, within identified relevant scenarios’ has been used in our Technology Forecasts since 2013.

    Our evaluation of the method used shows that there is a risk that assessments can be biased by the participating experts’ presumptions and experience from their own field of research. It should also be stressed that the six technologies’ potential military utility was assessed within the specific presented scenarios and their possible contribution to operational capabilities within those specific scenarios, not in general. When additional results have been found in the analysis, this is mentioned.

    The greatest value of the method used is its simplicity, cost effectiveness and that it promotes learning within the working group. The composition of the working group and the methodology used are believed to provide a broad and balanced coverage of the technologies being studied. This report should be seen as an executive summary of the research reports and the intention is to help the SwAF Headquarters to evaluate the military utility of emerging technologies within identified relevant scenarios.

    Overall, the research reports are considered to be balanced and of high quality in terms of their level of critical analysis regarding technology development. These reports are in line with our task to evaluate the military utility of the emerging technologies.

    Ladda ner fulltext (pdf)
    Technology Forecast 2019
  • 11.
    Robinson, Yohan
    et al.
    Försvarsmakten, (SWE).
    García Lozano, Marianela
    Totalförsvarets forskningsinstitut, (SWE).
    Appelgren, Jessica
    Totalförsvarets forskningsinstitut, (SWE).
    Benshof, Jan
    Försvarets materielverk, (SWE).
    Börjesson, Henrik
    Försvarsmakten, (SWE).
    Clausen Mork, Jonas
    Totalförsvarets forskningsinstitut, (SWE).
    Dansarie, Marcus
    Försvarshögskolan, Militärvetenskapliga institutionen (MVI), Avdelningen för ledningsvetenskap och militärteknik (ALM), Sektionen för militärtekniska tillämpningar (MteT).
    Gustafsson, Jenny
    Försvarets materielverk, (SWE).
    Hedenstierna, Sofia
    Totalförsvarets forskningsinstitut, (SWE).
    Ivgren, Claes
    Försvarsmakten, (SWE).
    Karlgren, Klas
    Karolinska institutet, (SWE).
    Luotsinen, Linus
    Totalförsvarets forskningsinstitut, (SWE).
    Rantakokko, Jouni
    Totalförsvarets forskningsinstitut, (SWE).
    Wadströmer, Niclas
    Totalförsvarets forskningsinstitut, (SWE).
    AI och framtidens försvarsmedicin2020Rapport (Övrigt vetenskapligt)
    Abstract [sv]

    Medicinskt legitimerad personal är, och kommer med stor sannolikhet fortsattatt vara, en knapp resurs inom Försvarsmaktens sjukvårdsorganisation. I denna rapport ges en översikt över pågående och planerade ansatser baserade påartificiell intelligens (AI) inom akutsjukvård med särskild tonvikt på omhändertagandet av traumapatienter, där lösningarna skulle kunna bidra till att Försvarsmakten kan bibehålla sin sjukvårdskapacitet i kritiska lägen. Rapporten är ett resultat av samarbetet mellan FM, FOI, FMV, FHS och KI, och vänder sig i första hand till Försvarsmaktens strategiska ledning.

    Användningen av AI-teknik i framtida beslutsstöd kan skapa nya möjligheter till avlastning av personal och resurseffektivisering. Tekniken ger möjligheter att i realtid samla in, bearbeta och analysera stora mängder blandadinformation om förbands hälsoläge och fysiska stridsvärde. Bedömning av skadade kan t.ex. göras av triagedrönare och den efterföljande evakueringen kanunderlättas av intelligenta autonoma plattformar. Införandet av AI-system ställer dock vårdgivaren inför svåra etiska och medikolegala överväganden.

    Försvarsmedicin har en central roll i Försvarsmaktens krigföringsförmåga och för samhällets uthållighet. För att nyttja hela AI-teknikens framfart till Försvarsmaktens nytta måste dess innebörd och konsekvens för försvarsmedicinen förstås. Därför rekommenderar denna studie att Försvarsmaktens framtida satsningar inom AI och autonomi inkluderar den försvarsmedicinska teknikutveckling som är beskriven i denna rapport.

  • 12.
    Ávila-Zúñiga Nordfjeld, Adriana
    et al.
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Dansarie, Marcus
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Liwång, Hans
    Försvarshögskolan, Institutionen för försvarssystem, Avdelningen för försvarssystem.
    Dalaklis, Dimitrios
    World Maritime University, Malmö, Sweden, (SWE).
    Mejía Jr., Max
    World Maritime University, Malmö, Sweden, (SWE).
    Proposing a Mathematical Dynamic Model to Develop a National Maritime Security Assessment and Build a National Maritime Security Plan2023Ingår i: Journal of Maritime Research, ISSN 1697-4840, E-ISSN 1697-9133, Vol. 20, nr 3, s. 123-132Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    A proper assessment of maritime security risks at the national level is crucial to a national maritimesecurity plan (NMSP) in order to secure the concerned country’s ports, vessels and territorial sea. Thus, the importance of implementing a national maritime security assessment (NMSA) to counter securitythreats and ensure the continuity of national and international trade. The most important set of inter-national regulations concerning maritime security is the International Ship and Port Facility Security(ISPS) Code, which includes revision, approval and control of compliance of the Port Facility Security Plan (PFSP), which shall be based upon the Port Facility Security Assessment (PFSA). This paper proposes a mathematical dynamic model that calculates in real time the residual risk for the whole country and each of its ports by adapting and expanding the formula and procedures established in the Code, which since it has already been implemented around the world, gives the opportunity to take advantageof this quantitative solution to administrate maritime security risks on a nation-wide basis and create an effective national maritime security plan, which would allow the concerned authorities to improve situational awareness and adapt to security changes through a better planning of human, economic and material resources to deter security threats. The model was tested with the use of five encoded categories as countries, each of them with three ports, which encompassed three port facilities. The results indicate that this methodology is easy to implement and widespread use of that model could strength robustness in national security. 

1 - 12 av 12
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard-cite-them-right
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf