{"id":23,"date":"2018-07-21T12:40:15","date_gmt":"2018-07-21T12:40:15","guid":{"rendered":"http:\/\/kristof.kralovanszky.info\/?page_id=23"},"modified":"2021-09-21T19:36:33","modified_gmt":"2021-09-21T17:36:33","slug":"publications","status":"publish","type":"page","link":"https:\/\/kralovanszky.hu\/index.php\/en\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h5 style=\"font-family: Roboto, sans-serif; font-style: normal;\"><strong style=\"font-size: 18px;\">Published in Hungarian:<\/strong><\/h5>\n<p><a style=\"font-size: 16px;\" href=\"https:\/\/folyoiratok.uni-nke.hu\/document\/uni-nke-hu\/hsz_16_4.pdf\">NATO Kiv\u00e1l\u00f3s\u00e1gi K\u00f6zpontok \u00e9s a transzform\u00e1ci\u00f3<\/a><a style=\"font-size: 16px;\" href=\"https:\/\/folyoiratok.uni-nke.hu\/document\/uni-nke-hu\/hsz_16_4.pdf\">\u00a0&#8211;\u00a0<\/a><strong style=\"font-size: 16px;\"><a style=\"font-size: 16px;\" href=\"https:\/\/folyoiratok.uni-nke.hu\/document\/uni-nke-hu\/hsz_16_4.pdf\">NATO Centres of Excellence and the Transformation &#8211;<\/a><\/strong><a style=\"font-size: 16px;\" href=\"https:\/\/folyoiratok.uni-nke.hu\/document\/uni-nke-hu\/hsz_16_4.pdf\">[\u00a0in Hadtudom\u00e1nyi Szemle (2016\/4 pp.141-153) ]<\/a><\/p>\n<p style=\"font-family: Roboto, sans-serif; font-size: 16px; font-style: normal;\">Abstract:\u00a0A good example of NATO transformation is the institution and the operation of Centres of Excellence. The article shows how the institution of COEs was born, explains the principles of their operations and helps to understand their true role within the Alliance, through showing examples of their current activities and identifying some of their future challenges.<\/p>\n<p><a style=\"font-size: 16px;\" href=\"http:\/\/www.hadmernok.hu\/184_23_kralovanszky.pdf\">Elosztott adatt\u00e1rol\u00e1s egyes k\u00e9rd\u00e9sei &#8211;\u00a0<strong style=\"font-size: 16px;\">Certain Aspects of Distributed Data Storage\u00a0<\/strong>&#8211; [ in Hadm\u00e9rn\u00f6k (2018\/4 pp. 297-305) ]<\/a><\/p>\n<p style=\"font-family: Roboto, sans-serif; font-size: 16px; font-style: normal;\">Abstract:\u00a0The expexted rapid growth of Hungary\u2019s National Databases and the protection of similar databases result in complex challenges for systems operators. Their voulnerability poses a growing risk due to their increasing value plus the possible damage that can be caused by their failure. The goal of this article is to show how distributed data storage can increase the protection of such data and also to demonstrate how higher levels of redundancy can be assets to critical data infrastructure \u2013 with maintaining the possibility of dynamic scaling and priority flexibility.<\/p>\n<p><a style=\"font-size: 16px;\" href=\"http:\/\/www.hadmernok.hu\/191_22_kralovanszky.pdf\"><u>Elektronikus hat\u00e1rv\u00e9delmi rendszerek jellemz\u0151 sebezhet\u0151s\u00e9gei \u00e9s v\u00e9delm\u00fck lehet\u0151s\u00e9gei &#8211;\u00a0<\/u><strong><u>Common Vulnerabilities of Electronic Perimeter Protection Systems and Possible Methods of Their Defense\u00a0<\/u><\/strong><u>[ in Hadm\u00e9rn\u00f6k (2019\/1 pp. 271-282) ]<\/u><\/a><\/p>\n<p style=\"font-family: Roboto, sans-serif; font-size: 16px; font-style: normal;\">Abstract: Both owners and operators of critical infrastructures are facing a rapidly growing challenge of defending themselves and their infocommunication systems from various cyber threats. This article wishes to demonstrate the cyber vulnerabilities of electronic perimeter protection systems and the need for their adequate protection. Shows certain possibilities of using Electronic Protection (EP) with particular emphasis on protection against various SIGINT threats. Underlines the absolute necessity of cyber threat risk-analysis and assessment, while creating and maintaining system-wide confidentiality, integrity, and availability.<\/p>\n<p><a href=\"https:\/\/folyoiratok.uni-nke.hu\/document\/nkeszolgaltato-uni-nke-hu\/WEB---NSZ_2019_3---040-057.pdf\">A villamosenergia-rendszer kiber- \u00e9s nemzetbiztons\u00e1gi kock\u00e1zatai (1. r\u00e9sz) &#8211;\u00a0<strong>Cyber- and National Security Risks of the Electric Energy System (part one) <\/strong>[ in National Security Review (2019\/3 pp. 40-57) ]<\/a><\/p>\n<p style=\"font-family: Roboto, sans-serif; font-size: 16px; font-style: normal;\">Abstract: The placement of the electric energy subsector among critical infrastructures doesn\u2019t always reflect the real threat they pose to other sectors of critical infrastructures. With different examples, the first part of our study shows certain cyber-vulnerabilities of the electric energy system, the actual risks of attacks thereon and the real necessity of systems\u2019 resilience. The study investigates the organizational and theoretical resources required for the cyber defense of the electric energy sector, including its state-, commercial- and national security players.<\/p>\n<p><a href=\"https:\/\/folyoirat.ludovika.hu\/index.php\/hadmernok\/article\/view\/943\/296\">A kibert\u00e9r fejl\u0151d\u00e9se &#8211;\u00a0<\/a><strong><a href=\"https:\/\/folyoirat.ludovika.hu\/index.php\/hadmernok\/article\/view\/943\/296\">The Evolution of Cyberspace <\/a><\/strong><a href=\"https:\/\/folyoirat.ludovika.hu\/index.php\/hadmernok\/article\/view\/943\/296\">[ in Hadm\u00e9rn\u00f6k (2019\/4 pp. 197-212) ]<\/a><\/p>\n<p style=\"font-family: Roboto, sans-serif; font-size: 16px; font-style: normal;\">Abstract: It is essential to have a proper definition of cyberspace as it is the foundation of the proper understanding operations being performed therein. The increasing role of state actors both on the defensive and on the offensive side together with the economic and political risks and interconnections further emphasizes the importance of cyberspace. Through clitical infrastructures, infocommunication systems and artificial intelligence, cyberspace became an integral part of our day-to-day lives. Cyberspace will keep changing its role due to future technological advancements \u2013 that is why we should understand its evolution curve.<\/p>\n<p><a href=\"https:\/\/nkerepo.uni-nke.hu\/xmlui\/bitstream\/handle\/123456789\/16208\/905_KDMI_II_hallgatoi_tanulmanykotet.pdf\">\u00c1llami c\u00e9l\u00fa adat\u00e1tviteli rendszerek, h\u00e1l\u00f3zatok r\u00e9szleges integr\u00e1lhat\u00f3s\u00e1g\u00e1nak egyes k\u00e9rd\u00e9sei<strong> &#8211; Certain Aspects of Integration Possibilities of State Data Transmission Systems<\/strong> <em>in:<\/em> Hausner G\u00e1bor (szerk): Szemelv\u00e9nyek a katonai m\u0171szaki tudom\u00e1nyok eredm\u00e9nyeib\u0151l II., Ludovika Egyetemi Kiad\u00f3, 2020. Budapest (pp. 179-195)<\/a><\/p>\n<p>A<span style=\"font-size: inherit;\">bstract:\u00a0<\/span>It is a natural need and vital requirement of every country to maintain its cyber-sovereignty. One of the most critical elements of this is a secure and continuously accessible operation of state data transmission systems for the organizations concerned. Our paper presents a new and complex concept that offers far more flexibility and operational reserves than many countries&#8217; current systems. It shows a capability where the services of such systems can be more widely available to state (local and federal) agencies.<\/p>\n<p><a href=\"https:\/\/folyoirat.ludovika.hu\/index.php\/hadmernok\/article\/view\/4610\/4408\">A kibert\u00e9r fejl\u0151d\u00e9se (m\u00e1sodik r\u00e9sz) &#8211; Kiberm\u0171veletek \u00e9s kritikus infrastrukt\u00far\u00e1k egyes kapcsolatai &#8211; <strong>The Evolution of Cyberspace (part 2) \u2013 certain connections between cyber operations and critical infrastructures<\/strong> [in Hadm\u00e9rn\u00f6k (2021\/1 pp. 145-159) ]<\/a><\/p>\n<p>Cyber operations are becoming robust tools in a nation state\u2019s policy. The applications thereof require far more caution than the tools used in conventional domains. Inaccurately evaluated interdependencies of attacked infrastructures can cause substantial collateral damages to the attacker. This paper investigates certain aspects and connections of such interdependencies.<\/p>\n<h5 style=\"font-family: Roboto, sans-serif; color: #7a7a7a; text-align: justify;\">To be published in English:<\/h5>\n<p><strong>Certain connections between Cyber Operations, Artificial Intelligence and Operational Domains &#8211; <\/strong>M\u0171veleti tartom\u00e1nyok egyes kapcsolatai kiberm\u0171veletekkel \u00e9s a mesters\u00e9ges intelligenci\u00e1val<\/p>\n<p>Abstract: The relationship of operational domains with various systems based on artificial intelligence is becoming more profound and more diverse. The ability to influence decision-making mechanisms can pose serious risks that need to be identified and interpreted. Cyberspace is the carrier of artificial intelligence, but the latter as an operational domain has not yet been identified. The goal of this study is to examine certain relationships between cyberspace, artificial intelligence, and operational domains from a state-will enforcement perspective, using mostly qualitative tools, combined with quantitative elements. As a result, this paper finds the need to review defense doctrines from a cyber-operational perspective and suggests addressing artificial intelligence in a much broader context, especially in the defense and military contexts.<\/p>\n<h5 style=\"font-family: Roboto, sans-serif; color: #7a7a7a; text-align: justify;\">To be published in Hungarian:<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Published in Hungarian: NATO Kiv\u00e1l\u00f3s\u00e1gi K\u00f6zpontok \u00e9s a transzform\u00e1ci\u00f3\u00a0&#8211;\u00a0NATO Centres of Excellence and the Transformation &#8211;[\u00a0in Hadtudom\u00e1nyi Szemle ...<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-23","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/pages\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":20,"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/pages\/23\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/pages\/23\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/kralovanszky.hu\/index.php\/wp-json\/wp\/v2\/media?parent=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}