2021
DOI: 10.1007/s12198-021-00234-6
|View full text |Cite
|
Sign up to set email alerts
|

Guidance for ports: security and safety against physical, cyber and hybrid threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…These workshops, each with specific functionalities, are located on both sides of shipyard roads [10]. During their operational phases, the workshops produce various levels of noise, which has a significant impact on drivers' and marshals' attentiveness [11]. Furthermore, ship segments are occasionally temporarily placed on the roads, which reduces the available driving space and exacerbates disorderly road environments, with pedestrians and bicycles further restricting the flow of motorized traffic (Figure 1).…”
Section: Literature Reviewmentioning
confidence: 99%
“…These workshops, each with specific functionalities, are located on both sides of shipyard roads [10]. During their operational phases, the workshops produce various levels of noise, which has a significant impact on drivers' and marshals' attentiveness [11]. Furthermore, ship segments are occasionally temporarily placed on the roads, which reduces the available driving space and exacerbates disorderly road environments, with pedestrians and bicycles further restricting the flow of motorized traffic (Figure 1).…”
Section: Literature Reviewmentioning
confidence: 99%
“…ISSN 2345-0282 (online) http://jssidoi.org/jesi/ 2022 Volume 9 Number 4 (June) http://doi.org/10.9770/jesi.2022.9.4(7) Today, security is part of every human activity (Adams, Chisnall et al, 2021). There are countless theoretical definitions of security, one more complex than the other (Hudecova, 2021b).…”
Section: Entrepreneurship and Sustainability Issuesmentioning
confidence: 99%
“…It is important to protect critical resources from hackers. The relevance of such aspects is detailed in Ref [1]. One example is making the access control very strong by using CybIQ, which uses conventional key/PIN/password and special memorized password pattern.…”
Section: Key Stroke Patternmentioning
confidence: 99%