Wastewater Critical Infrastructure Security and Protection

Author(s):  
Rakesh Bahadur ◽  
William B. Samuels
2018 ◽  
Vol 210 ◽  
pp. 04034
Author(s):  
Marcanik Miroslav ◽  
Sustek Michal ◽  
Jasek Roman

The danger of terrorism is a result of the increased risk of critical infrastructure. We will focus on enumerating each area then listing of possible real uses in security and protection and finally we will focus in the list of used 3D sensors (in practice focused mainly on the use of laser scanning of space, camera sensing and subsequent transfer to cyberspace or scanning with infrared sensors).


2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

2020 ◽  
Vol 2 (1) ◽  
pp. 35-42
Author(s):  
Hemalatha R ◽  
Rhesa M.J. ◽  
Revathi S

The hest for technological advancement in mobile communication is due to augmentation of wireless user. The deployment of 5G mobile communication is less than 4G mobile communication due to challenges in security like cyberwarfare, espionage, critical infrastructure threats. Nevertheless, critic of neurological discomforts, tissue damage in living organisms occur in the existence of EMF radiation. Also, physical scarcity for spectral efficiency arises due to ubiquitous data traffic. Inspite of these disputes data rate, low latency, device to device communication is also a challenge. In this paper we provide a survey on radiation effects, security threats, traffic management.


1999 ◽  
Author(s):  
Maximilian K. Bremer ◽  
Daniel Feliz ◽  
Troy Perry

Sign in / Sign up

Export Citation Format

Share Document