{"title":"Method of Protection of Pedestrian Zones Against the Terrorist Attacks Made by Means of Cars Including Off-road Vehicles and Trucks","authors":"A. Shvetsov, V. A. Sharov, S. Shvetsova","doi":"10.1007/s41125-017-0018-4","DOIUrl":"https://doi.org/10.1007/s41125-017-0018-4","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy-Aware Fall Detection System for Hospitals and Nursing Facilities","authors":"E. Krempel, Pascal Birnstill, Jürgen Beyerer","doi":"10.1007/s41125-017-0016-6","DOIUrl":"https://doi.org/10.1007/s41125-017-0016-6","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123125327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Björn Dietrich, Sebastian Iff, Juliane Profelt, Tobias Albers, Kevin Blaschke
{"title":"Development of a Local Air Surveillance System for Security Purposes: Design and Core Characteristics","authors":"Björn Dietrich, Sebastian Iff, Juliane Profelt, Tobias Albers, Kevin Blaschke","doi":"10.1007/s41125-017-0015-7","DOIUrl":"https://doi.org/10.1007/s41125-017-0015-7","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122043174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Data Mining by the Dutch Police: Criteria for a Future Method of Investigation","authors":"S. Brinkhoff","doi":"10.1007/s41125-017-0012-x","DOIUrl":"https://doi.org/10.1007/s41125-017-0012-x","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing the Operation of Socially Critical Systems from an Engineering Perspective: New Challenges, Enhanced Tools and Novel Concepts","authors":"W. Kröger","doi":"10.1007/s41125-017-0013-9","DOIUrl":"https://doi.org/10.1007/s41125-017-0013-9","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123695101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Imaging Radar Technology for Detection of Landmines and Other Unexploded Ordnance","authors":"M. Peichl, E. Schreiber, A. Heinzel, S. Dill","doi":"10.1007/s41125-016-0011-3","DOIUrl":"https://doi.org/10.1007/s41125-016-0011-3","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122427913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for a Uniform Quantitative Description of Risk with Respect to Safety and Security","authors":"Jürgen Beyerer, Jürgen Geisler","doi":"10.1007/s41125-016-0008-y","DOIUrl":"https://doi.org/10.1007/s41125-016-0008-y","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regional Actors in International Security Negotiations","authors":"D. Panke","doi":"10.1007/s41125-016-0010-4","DOIUrl":"https://doi.org/10.1007/s41125-016-0010-4","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121888704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Susceptibility, Vulnerability and Risk Analysis for Resilience Enhancement of Urban Areas to Terrorist Events","authors":"G. Vogelbacher, I. Häring, K. Fischer, W. Riedel","doi":"10.1007/s41125-016-0009-x","DOIUrl":"https://doi.org/10.1007/s41125-016-0009-x","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121851834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Accepting the Rules of the Game”: Institutional Rhetorics in Legitimizing Surveillance","authors":"R. Pauli, Hares Sarwary, Peter Imbusch, Tim Lukas","doi":"10.1007/s41125-016-0007-z","DOIUrl":"https://doi.org/10.1007/s41125-016-0007-z","url":null,"abstract":"","PeriodicalId":390937,"journal":{"name":"European Journal for Security Research","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116822534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}