Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ludek Lukas is active.

Publication


Featured researches published by Ludek Lukas.


Archive | 2012

Multicriterial Evaluation of Critical Infrastructure Element Protection in Czech Republic

Martin Hromada; Ludek Lukas

The importance of Critical Infrastructure is seen through its potential to enable the functional continuity of vital societal functions from economic and social perspective. Present state of Critical Infrastructure Protection is related to creation of relevant security and protection management system, where the effectiveness of this system should be important also in relation to business continuity and disaster recovery. The article will discuss about potential approach to multicriterial evaluation of Critical Infrastructure and Its security and Protection management system in the context of security research project in the Czech Republic - ”VG20112014067 - Resilience evaluation system of Critical Infrastructure elements and networks in selected areas.“


international conference on military technologies | 2017

Parete analysis as a tool for the identification of assets within the organization providing insurance against cyber risk

Lukas Pavlik; Ludek Lukas

This article discusses the issue of cyber risk insurance. The author presents the use of the Pareto analysis for the identification and evaluation of assets of the organization. Utilization of this method is presented on the generalized type of organization that is used for modeling the example. The results of the analysis are presented through tables and charts, which are used for accurate representation methods. Finally, it is a discussion on the possible use of this issue in cyber security.


international conference on mathematics and computers in sciences and in industry | 2016

The Key Theoretical Models for the Safety and Security Ensuring

Ludek Lukas; Martin Hromada; Lukas Pavlik

Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for each field of safety or security. As the part of kind of safety or security, there are models for ensuring safety or security issues. For example, the physical security is ensured through individual protection, known as barriers. Barrier ensures functions of retentions. In the article are analyzed the common theoretical models for ensuring safety and security.


international conference on military technologies | 2015

Factors influencing information environment of the security forces members

Alena Paduchova; Ludek Lukas

Each user of information technologies prefers different type and organization of his information environment. There exists a hypothesis of the relationship between personality typology and information environment of the user. Before the information environment analysis it is necessary to identify factors which influence the information environment making. We will analyze the personal type as our main influencing factor. The paper presents the state of knowledge in personality typology area as an influencing factor and results of the first part of research - Personality Typology Analysis.


international conference on military technologies | 2015

Advanced GIS functions for tactical radio communication planning

Ludek Lukas

Battle usage of tactical radio communication is limited by many factors. The one of the key limiting factors is terrain. Terrain can not be changed but there can be used its capabilities and features for tactical radio communication. The functions of geographic information systems enable to effectively evaluate the terrain and identify a problematic areas and locations. Coverage by radio signal from one point is used for planning of tactical radio communication most frequently. New functions for planning tactical radio communications can be created and used. The article deals with the new functions of geographic information system, which will improve the planning of tactical radio communications.


international conference on mathematics and computers in sciences and in industry | 2014

Risk Mapping for Mobile Communication

Ludek Lukas

Mobile Communication System (MCS) is an important element for ensuring information support in crisis and in battle action. The transit network or the network of base stations is the basis of MCS. Checking a designed radio relay links is the basis for MCS planning. This verification is performed by checking line of sight between selected locations. But there can be other circumstances influenced deployment of transit nodes in battle area. Quality of road is one of criteria. Today, we can use the concept of risk mapping in choosing a sites or location of transit nodes or base stations. This concept can be successfully used in combination with geographical information system. There are devised a special GIS layers that express risk assessment for individual points of battle area. Location for transit nodes can be chosen according to quality of direct line of sight and level of risk. The article deals with the methodology of risk mapping for MCS planning.


Archive | 2012

Critical Infrastructure Protection and the Evaluation Process

Martin Hromada; Ludek Lukas


ACMOS'11 Proceedings of the 13th WSEAS international conference on Automatic control, modelling & simulation | 2011

Management of protection of Czech Republic critical infrastructure elements

Ludek Lukas; Martin Hromada


ACMOS'11 Proceedings of the 13th WSEAS international conference on Automatic control, modelling & simulation | 2011

Utilization of the EASI model in the matters of critical infrastructure protection and its verification via the OTB SAF simulation tool

Ludek Lukas; Martin Hromada


ACMOS'11 Proceedings of the 13th WSEAS international conference on Automatic control, modelling & simulation | 2011

Entities of critical infrastructure protection in the Czech Republic

Necesal Lubos; Ludek Lukas

Collaboration


Dive into the Ludek Lukas's collaboration.

Top Co-Authors

Avatar

Martin Hromada

Tomas Bata University in Zlín

View shared research outputs
Top Co-Authors

Avatar

Alena Paduchova

Tomas Bata University in Zlín

View shared research outputs
Top Co-Authors

Avatar

Lukas Pavlik

Tomas Bata University in Zlín

View shared research outputs
Top Co-Authors

Avatar

Katerina Vichova

Tomas Bata University in Zlín

View shared research outputs
Top Co-Authors

Avatar

Necesal Lubos

Tomas Bata University in Zlín

View shared research outputs
Researchain Logo
Decentralizing Knowledge