Search results for: security - Bridge of Knowledge

Search

Search results for: security

Filters

total: 706
filtered: 461

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: security

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej

    Publication

    - Year 2018

    W monografii przedstawiono aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach i systemach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone, których nieprawidłowe...

    Full text to download in external service

  • Algorithms for spatial analysis and interpolation of discrete sets of Critical Infrastructure hazard data

    Nowo opracowane zaawansowane narzędzia technologii informacyjnych i komunikacyjnych (TIK) ujawniają swoją przydatność do przewidywania różnego rodzaju zagrożeń oraz minimalizowania związanego z nimi potencjalnego ryzyka. Jednakże większość tych narzędzi operuje jedynie na niektórych typach infrastruktury i zaniedbuje ich przestrzenne interakcje z otoczeniem oraz innymi strukturami. Niniejszy artykuł zawiera propozycje kilku algorytmów...

    Full text to download in external service

  • Aktywna metoda testowania bezpieczeństwa aplikacji webowych httpvalider oraz ocena jej skuteczności

    Publication

    W rozdziale omówiono zagadnienia oceny bezpieczeństwa aplikacji webowych, w szczególności podejście pasywnego i aktywnego testowania bezpieczeństwa. Przedstawiono metodę aktywnego testowania HttpValider obejmującą generowanie żądań HTTP pozwalające na identyfikację 13 luk bezpieczeństwa. Dla opracowanej metody zaprojektowano i zaimplementowano narzędzie wspierające automatyczne przeprowadzenie testów dla scenariusza użycia testowanej...

    Full text available to download

  • Quaternion encryption methods for multimedia transmission, a survey of existing approaches

    In this paper we review quaternion encryption methods for multimedia transmission. We explain their weak and strong properties as well as suggest possible modifications. Our main focus is an algorithm QFC presented in paper by Dzwonkowski et al. (2015). All encryption methods, presented in this paper, use special properties of quaternions to perform rotations of data sequences in 3D space. Each method uses a common key generation...

  • MAlSim - Mobile Agent Malware Simulator

    Publication

    - Year 2008

    One of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...

  • Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images

    In this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...

    Full text available to download

  • Malware - a survey on threats and mitigation techniques

    Publication

    - Year 2015

    This paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...

  • Primary role identification in e-mail networks using pattern subgraphs and sequence diagrams

    Publication

    - Year 2012

    Social networks often forms very complex structures that additionally change over time. Description of actors' roles in such structures requires to take into account this dynamics reflecting behavioral characteristics of the actors. A role can be defined as a sequence of different types of activities. Various types of activities are modeled by pattern subgraphs, whereas sequences of these activities are modeled by sequence diagrams....

  • Secured wired BPL voice transmission system

    Publication

    - Scientific Journal of the Military University of Land Forces - Year 2020

    Designing a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...

    Full text available to download

  • Application of Doubly Connected Dominating Sets to Safe Rectangular Smart Grids

    Publication

    - ENERGIES - Year 2022

    Smart grids, together with the Internet of Things, are considered to be the future of the electric energy world. This is possible through a two-way communication between nodes of the grids and computer processing. It is necessary that the communication is easy and safe, and the distance between a point of demand and supply is short, to reduce the electricity loss. All these requirements should be met at the lowest possible cost....

    Full text available to download

  • Silent Signals The Covert Network Shaping the Future

    Publication

    - Year 2007

    Silent Signals The Covert Network Shaping the Future In a world dominated by information flow and rapid technological advancements, the existence of hidden networks and unseen influences has never been more relevant. "Silent Signals: The Covert Network Shaping the Future" delves deep into the mysterious and often opaque world of covert communication networks. This influential work sheds light on the silent...

    Full text available to download