Filters
total: 104
filtered: 92
-
Catalog
Chosen catalog filters
Search results for: FAKE VIP ATTACK
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublicationDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublicationFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Enzymatic activities behind degradation of glucosinolates
PublicationMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublicationThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublicationTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublicationThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints
PublicationThe paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublicationA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
An Innovative Approach to the Forecasting of Energetic Effects While Wood Sawing
PublicationIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specifi c cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture mechanics....
-
An innovative approach to the forecasting of energetic effects while wood sawing
PublicationIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specific cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture...
-
Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents
PublicationAutomation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...
-
Advanced oxidation processes for the removal of mono and polycyclic aromatic hydrocarbons – A review
PublicationAromatic hydrocarbons (AHs) are toxic environmental contaminants presented in most of the environmental matrices. Advanced oxidation processes (AOPs) for the removal of AHs in the account of complete mineralization from various environmental matrices have been reviewed in this paper. An in-depth discussion on various AOPs for mono (BTEX) and polyaromatic hydrocarbons (PAHs) and their derivatives is presented. Most of the AOPs were...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
The power of personal brand authenticity and identification: top celebrity players’ contribution to loyalty toward football
PublicationPurpose: In the current era of fake news, illusions, manipulations, and other artificial attributes of virtuality and reality, authenticity is a virtue that people highly appreciate. This study examines the influence of the personal brand authenticity of top football players on loyalty to the football discipline in general, via the mediation of personal brand identification. Design: Based on data collected from a convenience sample...
-
Insight into the microstructural and durability characteristics of 3D printed concrete: Cast versus printed specimens
PublicationThis study presents the comparison of microstructural and durability characteristics of 3D printed concrete (3DPC) depending on its production method (printing or casting). Printed samples with different numbers of layers, as well as a cast specimen with an identical mix composition, were produced and compared, with their microstructural pore and solid characteristics quantitatively and qualitatively investigated. For this purpose,...
-
Studies on the formation of formaldehyde during 2-ethylhexyl 4-(dimethylamino)benzoate demethylation in the presence of reactive oxygen and chlorine species
PublicationIn order to protect the skin from UV radiation, personal care products (PCPS) often contain chemical UV-filters. These compounds can enter the environment causing serious consequences on the water ecosystems. The aim of this study was to examine, the effect of different factors, such as UV light, the presence of NaOCl and H2O2 on the formaldehyde formation during popular UV filter, 2-ethylhexyl 4-(dimethylamino)benzoate (ODPABA)...
-
Multi-fidelity robust aerodynamic design optimization under mixed uncertainty
PublicationThe objective of this paper is to present a robust optimization algorithm for computationally efficient airfoil design under mixed (inherent and epistemic) uncertainty using a multi-fidelity approach. This algorithm exploits stochastic expansions derived from the Non-Intrusive Polynomial Chaos (NIPC) technique to create surrogate models utilized in the optimization process. A combined NIPC expansion approach is used, where both...
-
Assessment of cardiovascular risk in assisted living
PublicationWady i choroby układu krążenia są jedną z podstawowych przyczyn problemów zdrowotnych oraz przyczyn śmierci. Wczesne ich wykrycie jest szczególnie cenne jako, że może zapobiec przez poważnymi incydentami (np. zawał, udar, itp.). W artykule przedstawiono nasobny system pomiarowy integrujący wiele pomiarów przydatnych do oceny problemów kardiologicznych.Disorders of the heart and blood vessels are the leading cause of health problems...
-
The oil film parameters of the wankel engine apex seal in aspects of durability of mating elements
PublicationThe Wankel engine is one of only few alternatives to the reciprocating engines. The advantages such as good value of maximum engine power to its mass ratio are still present and can have great sense in selected fields of application, for example General Aviation. Nevertheless the disadvantages of the Wankel engine design have never lost its importance and still pose an obstacle to wider use of the Wankel engine. One of the main...
-
Fast Low-fidelity Wing Aerodynamics Model for Surrogate-Based Shape Optimization
PublicationVariable-fidelity optimization (VFO) can be efficient in terms of the computational cost when compared with traditional approaches, such as gradient-based methods with adjoint sensitivity information. In variable-fidelity methods, the directoptimization of the expensive high-fidelity model is replaced by iterative re-optimization of a physics-based surrogate model, which is constructed from a corrected low-fidelity model. The success...
-
Facet effect of TiO2 nanostructures from TiOF2 and their photocatalytic activity
PublicationIn this study, special attention is focused on the design of TiO2 morphology and microstructure in the two-step preparation procedure using TiOF2 as a precursor to study their photodegradation mineralization efficiency. Firstly, TiOF2 was synthesized by a simple solvothermal method using titanium(IV) tetrafluoride, which was further used as a precursor in preparation of anatase 2D nanosheets, octahedral, decahedral, and rectangular prisms...
-
Qualitative analysis of phospholipids and their oxidised derivatives – used techniques and examples of their applications related to lipidomic research and food analysis
PublicationPhospholipids (PLs) are important biomolecules that not only constitute structural building blocks and scaffolds of cell and organelle membranes, but also play a vital role in cell biochemistry and physiology. Moreover, dietary exogenous PLs are characterized by high nutritional value and other beneficial health effects, which are confirmed by numerous epidemiological studies. For this reason, PLs are of high interest in lipidomics...
-
Formation of chlorinated breakdown products during degradation of sunscreen agent, 2-ethylhexyl-4-methoxycinnamate in the presence of sodium hypochlorite
PublicationIn this study, a new degradation path of sunscreen active ingredient, 2-ethylhexyl-4-methoxycinnamate (EHMC) and 4-methoxycinnamic acid (MCA) in the presence of sodium hypochlorite (NaOCl), was discussed. The reaction products were detected using gas chromatography–mass spectrometry (GC-MS). Since HOCl treatment leads to more polar products than EHMC, application of polar extracting agents, dichloromethane and ethyl acetate/n-hexane...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Improved degradation of etodolac in the presence of core-shell ZnFe2O4/SiO2/TiO2 magnetic photocatalyst
PublicationIn the present study, susceptibility to photocatalytic degradation of etodolac, 1,8-diethyl-1,3,4,9 – tetrahydro pyran - [3,4-b] indole-1-acetic acid, which is a non-steroidal anti-inflammatory drug frequently detected in an aqueous environment, was for the first time investigated. The obtained p-type TiO2-based photocatalyst coupled with zinc ferrite nanoparticles in a core-shell structure improves the separation and recovery...
-
Novel insights into conjugation of antitumor-active unsymmetrical bisacridine C-2028 with glutathione: characteristics of non-enzymatic and glutathione S-transferase-mediated reactions
PublicationUnsymmetrical bisacridines (UAs) are a novel potent class of antitumor-active therapeutics. A significant route of phase II drug metabolism is conjugation with glutathione (GSH), which can be non-enzymatic and/or catalyzed by GSH-dependent enzymes. The aim of this work was to investigate the GSH-mediated metabolic pathway of a representative UA, C 2028. GSH supplemented incubations of C-2028 with rat, but not with human, liver...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Expedited constrained multi-objective aerodynamic shape optimization by means of physics-based surrogates
PublicationIn the paper, computationally efficient constrained multi-objective design optimization of transonic airfoil profiles is considered. Our methodology focuses on fixed-lift design aimed at finding the best possible trade-offs between the two objectives: minimization of the drag coefficient and maximization of the pitching moment. The algorithm presented here exploits the surrogate-based optimization principle, variable-fidelity computational...
-
Characterization and Technical Application of Fine Photocatalytical Particles - A Study of the Immobilization of Photocatalysts
PublicationThe main aim of this dissertation was the transfer of photocatalytical laboratory scale experiments to semi-technical scale. Preliminary experiments of the purification of organic chlorine-loaded waters and the immobilization of photocatalysts were performed, which yielded the research back to the roots of synthesis. The first applied research was carried out on treatment of recreational water. Several light sources, particularly...
-
Understanding the kinetics and atmospheric degradation mechanism of chlorotrifluoroethylene (CF2=CFCl) initiated by OH radicals
PublicationThe atmospheric degradation of chlorotrifluoroethylene (CTFE) by OH˙ was investigated using density functional theory (DFT). The potential energy surfaces were also defined in terms of single-point energies derived from the linked cluster CCSD(T) theory. With an energy barrier of −2.62 to −0.99 kcal mol−1 using the M06-2x method, the negative temperature dependence was determined. The OH˙ attack on Cα and Cβ atoms (labeled pathways...
-
Modelling of laminated glass PVB walls of buildings exposed to vehicle impact with different speeds
PublicationThis paper presents an analytical model, developed for laminated glass subjected to a low-velocity impact. It has the ability to capture glass cracks as well as large non-linear deformations. It is based mathematically on the firstorder deformation concept, which considers the effect of membrane and transverse shear as well as bending. This theory uses damage mechanics to capture the glass cracking. For this purpose, several experiments...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublicationThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...