Filters
total: 2604
filtered: 2119
-
Catalog
- Publications 2119 available results
- Journals 205 available results
- Conferences 82 available results
- Publishing Houses 1 available results
- People 100 available results
- Inventions 1 available results
- Projects 15 available results
- Research Equipment 1 available results
- e-Learning Courses 46 available results
- Events 2 available results
- Open Research Data 32 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: Maritime Safety and Security
-
The Sense of Security of the Prison Service Offi cers
Publication -
Suitability of LoRaWAN Technology for the Development of Maritime Applications
PublicationThe LoRaWAN Technology opens new possibilities for gathering and analysis of distributed data. In the paper we concentrate on its maritime usability which was tested by us in the period from June to August 2018. Measurements of the LoRaWAN network coverage in the Bay of Gdansk area were carried out. Various conditions and places were tested. The research was planned in such a way as to gradually increase the range and control the...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Broadband communication solutions for maritime ITSs: Wider and faster deployment of new e-navigation services
Publicationn its initial part, the paper presents an overview of popular technologies and systems currently developed or employed in maritime communication. These solutions are used to provide both ship-to-ship and ship-to-shore communication for the purpose of supporting specific services, often dedicated to maritime safety and e-navigation. Utility of such communication systems have been thoroughly verified over the years and their strengths...
-
Understanding Fuel Saving and Clean Fuel Strategies Towards Green Maritime
PublicationDue to recent emission-associated regulations imposed on marine fuel, ship owners have been forced to seek alternate fuels, in order to meet the new limits. The aim of achieving low-carbon shipping by the year 2050, has meant that alternative marine fuels, as well as various technological and operational initiatives, need to be taken into account. This article evaluates and examines recent clean fuels and novel clean technologies...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Maritime Communications Network Development Using Virtualised Network Slicing of 5G Network
PublicationThe paper presents the review on perspectives of maritime systems development at the context of 5G systems implementation and their main properties. Firstly, 5G systems requirements and principles are discussed, which can be important for maritime applications. Secondly, the problems of network softwarisation, virtualisation and slicing, and possible types of services for potential implementation in 5G marine applications are described....
-
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Maritime traffic situation awareness analysis via high-fidelity ship imaging trajectory
PublicationSituation awareness provides crucial yet instant information to maritime traffic participants, and significant attentions are paid to implement traffic situation awareness task via various maritime data source (e.g., automatic identification system, maritime surveillance video, radar, etc.). The study aims to analyze traffic situation with the support of ship imaging trajectory. First, we employ the dark channel prior model to...
-
Road Safety Observatories within the Structure of Integrated Transport Safety Systems
PublicationAccurate knowledge about the causes, circumstances and place of transport accidents is the prerequisite to take the correct action to improve transport safety. Developing appropriate organizational structures, forms and methods of management and implementation of safety measures in the sectoral approach condition the success. Therefore the Safety Information System is one of the integral areas of the Integrated Transport Safety...
-
Path Loss Measurements in Wideband Radio Link Designed for Maritime Environment
PublicationIn the article, the research and analysis of path loss in designed and evaluated digital radio link for high-speed data transmission in maritime environment is presented. Collected samples of received signal were used to determine the mean path loss and its standard deviation. Measuring campaign was carried out in a real maritime conditions. The mean value of path loss reached 126 dB on a distance of 11.16 km.
-
Security ontology construction and integration
PublicationThere are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...
-
Evaluation of Connectivity Gaps Impact on TCP Transmissions in Maritime Communications
PublicationMany organizations and research working groups, including among others IEEE, ITU, ETSI and IMO are currently working towards improvements in communication of different types of vehicles (cars, trains, planes and vessels) and upgrading utilities and services offered to their crews and passengers travelling all over the world. The paper deals with selected aspects of the TCP protocol connectivity in maritime wireless networks. The...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublicationThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
Modelling selected road safety measures at the regional level in Europe
PublicationRegions are Europe’s basic levels of management. The literature was reviewed to identify regional safety analyses and some of the factors that are important for road safety in the regions. Next, data were collected atthe regional NUTS 2 level in Europe for the years 1999-2008. An analysis of the data helped identify f actors which have the strongest bearing on fatalities and other safety measures. This paper presents the initial...
-
Knowledge-based functional safety management using ProSIL software
PublicationIn the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented....
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublicationIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Experiment with small objects floating under water in the harbor security aspect.
PublicationObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublicationThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
M2M communications system proposal for maritime applications
PublicationThis article describes the proposal to use the M2M communication to enhance the safety of people, ships and other marine infrastructure, in broadly defined marine systems. In addition, there are numerous examples of planned solutions to be implemented in the near future as well as new services. The proposal for M2M communication system architecture is described below. In addition, the use of the STRUGA system radio interface as...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Fading Modeling in Maritime Container Terminal Environments
PublicationIn this paper, an analytical model for slow and fast fading effects in maritime container terminals is derived, from fitting distributions to the results of measurements performed in an actual operational environment. The proposed model is composed of a set of equations, enabling to evaluate fading statistical distribution parameters for different system and environments conditions, as a function of frequency, base station antenna...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Problems in designing and operating the functional safety solutions of higher integriity levels
PublicationThe aim of this article is to identify and discuss some problems that have been encountered in designing and operating the functional safety solutions of higher safety integrity levels (SIL 3 and SIL 4) in the light of analyses outlined in a new version of the international standard IEC 61508:2010. Examples of such solutions are the electric / electronic / programmable electronic systems (E/E/PESs) and the safety instrumented systems...
-
An Intergrated Model of Motion, Steering, Positioning and Stabilization of an Unmanned Autonomous Maritime Vehicle
PublicationIn the paper the aim of an interdisciplinary research is presented. The research method is introduced. An object the unmanned autonomous maritime vehicle is briefly described. The key research problem concerns a combined model of the vehicle motion including the loads of lift and hydrodynamic nature. The model takes into account the gravity and displacement forces, resistance and thrust forces, lift and other hydrodynamic forces....
-
Cognitive engineering and functional safety technology for reducing risks in hazardous plants
PublicationCognitive engineering is considered nowadays as interesting multidisciplinary domain that focuses on improving the relations between humans and the systems that are supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are designed and implemented according to the functional safety concept. The objective is to maintain...
-
Challenges associated with the design of a small unmanned autonomous maritime vehicle
PublicationThe paper contains the preliminary results of the research connected with development of a small unmanned autonomous maritime vehicle. First of all a general description of research is introduced. Next, a concept of a vehicle is presented. Then, a brief description of a research method is given. Next, the current research problems under way are introduced. They concern the ballasting, motion and precise position stabilization system...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Security Assessment of a Turbo-Gas Power Plant
PublicationCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
Application of unmanned USV surface and AUV underwater maritime platforms for the monitoring of offshore structures at sea
PublicationThe operation of offshore structures at sea requires the implementation of advanced systems for their permanent monitoring. There is a set of novel technologies that could be implemented to deliver a higher level of effective and safe operation of these systems. A possible novel solution may be the application of a new maritime unmanned (USV) surface and underwater vehicles/platforms (AUV). Application of such vehicles/platforms...
-
Functional safety and reliability analysis methodoloogy for hazardous industrial plants
PublicationThis monograph is devoted to current problems and methods of the functional safety and reliability analyses of the programmable control and protection systems for industrial hazardous plants. The results of these analyses are useful in the process of safety management in life cycle, for effective reducing relevant risks at the design stage, and then controlling these risks during the operation of given installation. The methodology...
-
Designing issues of the alarm system in context of functional safety and human factors
PublicationThis article addresses selected aspects of the alarm system and human factors that should be evaluated during the design and operation of an industrial hazardous installation. In such installations the layer of protection analysis (LOPA) methodology is often applied for simplified risk analysis based on defined accident scenarios. To reduce and control the risks the safety instrumented functions (SIFs) are identified and their...
-
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublicationIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Container port expansion towards the sea in the context of maritime spatial planning
PublicationThe growth of ships causes a significant increase in demand for new port surfaces and demands for the depths of water bodies in the ports. Due to technological changes in the transshipment and development pressure ports lacks space and they move towards the sea with their activities. The paper discusses the reasons for the phenomenon of expansion of ports towards the sea and its effects on maritime spatial planning.
-
A heterogenous wireless system for maritime communication - the netBaltic system architecture
PublicationIn the article, the concept of a heterogeneous wireless maritime mesh network offering transmission for e.g., e-navigation services is presented. The constrains of existing and competitive solutions are discussed showing the need for a new system. The authors present detailed information about a netBaltic node's architecture and networking mechanisms offering different transmission capabilities and proposed for use on different...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Automatic sound recognition for security purposes
PublicationIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Safety Assessment of Tram Stops
PublicationThe safety of public transport stops is the subject of numerous studies in large agglomerations around the world. This is due to the fact that it is a passenger exchange zone where collisions and accidents involving people getting on or off public transport vehicles most often occur. For this reason, the purpose of the article is to present the results of the safety assessment of the stop zones for two selected tram lines in Wroclaw....
-
UN DECADE OF ACTION FOR ROAD SAFETY IN THE NATIONAL ROAD SAFETY STRATEGY UNTIL 2020 – POLISH APPROACH
PublicationPoland continues to have the highest number of road deaths per one million population in the European Union, according to a 2012 European Commission report – in 2011 the rate in Poland was 109 fatalities compared to the EU average of 61 killed. Adopted by the government in 2005 Poland’s National Road Safety Programme GAMBIT 2005 was the response to the EU’s 3rd Road Safety Action Programme. Despite extensive road safety efforts,...
-
A sense of security and freedom in a residential environment
PublicationThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Road safety performance indicators and their explanatory value: A critical view based on the experience of Central European countries
PublicationCounts of road crashes and their victims represent essential information for road safety practitioners allowing them to analyse their spatial and temporal aspects. However, they cannot provide details on the factors causing road crashes. As a result, various road safety performance indicators (RSPIs) were introduced, making it possible to gather information on the effectiveness of interventions on road safety in given areas. However,...
-
Road safety analysis in Poland using time-series modelling techniques
PublicationA number of international studies argue that there is a correlation between the number of traffic fatalities and the degree of public activity. The studies use the unemployment rate to support that argument. As unemployment grows miles travelled fall, a factor known to affect road safety. This relationship seems to be true for Poland, as well. The model presented in the paper is intended to prove it. It is a structural time-series local...