Search results for: NODE-TARGETED ATTACKS - Bridge of Knowledge

Search

Search results for: NODE-TARGETED ATTACKS

Filters

total: 1875
filtered: 380

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: NODE-TARGETED ATTACKS

  • Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast

    Recent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...

    Full text available to download

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Time versus space trade-offs for randezvous in trees

    Publication

    - DISTRIBUTED COMPUTING - Year 2014

    Two identical (anonymous) mobile agents start from arbitrary nodes of an unknown tree and have to meet at some node. Agents move in synchronous rounds: in each round an agent can either stay at the current node or move to one of its neighbors. We consider deterministic algorithms for this rendezvous task. The main result of this paper is a tight trade-off between the optimal time of completing rendezvous and the size of memory...

    Full text to download in external service

  • Synthesis of green benzamide-decorated UiO-66-NH2 for biomedical applications

    Publication
    • N. Rabiee
    • A. M. Ghadiri
    • V. Alinezhad
    • A. Sedaghat
    • S. Ahmadi
    • Y. Fatahi
    • P. Makvandi
    • M. Saeb
    • M. Bagherzadeh
    • M. Asadnia... and 2 others

    - CHEMOSPHERE - Year 2022

    Metal-organic frameworks (MOFs) biocompatible systems can host enzymes/bacteria/viruses. Herein we synthesized a series of fatty acid amide hydrolase (FAAH)-decorated UiO-66-NH2 based on Citrus tangerine leaf extract for drug delivery and biosensor applications. Five chemically manipulated FAAH-like benzamides were localized on the UiO-66-NH2 surface with physical interactions. Comprehensive cellular and molecular analyses were...

    Full text to download in external service

  • Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain

    Publication

    The main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...

  • Interactions with recognized objects

    Publication

    - Year 2014

    Implicit interaction combined with object recognition techniques opens a new possibility for gathering data and analyzing user behavior for activity and context recognition. The electronic eyewear platform, eGlasses, is being developed, as an integrated and autonomous system to provide interactions with smart environment. In this paper we present a method for the interactions with the recognized objects that can be used for electronic...

    Full text to download in external service

  • Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection

    A methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....

    Full text to download in external service

  • Distinguishing views in symmetric networks: A tight lower bound

    Publication

    The view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.

    Full text available to download

  • Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks

    Publication

    - Electronics - Year 2022

    Dominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...

    Full text available to download

  • Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej

    Stacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.

  • Biometric identity verification

    Publication

    - Year 2022

    This chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...

  • Asynchronous time difference of arrival (ATDOA) method

    Publication

    A new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...

    Full text to download in external service

  • The reliability of any-hop star networks with respect to failures of communication nodes.

    Publication

    - Year 2009

    This paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • Simulating Malware with MAlSim

    Publication

    - Year 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publication

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Full text to download in external service

  • Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci

    architecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...

    Full text available to download

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publication

    - Year 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Full text available to download

  • Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing

    Publication

    Protection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...

  • Thin-walled frames and grids - statics and dynamics

    Publication

    Frames and grids assembled with thin-walled beams of open cross-section are widely applied in various civil engineering and vehicle or machine structures. Static and dynamic analysis of theses structures may be carried out by means of different models, startingfrom the classical models made of beam elements undergoing the Kirchhoff assumptions to the FE discretization of whole frame into plane elements. The former model is very...

  • Modele budowy wartości dla klienta - charakterystyka i rozwinięcie

    Publication

    Rozwój form realizacji biznesu umożliwił zbadanie nowych obiektów związanych z generowaniem wartości dla klienta i przedsiębiorstwa. W pracy scharakteryzowano logiki tworzenia wartości będące podstawą modeli łańcucha wartości, sklepu wartości, sieci wartości oraz chmury wartości. Zaproponowano także wprowadzenie nowego składnika do struktury tych modeli w postaci węzła wartości.

    Full text to download in external service

  • Comparison of Transmission Capacities of Two Regulation Systems: Lateral and in-phase Control Transformers

    This paper presents a comparison of regulation capabilities of lateral and in-phase control transformers in a selected node of a power system. Their regulation capabilities are presented, as well as cross-system exchange options.

    Full text available to download

  • Fracture simulations in concrete beam under bending using a mesoscopic model with cohesive elements

    Publication

    - Year 2016

    The main aim of this paper was to investigate a complex fracture process in a concrete beam subjected to 3-point bending test by means of the 2D meso-scale FEM with 4-node cohesive elements embedded in the initial mesh of 3-node solid elements. The material heterogeneity was taken into account by considering 3 different phases (aggregate, cement matrix, ITZs) on the basis of randomly generated internal structure of concrete and...

  • Influence of Dielectric Overlay Permittivity on Size and Performance of Miniaturized ESPAR Antenna

    Publication

    In this paper, influence of dielectric overlay permittivity on miniaturized ESPAR antenna parameters is presented. ESPAR antenna is a low-cost and energy-efficient way to implement beam steering capability to a node and improve network performance. The antenna size reduction is obtained by embedding its active and passive elements in ABS based materials of relative permittivity equal to 4, 5.5 and 7.5 in order to achieve network...

    Full text available to download

  • Bioterrorism — characteristics and possibilities of prevention

    In the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.

    Full text available to download

  • Project-Based Collaborative Research and Training Roadmap for Manufacturing Based on Industry 4.0

    Publication

    - Year 2023

    The importance of the economy being up to date with the latest developments, such as Industry 4.0, is more evident than ever before. Successful implementation of Industry 4.0 principles requires close cooperation of industry and state authorities with universities. A paradigm of such cooperation is described in this paper stemming from university partners with partly overlapping and partly complementary areas of expertise in manufacturing....

    Full text to download in external service

  • Reliability model of the crankshaft-piston assembly

    Publication

    - Journal of KONES - Year 2012

    The laws that govern the durability of crankshaft-piston assembly friction nodes can be proved or at least derived or justified in an intuitive way. Operation of all the friction nodes is disturbed by external factors occurring with randomly changing intensity and also appearing at random. As the crankshaft-piston assembly friction nodes have a series structure and effects of those disturbances accumulate, their fitness for use...

    Full text available to download

  • Toward Fast Calculation of Communication Paths for Resilient Routing

    Publication

    - NETWORKS - Year 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Full text to download in external service

  • Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships

    Publication
    • M. Adam
    • H. Tomita
    • M. Szymański
    • P. Klimowicz
    • S. Tyszkowski
    • B. Wolska

    - Ido Movement for Culture. Journal of Martial Arts Anthropology - Year 2015

    There is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...

    Full text available to download

  • Interior Point Method Evaluation for Reactive Power Flow Optimization in the Power System

    The paper verifies the performance of an interior point method in reactive power flow optimization in the power system. The study was conducted on a 28 node CIGRE system, using the interior point method optimization procedures implemented in Power Factory software.

    Full text available to download

  • The reliability of tree and star networks.

    Publication

    - Year 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • On a Recurrence Arising in Graph Compression

    Publication

    - ELECTRONIC JOURNAL OF COMBINATORICS - Year 2012

    In a recently proposed graphical compression algorithm by Choi and Szpankowski (2012), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability p) or the right subtree (with probability 1􀀀p). A new node is created as long as...

    Full text available to download

  • Mission impossible for cellular internalization: When porphyrin alliance with UiO-66-NH2 MOF gives the cell lines a ride

    Publication
    • S. Ahmadi
    • V. Jajarmi
    • M. Ashrafizadeh
    • A. Zarrabi
    • J. Haponiuk
    • M. Saeb
    • E. C. Lima
    • M. Rabiee
    • N. Rabiee

    - JOURNAL OF HAZARDOUS MATERIALS - Year 2022

    Is it possible to accelerate cell internalization by hybridization of nanomaterials? Herein we support the realization of using metal-organic frameworks (MOFs) with the assistance of rigid porphyrin structure (H2TMP) aimed at drug loading, drug release, relative cell viability, and targeted in vitro drug delivery. There are several MOFs, i.e., UiO-66-NH2 (125 ± 12.5 nm), UiO-66-NH2 @H2TMP (160 ± 14 nm), UiO-66-NH2 @H2TMP@DOX, and...

    Full text to download in external service

  • How Specific Can We Be with k-NN Classifier?

    Publication

    This paper discusses the possibility of designing a two stage classifier for large-scale hierarchical and multilabel text classification task, that will be a compromise between two common approaches to this task. First of it is called big-bang, where there is only one classifier that aims to do all the job at once. Top-down approach is the second popular option, in which at each node of categories’ hierarchy, there is a flat classifier...

    Full text to download in external service

  • Receiver-side fingerprinting method for color images based on a series of quaternion rotations

    The proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • Porównanie możliwości przesyłowych dwóch układów regulacyjnych: transformatorów z regulacją poprzeczną oraz transformatorów z regulacją wzdłużną

    W artykule przedstawiono porównanie możliwości regulacyjnych transformatorów z regulacją poprzeczną oraz wzdłużną w wybranym węźle systemu elektroenergetycznego. Zaprezentowano możliwości regulacyjne tych układów oraz możliwości kształtowania wymiany międzysystemowej.

    Full text available to download

  • Collision-Free Network Exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Year 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Full text to download in external service

  • Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study

    Publication

    This study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...

    Full text to download in external service

  • Approximation Strategies for Generalized Binary Search in Weighted Trees

    Publication

    - Year 2017

    We consider the following generalization of the binary search problem. A search strategy is required to locate an unknown target node t in a given tree T. Upon querying a node v of the tree, the strategy receives as a reply an indication of the connected component of T\{v} containing the target t. The cost of querying each node is given by a known non-negative weight function, and the considered objective is to minimize the total...

    Full text to download in external service

  • Detection of illicit chemicals by portable Raman spectrometer

    The Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...

    Full text available to download

  • Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

    Publication

    - Year 2013

    The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...

    Full text to download in external service

  • Receiver-side fingerprinting method based on quaternion sandwich product

    In this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...

  • Bounds on the cover time of parallel rotor walks

    Publication

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2016

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...

    Full text available to download

  • Timber frame houses resistant to dynamic loads - seismic analysis

    The aim of the article is to present results of seismic analysis results of two real-sized timber frame buildings subjected to seismic excitations. The first model was insulated with mineral wool, the second one with polyurethane foam. Technology and specifications involved in both models construction is based on the previously conducted experimental research on timber frame houses, including wall panels tests, wall numerical models...

    Full text available to download

  • Collision-free network exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2017

    Mobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...

    Full text available to download

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publication

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Year 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Full text to download in external service

  • Bounds on the Cover Time of Parallel Rotor Walks

    Publication

    - Year 2014

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node maintains a cyclic ordering of its outgoing arcs, and successively propagates walkers which visit it along its outgoing arcs in...

    Full text to download in external service

  • Towards Scalable Simulation of Federated Learning

    Federated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...

    Full text to download in external service

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System

    Publication

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Full text to download in external service