Search results for: NODE-TARGETED ATTACKS - Bridge of Knowledge

Search

Search results for: NODE-TARGETED ATTACKS

Filters

total: 1896
filtered: 392

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: NODE-TARGETED ATTACKS

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publication

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Year 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Full text to download in external service

  • Bounds on the Cover Time of Parallel Rotor Walks

    Publication

    - Year 2014

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node maintains a cyclic ordering of its outgoing arcs, and successively propagates walkers which visit it along its outgoing arcs in...

    Full text to download in external service

  • Towards Scalable Simulation of Federated Learning

    Federated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...

    Full text to download in external service

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System

    Publication

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Full text to download in external service

  • Collaborative Exploration of Trees by Energy-Constrained Mobile Robots

    Publication

    - THEORY OF COMPUTING SYSTEMS - Year 2018

    We study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...

    Full text to download in external service

  • THE CONCEPT OF MODELING OF SNOW IMPACT ON THE STRUCTURE OF THE SUSPENDED TAURON ARENA ROOF IN CRACOW

    Publication

    - Year 2018

    The article presents studies and numerical simulations on modeling snow influence on TAURON ARENA suspended roof structure in Cracow. The scope of work includes experimental tests, functions solutions taking into account various cases of snow impact according to PN and EC, as well as numerical simulations for the sport and entertainment arena in the Czyzyny district. The FEM roof structure model developed in the SOFISITK software...

  • Identification of the Contamination Source Location in the Drinking Water Distribution System Based on the Neural Network Classifier

    Publication

    The contamination ingression to the Water Distribution System (WDS) may have a major impact on the drinking water consumers health. In the case of the WDS contamination the data from the water quality sensors may be efficiently used for the appropriate disaster management. In this paper the methodology based on the Learning Vector Quantization (LVQ) neural network classifier for the identification of the contamination source location...

    Full text to download in external service

  • Preserving Trees in Automata

    Publication

    - Year 2015

    We present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.

    Full text to download in external service

  • The Transmission Protocol of Sensor Ad Hoc Networks

    Publication

    - Year 2015

    This paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

  • Performance evaluation of GPS anti-spoofing system based on antenna array processing

    Publication

    - Year 2016

    This article concerns the problem of detection and mitigation of spoofing attacks in Global Navigation Satellite Systems. First, background information about spoofing and its possible countermeasures is provided. Next, concept of a novel GPS anti-spoofing system based on antenna array processing is presented and implementation of prototype of this system is described. The third section outlines the performance evaluation of proposed...

  • Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks

    Publication

    - SENSORS - Year 2020

    The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...

    Full text available to download

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Full text to download in external service

  • Topology recognition and leader election in colored networks

    Publication

    Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...

    Full text available to download

  • Low-power device simulator for micro-energy measurement methods testing

    The paper presents low-power device simulator designed for testing of micro-energy measurement methods. Such kind methods can be used for evaluation of power systems based on Energy Harvesting. The device allows to set the current consumption characteristic over the time, thus making possible playing the role of different types of low-power devices e.g. simulating sensor network node.

    Full text available to download

  • THE INFLUENCE OF PHASE SHIFTERS ON THE VOLTAGE STABILITY OF CONNECTED POWER SYSTEMS

    Publication

    The paper presents the results of simulation tests of connected power systems in which phase shifters were installed on cross-border links. The analysis was carried out in terms of assessing the impact of shifters on node voltage stability. Individual systems were characterized by different balance of active power: deficit or excess. The evaluation of voltage stability was based on the dU/dQ and dU/dP criteria.

  • Investigation of continuous wave jamming in an IEEE 802.15.4 network

    Publication

    This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...

    Full text to download in external service

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes

    Publication

    - Year 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • Constructing a map of an anonymous graph: applications of universal sequences

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2010

    We study the problem of mapping an unknown environmentrepresented as an unlabelled undirected graph. A robot (or automaton)starting at a single vertex of the graph G has to traverse the graph and return to its starting point building a map of the graph in the process. We are interested in the cost of achieving this task (whenever possible) in terms of the number of edge traversal made by the robot. Another optimization criteria...

    Full text to download in external service

  • Prediction of Processor Utilization for Real-Time Multimedia Stream Processing Tasks

    Publication

    Utilization of MPUs in a computing cluster node for multimedia stream processing is considered. Non-linear increase of processor utilization is described and a related class of algorithms for multimedia real-time processing tasks is defined. For such conditions, experiments measuring the processor utilization and output data loss were proposed and their results presented. A new formula for prediction of utilization was proposed...

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Full text available to download

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • The Large Customer Reactive Power Control Possibilities

    Publication

    n this paper the authors wish to draw attention to the rationale for, and the possibility of, the use of local reactive power sources by the Transmission Node Master Controller (TNMC). Large Customers (LC) are one of the possible reactive power sources. The paper presents the issues related to the need for coordination between the control systems installed in the LC network, and coordination between control systems of the LC as...

    Full text available to download

  • The Conference Report of Why R? Turkey 2022: The First R Conference with Call For Papers in Turkey

    Publication
    • M. Cavus
    • O. Aydin
    • O. Evkaya
    • D. Turfan
    • F. Karadag
    • O. Ozdemir
    • U. Dar
    • D. Bezer

    - R Journal - Year 2022

    Why R? Turkey 2022 was a non-profit conference that aimed to bring Turkish R users together and encourage them to attend the R conferences. The targeted audience of the conference consisted of, data scientists, data analysts, and all R users from academia and industry. The three-day conference, which consisted of several events such as workshops, regular talks, lightning talks, short tutorials, and panels, was free of charge and...

    Full text available to download

  • Wstępny plan badań węzła z mimośrodem dodatnim w kratownicy z kształtowników o przekrojach poprzecznych otwartych. -(Autorka otrzymała wyróżnienie za tą publikację)

    Publication

    W celu określenia wpływu mimośrodowego przecinania się prętów w kratownicy z kształtowników giętych na zimno, o przekrojach poprzecznych otwartych na nośność i stateczność węzłów dźwigarów kratowych, opracowano model badawczy oraz przeprowadzono wstępną analizę numeryczną przedmiotowego węzła, w programie Marc Mentat. Uzyskane wyniki wskazują na potrzebę uzupełnienia obciążenia o parę sił poziomych w modelu badawczym.

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Full text to download in external service

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publication

    - Year 2015

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Full text to download in external service

  • Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS

    W wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...

    Full text available to download

  • Wysokociśnieniowe uszczelnienia ruchu obrotowego wału hydraulicznych maszyn wyporowych

    Publication

    W artykule przedstawiono wyniki badań mające na celu wytypowanie węzła uszczelniającego wał silnika hydraulicznego zapewniającego najwyższą trwałość przy smarowaniu wodą. Parametry pracy: ciśnienie 2 MPa i minimalna prędkość poślizgu uszczelek 2 m/s. Opisano również nowatorski przyrząd, na którym przeprowadzono pomiary wszystkich parametrów węzła uszczelniającego.

  • Result of the 6-min walk test is an independent prognostic factor of surgically treated non-small-cell lung cancer

    Publication
    • T. Marjanski
    • M. Badocha
    • D. Wnuk
    • R. Dziedzic
    • M. Ostrowski
    • W. Sawicka
    • W. Rzyman

    - Interactive Cardiovascular and Thoracic Surgery - Year 2019

    Pathological tumour, node and metastasis (TNM) stage remains the most significant prognostic factor of non-small-cell lung cancer (NSCLC). Meanwhile, age, gender, pulmonary function tests, the extent of surgical resection and the presence of concomitant diseases are commonly used to complete the prognostic profile of the patient with early stage of NSCLC. The aim of this study is to assess how the result of a 6-min walk test (6MWT)...

    Full text available to download

  • TS-based RSM-aided design of cold-formed steel stiffened C-sectional columns susceptible to buckling

    Publication

    The paper focuses on joint-performance analysis of a built-up cold-formed thin-walled C-sectional column with a fillister (stiffener) of the same type, interconnected with a series of bolts located along the length of the compressed members in specific spacing. The quantity of bolts and the non-connected starting distance of the fillister are considered random variables of the problem. Optimal distribution of joints on the stiffener...

    Full text available to download

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • Segmentation of academic community for the purposes of mobility plan development – case study of Gdansk University of Technology

    Publication

    The objective of the paper is to analyse the structure of academic community for its transport behaviour and attitudes using the example of the Gdansk University of Technology (the GUT) in Poland. Once understood, the group can be divided into homogenous sub-groups and studied for their potential and ways to influence their behaviour, attitudes and transport patterns. The results may be used to develop dedicated actions designed...

    Full text available to download

  • Rendezvous of heterogeneous mobile agents in edge-weighted networks

    We introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...

    Full text available to download

  • Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks

    Publication

    - Year 2014

    We introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...

    Full text to download in external service

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • Improved jamming resistance using electronically steerable parasitic antenna radiator

    Publication

    This paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...

    Full text available to download

  • Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network

    In this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...

    Full text available to download

  • On FEM analysis of Cosserat-type stiffened shells. Static and stability linear analysis

    The present research investigates the theory and numerical analysis of shells stiffened with beams in the framework based on the geometrically exact theories of shells and beams. Shell’s and beam’s kinematics are described by the Cosserat surface and the Cosserat rod respectively, which are consistent including deformation and strain measures. A FEM approximation of the virtual work principle leads to the conforming shell and beam...

    Full text available to download

  • Multi-objective Tabu-based Differential Evolution for Teleportation of Smart Virtual Machines in Private Computing Clouds

    Publication

    - Year 2021

    We propose a multi-objective approach for using differential evolution algorithm with tabu search algorithm as an additional mutation for live migration (teleportation) of virtual machines. This issue is crucial in private computing clouds. Teleportation of virtual machines is supposed to be planned to determine Pareto-optimal solutions for several criteria such as workload of the bottleneck host, communication capacity of the...

    Full text to download in external service

  • Modal analysis of a fish-belly flap type of steel water gate

    ABSTRACT: The results of a modal analysis of the fish-belly flap type of steel water gate are presented in the paper. The analysis was conducted for a detailed numerical model of the structure using four-node quadrilateral shell elements. The study was focused on the examination of the influence of positioning of the flap gate and hydrostatic pressure of water on the eigenvalues and eigenmodes of the structure. The results of the study...

  • The validation process of truss model with joint eccentricities

    Nowadays, due to the technological reasons in modern lightweight steel trusses, fabricated from cold-formed sections, positive eccentricities appear in the truss nodes, to induce additional forces truss chords. In order to account for the real load-carrying capacity of truss node area the steel structure research was conducted in scale 1:1. As a result of experimental research, the forms of deformation and strains of the walls...

  • Remote Stateful Autoconfiguration for Mobile IPv6 Nodes with Server Side Duplicate Address Detection

    Publication

    During interdomain handover, IPv6 node requires new address at its new location. Once the L2 handover procedure is completed, mobile node (MN) starts its IPv6 configuration, using stateless (router advertisements) or stateful (DHCPv6 communication) mode. Once the address is obtained, its uniqueness has to be verified, using Duplicate Address Detection (DAD) procedure. Depending on the interface type, this procedure may easily take...

  • On-line Search in Two-Dimensional Environment

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...

    Full text available to download

  • Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym

    Niniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...

  • Power equalization of AES FPGA implementation

    This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....

    Full text available to download

  • The use of HPLC-Q-TOF-MS for comprehensive screening of drugs and psychoactive substances in hair samples and several “legal highs” products

    Publication

    Non-targeted screening of drugs present in herbal products, known as “legal high” drugs and in hair as a biological matrix commonly used in toxicological investigations was accomplished with the use of high pressure liquid chromatography coupled with quadrupole time-of-flight mass spectrometry (HPLC-Q-TOF-MS). In total, 25 and 14 therapeutical drugs and psychoactive substances/metabolites were detected in investigated hair samples...

    Full text available to download

  • Performance of FAN conception of traffic control in IP QoS networks

    Publication

    - Year 2008

    In this paper we present the architectural implementation of Flow Aware Networking (FAN), a new approach for realizing QoS guarantees in the Internet. We also propose FAN traffic control algorithm which performs traffic control on flow level. Using the proposed FAN node model, we conduct simulation research to prove if FAN can be a new approach for realizing QoS guarantees. The basis of this research is finding a way to guarantee...

    Full text to download in external service

  • More Just Measure of Fairness for Sharing Network Resources

    Publication

    - Year 2016

    A more just measure of resource distribution in computer networks is proposed. Classic functions evaluate fairness only “on average”. The proposed new fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function...

    Full text to download in external service

  • Energy Consumption Modeling in SPMD and DAC Applications

    Publication

    - Year 2016

    In this chapter, we show a study of energy consumption during execution of SPMD and DAC application – the same applications which time of execution we modeled in the previous two chapters. We measured an average power usage at a single node of the GALERA+ cluster during application execution and then we modeled the total energy consumption by the application. Next we simulated the applications using MERPSYS and we compared the...

  • The Influence of the Radio Channel on Precision of Position Estimation of the User Terminal Using the NB-IoT Radio Interface

    Publication

    In the article the method of user terminal position estimation using the broadcast signals transmitted in the downlink of the NB-IoT interface was presented, including the analysis of the radio channel influence on precision of position estimation as well as the eNodeB (Evolved Node B) synchronization. The practical ability to estimate the position in the test area has been verified in the laboratory conditions, using the reference...

    Full text to download in external service