Filters
total: 26352
filtered: 4028
-
Catalog
- Publications 4028 available results
- Journals 585 available results
- Conferences 262 available results
- Publishing Houses 2 available results
- People 516 available results
- Inventions 1 available results
- Projects 23 available results
- Research Teams 1 available results
- e-Learning Courses 130 available results
- Events 3 available results
- Open Research Data 20801 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: INFORMATION%20SECURITY
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Anti-theft lab security system based on RFID
PublicationThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Selected Methods For Increases Reliability The Of Electronic Systems Security
Publication -
Safety and security governance problems of critical systems and infrastructures
PublicationW artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Methodological issues of security vulnerability analysis and risk assessment
PublicationArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Uncertainty assessment in the safety and security oriented risk analyses
PublicationW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublicationIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublicationThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublicationW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Challenges in security and safety management of critical systems and infrastructures
PublicationReferat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...
-
Enthalpies of formation of rare earth niobates, RE3NbO7
PublicationHigh-temperature oxide melt solution calorimetry was used to investigate energetics of a series of rare earth niobates RE3NbO7. All of investigated compounds were found to be stable in enthalpy in respect to their oxides. The enthalpy of formation from oxides becomes more exothermic as the size of the RE cation increases, a trend seen previously in other RE compounds including pyrochlores, perovskites, and phosphates. For smaller...
-
Biofilm formation and its regulation in Staphylococcus aureus
PublicationInfections caused by the major human and animal pathogen, Staphylococcus aureus are becoming an important problem due to its emerging resistance mechanisms and variety of virulence factors. Biofilm formation is considered to be one of the most important factor attributed to high pathogenicity of S. aureus. Described in the literature methods used in identification of biofilm forming abilities of bacteria consist of phenotypic and...
-
Mechanism of hydroxyl radicals formation on the reduced rutile
Publication -
Resonance Raman Study on Carbon Nanotubes Formation
Publication -
Easy formation of acyl-Meldrum's acid anhydride
PublicationAcyl Meldrum's acid are usually a good source of ketenes upon definite thermal composition. However we treated acyl-Meldrum's acid with the Lewis acid and we observed formation of 5[[(2,2-dimethyl-4,6-dioxo-1,3-dioxan 5 ylidene)(acyl/arylamino)mathoxy](acyl/arylamino)methylene]-2,2dimethyl-1,3-dioxane-4,6 dione which means acyl-Meldrum's acid anhydride. The chemical properities of acyl-Meldrum's acid anhydride were explored.
-
Formation of carboxymethyl cellulose–casein complexes by electrosynthesis
Publication -
Dew Formation and Chemistry Near a Motorway in Poland
PublicationIn this study, the influence of traffic intensity on dewformation efficiency and chemistry is presented. The measurementswere conducted near the A4 motorway in SW Poland in almost flatland relief with intense agricultural activity. The dew/hoarfrost wascollected by means of insulated plain passive radiative condensersat three sites: AN and AS located in the close vicinity of themotorway (30 m) on the opposite sides of the road,...
-
Urban dew formation efficiency and chemistry in Poland
PublicationThe measurements of dew formation efficiency and chemistry were performed in Poland in September 2009, as a part of a longer, two-year sampling campaign. Pairs of sites, representing centers of major Polish cities and rural conditions in three different regions, were compared. With the aim to get more detailed landuse-oriented characteristics of dew, two additional sites were set close to Wroclaw. Collection of dew at each site...
-
Formation of bubbles from a single nucleation site.
PublicationPrzedstawiono wyniki systematycznych badań eksperymentalnych wrzenia wody destylowanej i metanolu z pojedynczego, sztucznego centrum nukleacji. Jako centra nukleacji służyły otwory wywiercone na czołowej powierzchni miedzianego pręta. Średnice otworów wynosiły: 0.25 mm, 0.60 mm oraz 1.0 mm. Do pomiaru częstotliwości odrywania się pęcherzyków zastosowano układ laser diodowy-fotodioda. Sygnał z fotodiody był rejestrowany za...
-
Fractal analysis and modelling of gas bubble formation.
PublicationPrzedstawiono wyniki badań eksperymentalnych generowania pęcherzyków powietrznych z dysz o różnej średnicy, umieszczonych pod powierzchnią wody. Sygnał rejestrowany przez układ laser-fotodioda poddano analizie fraktalnej.
-
Formation of wood surface roughness in burnishing process
PublicationW publikacji przedstawiono i omówiono rozwój bezwiórowych metod obróbki wykańczającej drewna przez nagniatanie. Przedstawiono wpływ nagniatania na chropowatość powierzchni drewna. Badania przeprowadzono na próbkach toczonych i nagniatanych. Wyniki odniesiono do głównych parametrów nagniatania jak: siła nagniatania oraz promień zaokrąglenia elementu nagniatającego.
-
Geographic Information System for Flood Hazard Analysis and Early Warning Using Numerical Weather Predictions
PublicationFloods are a phenomenon which causes significant losses of lives as well as property damage, which in turn severely impact the local economy. The nature of a flooding has been well researched, and several methods of flood hazard simulation have been established over the last decades. The current legislation in the European Union requires the Member States to create, maintain and update flood risk and hazard maps, as well as identify...
-
Conception of Interactive Information and Decision Support System for Urban and Industrial Air Quality Management: Extension
Publication -
The data exchange between smart glasses and healthcare information systems using the HL7 FHIR standard
PublicationIn this study we evaluated system architecture for the use of smart glasses as a viewer of information, as a source of medical data (vital sign measurements: temperature, pulse rate, and respiration rate), and as a filter of healthcare information. All activities were based on patient/device identification procedures using graphical markers or features based on visual appearance. The architecture and particular use cases were implemented...
-
BUILDING INFORMATION MODELING - ANALIZA ZAKRESU I STANU IMPLEMENTACJI W POLSKIEJ BRANŻY BUDOWLANEJ
PublicationProblematyka BIM (Building Information Modeling) jest obecnie tematem wielu publikacji naukowych, ale także przedmiotem działań podejmowanych przez uczestników szeroko pojętego procesu budowlanego. Liczne zalety i szanse płynące ze stosowania technologii BIM w kolejnych etapach cyklu życia obiektu budowlanego, należy rozpatrywać z punktu widzenia inwestora/zamawiającego, architekta, projektanta konstrukcji i instalacji, dewelopera,...
-
Implementation of spatial information for monitoring and analysis of the area around the port using laser scanning techniques
PublicationNowadays, maritime infrastructure is heavily exploited, which requires monitoring. The article presents the implementation of spatial information which are point clouds for monitoring and analysis of the area around the port (buildings and wharves). For this study, point clouds coming from terrestrial (TLS) and airborne laser scanning (ALS), each of them having different accuracy, were used. An important part of the analysis was...
-
The Effects of the Anthropological Race, Gender and Location of Verbal-Pictorial Stimuli on the Usability of Visual Information Conveyance
Publication -
Analysis of the Multiple Attribute Decision Making Problem with Incomplete Information about Preferences among the Criteria
Publication -
Investigating relationship between particulate matter air concentrations and suicides using geographic information system
Publication -
Digital divide - inequalities in level of implementation of new information and telecommunication technologies. Cross country study
PublicationTekst stanowi analizę nierówności stopnia wdrożenia oraz implementacji ICTs w różnych krajach świata. Autor szacuje wskaźnik GINI dla możliwych krajów świata.In the paper presented, the author considers few aspects of the so-called "digital divide". It is easily noticeable worldwide, that new information and communication technologies (ICTs) "possess" a great ability to spread, at high pace, among countries from all around the...
-
Two-spinors, oscillator algebras, and qubits: aspects of manifestly covariant approach to relativistic quantum information
PublicationThe first part of the paper reviews applications of 2-spinor methods to relativistic qubits (analogies between tetrads in Minkowski space and 2-qubit states, qubits defined by means of null directions and their role for elimination of the Peres-Scudo-Terno phenomenon, advantages and disadvantages of relativistic polarization operators defined by the Pauli-Lubanski vector, manifestly covariant approach to unitary representations...
-
House dust as a source of analytical information on concentration of polybrominated diphenyl ethers (PBDEs) - first approach
PublicationPolybrominated diphenyl ethers (PBDEs), which are best recognized as flame retardants, were in 2001, by virtue of Stockholm Convention, listed in a group of Persistent Organic Compounds (POPs). Increasing concentration levels of PBDEs, reported in human tissues (e.g., blood, serum, breast milk, etc.) haverecently caught worldwide concern due to their potential tendency to disrupt thyroid hormones, neurobehavioral deficits and endocrine...
-
The experimental investigations and modelling of trak work with the use of tamping machine's diagnostic informations
PublicationW pracy przedstawiono realizowany w Katedrze Inżynierii Kolejowej Politechniki Gdańskiej program badawczy, którego idea zasadza się na wykorzystaniu podbijarki torowej w zakresie diagnostyki toru kolejowego. Skupiono się głównie na dwóch aspektach związanych z torem bezstykowym, tj. na siłach podłużnych występujących w tokach szynowych oraz na oporach poprzecznych rusztu torowego związanych głównie ze stopniem ustabilizowania podsypki...
-
Deformation of the Structural Details of the Components Created by the Rapid Prototyping Method
PublicationThe paper present the results of preliminary research and describes the deformation of construction details within the process of producing small element employing a stereography system. The article discuses a scheme for changes in data conversion. Variation in construction details have been described on the basis of analysing photographs.
-
The influence of the drying process on the deformation of the beech and oak wood samples
PublicationThe influence of the drying process conditions on the deformation of the beech and oak wood. The results of the deformation of beech wood (Fagus sylvatica L.) and oak wood (Quercus robur) after drying process are presented. The drying process was carried out in the same drying schedule for each wood species. During each of schedules 40 pieces of wood were dried. The samples were divided into two groups. The first group of tested...
-
Large deformation finite element analysis of undrained pile installation
PublicationIn this paper, a numerical undrained analysis of pile jacking into the subsoil using Abaqus software suit has been presented. Two different approaches, including traditional Finite Element Method (FEM) and Arbitrary Lagrangian–Eulerian (ALE) formulation, were tested. In the first method, the soil was modelled as a two-phase medium and effective stress analysis was performed. In the second one (ALE), a single-phase medium was assumed...
-
STUDENTS' PERCEPTION OF E-GRADING: INFORMATICS COURSE CASE STUDY
PublicationUsing computers for grading can simplify work for teachers. However it is a sensitive part of their work and must be performed carefully. More information is required on students' reception and opinions about e-grading. This paper is a case study of e-grading used in Informatics course and discusses results obtained from surveying the students after being graded by a teacher and a computer.
-
Effect of mesh deformation on the accuracy of 3D FEM electromagnetic analysis
PublicationIn this paper, the accuracy of 3D FEM electromagnetic simulations in parametric analysis using mesh deformation techniques is discussed. Mesh deformation techniques allow one to preserve the mesh topology while the geometry is changed. It is shown that the application of mesh deformation can provide accurate simulation results even for very large deformations. On the other hand, it is also shown that the technique has to be used...
-
Structural organization of video informative systems on light-emitting diodes
Publication -
The influence of plastic deformation on the magnetoelastic properties of the CSN12021 grade steel
PublicationWłasności magnetosprężyste materiałów są silnie modyfikowane przez zmiany struktury dyslokacyjnej, które są wynikiem procesów deformacji plastycznej. Zmiany te mogą być wykorzystane jako podstawa do opracowania metody nieniszczącej oceny stopnia deformacji materiału.Jak dotychczas zaproponowane zostały różne metody, oparte na pomiarach pętli histerezy magnetycznej czy też natężenia magnetycznego efektu Barkhausena. Artykuł porównuje...
-
Mitochondrial D-loop informative SNPs in identification of dog’s breed
Publication -
Secondary Thermal Deformation Characteristics of Stiffened Plate Exposed to Fire
Publication -
Settlement of a historic building due to seepage-induced soil deformation
PublicationThe research paper reviews issues associated with the impact of groundwater flow on soil characteristics and parameters, hence, the entire structure of a building set on it. Water seepage through the ground, building subsoil or structural elements of buildings made of soil affects the soil skeleton and may lead to changes in the arrangement of individual grains relative to each other, i.e., a modified soil structure. Soil solid...