Filters
total: 12124
-
Catalog
- Publications 8854 available results
- Journals 903 available results
- Conferences 338 available results
- Publishing Houses 1 available results
- People 496 available results
- Inventions 1 available results
- Projects 37 available results
- Research Teams 1 available results
- Research Equipment 5 available results
- e-Learning Courses 328 available results
- Events 9 available results
- Open Research Data 1151 available results
displaying 1000 best results Help
Search results for: FUNCTIONAL SAFETY, SECURITY, CYBER HAZOP, INDUSTRIAL CONTROL SYSTEMS, OIL PORT INSTALLATIONS
-
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublicationIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Human Factors and Cognitive Engineering in Functional Safety Analysis
PublicationHuman factors and cognitive engineering are considered nowadays as important multidisciplinary domains that focus on improving the relations between humans, technology and systems to be supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are usually designed and implemented according to the functional safety requirements....
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Information Systems Security 2023
e-Learning CoursesThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
Designing issues of the alarm system in context of functional safety and human factors
PublicationThis article addresses selected aspects of the alarm system and human factors that should be evaluated during the design and operation of an industrial hazardous installation. In such installations the layer of protection analysis (LOPA) methodology is often applied for simplified risk analysis based on defined accident scenarios. To reduce and control the risks the safety instrumented functions (SIFs) are identified and their...
-
Functional safety and human factors
PublicationRozdział przedstawia istotny problem uwzględnienia czynników ludzkich (H&OF) w analizie bezpieczeństwa funkcjonalnego, które wpływają istotnie na bezpieczeństwo przemysłowych obiektów podwyższonego ryzyka, nie ujęty jednak w normach bezpieczeństwa funkcjonalnego. Przedstawia się metody analizy niezawodności człowieka (HRA) w kontekście tych czynników, które wpływają na błędy człowieka. Czynniki ludzkie i organizacyjne powinny być...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublicationThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Knowledge-based functional safety management using ProSIL software
PublicationIn the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented....
-
Extendable Safety and Security Ontology
PublicationSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Janusz Górski prof. dr hab. inż.
People -
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Security aspects in verification of the safety integrity level of distributed control and protection systems
PublicationPrzedstawiono najważniejsze zagadnienia zwišzane z weryfikacjš poziomu nienaruszalnoci bezpieczeństwa SIL rozproszonych systemów sterowania i zabezpieczeń z uwzględnieniem aspektów ochrony informacji. Przedstawiono ilociowš metodę weryfikacji poziomu SIL z wykorzystaniem wskaników różnicowych oraz dwuparametrowš funkcję kryterialnš łaczšcš wymagania SIL oraz EAL (poziom uzasadnionego zaufania dla ochrony informacji).
-
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publication -
General concept of functional safety - standarisation and sector aspects
PublicationRozdział poświęcono koncepcji bezpieczeństwa funkcjonalnego. Bezpieczeństwo funkcjonalne jest częścią bezpieczeństwa całkowitego zależną od odpowiedniej odpowiedzi systemów sterowania i/lub zabezpieczeń na sygnały wejściowe podczas wystąpienia stanów nienormalnych maszyny, instalacji lub obiektu podwyższonego ryzyka. Koncepcja bezpieczeństwa funkcjonalnego przedstawiona w normie IEC 51508 stanowi przykład dobrej praktyki inżynierskiej...
-
Information Systems Security 2023/2024
e-Learning CoursesThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
Blended Learning in Teaching Safety of Electrical Installations
PublicationBlended learning becomes more commonly used in teaching information technology or other subjects, which involve practice in computer laboratories. In case of subjects with no access to computer rooms blended learning supports lecturing and teaching classes e.g. interactive lessons. The article presents the use of blended learning forms in Gdansk University of Technology in teaching the subject of Safety of Electrical Installations....
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Jarosław Guziński prof. dr hab. inż.
PeopleJaroslaw Guzinski received M.Sc., Ph.D. and D.Sc. degrees from the Electrical Engineering Department at Technical University of Gdansk, Poland in 1994, 2000 and 2011 respectively. Since 2016 he is Associate Professor at Gdansk University of Technology. Currently he is the head of the Department of Electric Drives and Energy Conversion. From 2006 to 2009 he was involved in European Commission Project PREMAID Marie Curie, ‘Predictive...
-
The EU's Cyber Security Strategy
Publication -
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Problems in designing and operating the functional safety solutions of higher integriity levels
PublicationThe aim of this article is to identify and discuss some problems that have been encountered in designing and operating the functional safety solutions of higher safety integrity levels (SIL 3 and SIL 4) in the light of analyses outlined in a new version of the international standard IEC 61508:2010. Examples of such solutions are the electric / electronic / programmable electronic systems (E/E/PESs) and the safety instrumented systems...
-
Visual content representation and retrieval for Cognitive Cyber Physical Systems
PublicationCognitive Cyber Physical Systems have gained significant attention from academia and industry during the past few decade. One of the main reasons behind this interest is the potential of such technologies to revolutionize human life since they intend to work robustly under complex visual scenes, which environmental conditions may vary, adapting to a comprehensive range of unforeseen changes, and exhibiting prospective behavior...
-
Magdalena Gajewska prof. dr hab. inż.
PeopleMagdalena Gajewska (born June 1th 1968 in Gdańsk) in 1993 graduated Hydro-Engineering Faculty at Gdańsk University of Technology. At present she is an assistant professor in the Department of Water and Wastewater Technology at the Faculty of Civil and Environmental Engineering GUT. PhD (2001) and habilitation (2013) in the discipline of environmental engineering. In the 2016-2020 term, serves as Vice -dean for science. She...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Safety-Critical Systems 2023
e-Learning CoursesSafety-Critical Systems / Bezpieczeństwo systemówKierunek Informatyka, studia II stopniaProwadzący: Andrzej WardzińskiWykład: Poniedziałek 15:15 EA 07 (od 27 lutego 2023)Projekt w drugiej połowie semestruKod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu
-
Safety-Critical Systems 2023
e-Learning CoursesSafety-Critical Systems / Bezpieczeństwo systemówKierunek Informatyka, studia II stopnia Prowadzący: Andrzej Wardziński Wykład: Poniedziałek 15:15 EA 07 (od 27 lutego 2023) Projekt w drugiej połowie semestru Kod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu
-
Dynamic Execution of Engineering Processes in Cyber-Physical Systems of Systems Toolchains
PublicationEngineering tools support the process of creating, operating, maintaining, and evolving systems throughout their lifecycle. Toolchains are sequences of tools that build on each others' output during this procedure. The complete chain of tools itself may not even be recognized by the humans who utilize them, people may just recognize the right tool being used at the right place in time. Modern engineering processes, however, do...
-
Layer of protection analysis in industrial hazardous installations =n Analiza warstw zabezpieczeń w przemysłowych instalacjach podwyższonego ryzyka
PublicationIn the paper The Layer of Protection Analysis (LOPA) as a technique for the risk evaluation relating to the hazardous industriall installations performance is presented. The results of the analyses are important in the terms of the safety management process in such installations. Based on obtained estimations deccisions might be made which solutions to be applied in order to mitigate the risk of the hazardous installations performance...
-
Safety and security governance problems of critical systems and infrastructures
PublicationW artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji
-
Challenges in security and safety management of critical systems and infrastructures
PublicationReferat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Modernist Industrial Architecture and Its Protection - the Port of Gdynia
PublicationOchrona międzywojennej architektury przemysłowej na tak specyficznym obszarze jak funkcjonujący port morski, jest zadaniem trudnym - niezbędne są kompromisy pomiędzy względami konserwatorskimi i użytkowymi. Artykuł prezentuje architekturę portu gdyńskiego oraz złożoną problematykę jej ochrony konserwatorskiej.
-
Assessment of safety - related systems in industrial hazardous plants
PublicationPrzedstawiono problemy związane z określaniem bezpieczeństwa funkcjonalnego systemów przemysłowych, w oparciu o standard IEC 61508. Wykorzystując informacje zawarte w cytowanym standardzie opisujemy metody określenia wymaganych poziomów zabezpieczeń dla instalacji przemysłowej. Wyjaśniamy znaczenie poziomów SIL. Poddano dyskusji procedurę poprawnego określania poziomów bezpieczeństwa systemów składających się z elementów o...
-
Defence in depth conception in nuclear power plants and requirements for instrumentation and control systems
PublicationThe aim of this article is to identify and discuss some issues of the safety systems’ design for nuclear power plants equipped with the light water reactors using a defence in depth (D-in-D) conception. Because the functional safety solutions play nowadays an important role for the risk control, the basic requirements for the instrumentation and control systems are specified with regard to relevant international standards. For...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Port-Based Modelling of Distributed-Lumped Parameter Systems
PublicationThere in the paper is presented an uniform, port-based approach to modelling of both lumped and distributed parameter systems. Port-based model of the distributed system has been defined by application of bond graph methodology and distributed transfer function method (DTFM). The approach proposed combines versatility of port-based modelling and accuracy of distributed transfer function method. The concise representation of lumped-distributed...
-
Functional safety analysis including human factors
PublicationThe article addresses selected aspects of human factors that should be taken into account during the design of safety-related functions for a complex hazardous installation and its protections. In such installations the layer of protection analysis (LOPA) methodology is often used for simplified risk analysis based on defined accident scenarios. To control the risk the safety instrumented functions (SIFs) are identified and their...
-
Model-based testing for execution algorithms in the simulation of cyber-physical systems
PublicationThe understanding of simulation semantics of a hybrid system is a challenge for computational engineers as it requires expertise in computer science, engineering, numerical methods, and mathematics at once. The testing methods for the execution of a simulation are being researched but not yet applied on the industrial level. Consequently, the semantics of the simulation becomes a critical artifact in the system development process....
-
Safety of computer control systems: challenges and results in software development.
PublicationArtykuł dokonuje przeglądu wybranych wyników dotyczących poprawy bezpieczeństwa komputerowych systemów sterowania. Dyskusja pokrywa szeroki zakres aspektów dotyczących procesu wytwarzania takich systemów. W szczególności omówiono zagadnienia dotyczące różnorodności oprogramowania, oprogramowania off-the-shelf, analizy typów awarii i ich efektów oraz formalizacji procesu wytwórczego.
-
Mieczysław Brdyś prof. dr hab. inż.
People -
Functional Safety Analysis including Human Factors
PublicationIn this paper selected aspects of human factors are discussed that should be taken into account during the design of safety-related functions for a complex hazardous installation and its protections. The layer of protection analysis (LOPA) methodology is used for simplified risk analysis based on defined accident scenarios. To control the risk the safety instrumented functions (SIFs) are identified and their safety integrity levels...
-
Functional safety in the context of risk appraisal criteria and cost-benefit analysis
PublicationRozdział przedstawia aktualne zagadnienia dotyczące analizy kosztów i efektów rozwiązań związanych z bezpieczeństwem na przykładzie systemów elektrycznych, elektronicznych i programowalnych elektronicznych (E/E/PE) pełniących funkcje sterowania i zabezpieczeń w obiektach podwyższonego ryzyka. Podkreśla się znaczenie kryteriów związanych z bezpieczeństwem, takich jak tolerowalność ryzyka (TOR) w kontekście analizy kosztów i efektów...
-
Uncertainty assessment in the safety and security oriented risk analyses
PublicationW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Experience based knowledge representation for Internet of Things and Cyber Physical Systems with case studies
PublicationCyber Physical Systems and Internet of Things have grown significant attention from industry and academia during the past decade. The main reason behind this interest is the capabilities of such technologies to revolutionize human life since they appear as seamlessly integrating classical networks, networked objects and people to create more efficient environments. However, enhancing these technologies with intelligent skills becomes...
-
New Procedures for Control of Industrial Effluents Treatment Processes
PublicationThis work presents the procedures for monitoring volatile organic compounds during treatment of industrial effluents. The investigation was carried out for a specific effluent—caustic effluent from bitumen production. The developed procedures enable more detailed control of the effectiveness of wastewater treatment than standard procedures. Caustic effluents from bitumen production have a complex physicochemical form and consist...
-
Hierarchical predictive control of integrated wastewater treatment systems
PublicationThe paper proposes an approach to designing the control structure and algorithms for optimising control of integrated wastewater treatment plant-sewer systems (IWWTS) under a full range of disturbance inputs. The optimised control of IWWTS allows for significant cost savings, fulfilling the effluent discharge limits over a long period and maintaining the system in sustainable operation. Due to the specific features of a wastewater...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
Publication -
Development and validation of a HAZOP-based inspection of UML models
PublicationArtykuł prezentuje technikę inspekcji ukierunkowaną na wykrywanie defektów w modelach UML. Technika ta została opracowana poprzez adaptację HAZOP - metody szeroko stosowanej w dziedzinie systemów związanych z bezpieczeństwem. Wykorzystano podstawową koncepcję HAZOP (zastosowanie ogólnych słów kluczowych do wykrywania pełnej listy anomalii związanych z danym fragmentem modelu) do systematycznego wygenerowania list kontrolnych dla...