Search results for: Maritime Safety and Security - Bridge of Knowledge

Search

Search results for: Maritime Safety and Security

Search results for: Maritime Safety and Security

  • Managing enterprise IT infrastructure and security 2022

    e-Learning Courses
    • R. Leszczyna
    • B. Woliński

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Operating system security by integrity checking and recovery using write-protected storage

    The paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...

    Full text available to download

  • Journal of Polish Safety and Reliability Association, Summer Safety and Reliability Seminars

    Journals

    ISSN: 2084-5316

  • Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure

    Safety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...

    Full text to download in external service

  • External Security Strategies of Belarus

    Under President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...

    Full text available to download

  • SOLAP GIS in maritime research

    Publication

    Multidimensional Geographical Information System is a system especially designed to acquire, distribute, analyze and visualize complicated spatio-temporal data. Modern Geographical Information System technology can provide easy-to-use, near real-time solutions to many problems from different areas of research. In the article, authors summarize recent works on Spatial Online Analytical Processing (SOLAP) and multidimensional Geographical...

    Full text available to download

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Full text available to download

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Full text available to download

  • Energy Security of Polish Consumers in 2004-2021

    Open Research Data
    open access

    Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. In the years 2004–2021, energy security of the individual consumer in the economic dimension significantly improved. This was due to several factors:1....

  • Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants

    The aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...

  • Determining required safety integrity level

    One of the most important stage of technical system functional safety analysis is defining the safety-related functions as well as determining safety integrity level (SIL) for each defined function. A properly carried out hazard identyfication process is the necessary condition for correct definition of the safety-related functions. Determining the safety integrity level (SIL) is based on risk assessment taking into account risk...

  • Security Mechanisms in the Comcute System

    Publication

    - Year 2012

    The aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.

  • Hossein Nejatbakhsh Esfahani Dr.

    People

    My research interests lie primarily in the area of Learning-based Safety-Critical Control Systems, for which I leverage the following concepts and tools:-Robust/Optimal Control-Reinforcement Learning-Model Predictive Control-Data-Driven Control-Control Barrier Function-Risk-Averse Controland with applications to:-Aerial and Marine robotics (fixed-wing UAVs, autonomous ships and underwater vehicles)-Multi-Robot and Networked Control...

  • Rafał Leszczyna dr hab. inż.

    Dr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...

  • Health and safety training for students

    e-Learning Courses
    • I. Ziemba-Filip
    • M. Orepuk-Templin
    • M. Sokołowski

    Health and safety training is aimed at all newcoming students of Gdańsk University of Technology.

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Security and Defence Quarterly

    Journals

    ISSN: 2300-8741 , eISSN: 2544-994X

  • An integrated framework for security protocol analysis

    Publication

    - Year 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • Non-Satellite Broadband Maritime Communications for e-Navigation Services

    The development of broadband network access technologies available to users on land has triggered a rapid expansion of a diverse range of services provided by terrestrial networks. However, due to limitations of digital communication technologies in the off-shore area, the maritime ICT systems evolution so far has not followed that trend. Despite the e-navigation initiative defining the set of Maritime Services, the progress in...

    Full text available to download

  • ECOTOXICOLOGY AND ENVIRONMENTAL SAFETY

    Journals

    ISSN: 0147-6513 , eISSN: 1090-2414

  • Mobile Security: Threats and Best Practices

    Publication

    - Mobile Information Systems - Year 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Full text available to download

  • ROAD SAFETY WITHIN THE "INTEGRATED SYSTEM OF TRANSPORT SAFETY"

    Publication

    The concept of the “Integrated System of Transport Safety” in Poland is a novel solution, built upon the best practices available from only a handful of countries in the world. In the last few decades, the extent of applying integrated transport safety systems to improve transport safety systems has varied; nevertheless, studying the experience of the safest countries in the world we can say that enormous progress has been achieved...

  • Know your safety indicator – A determination of merchant vessels Bow Crossing Range based on big data analytics

    Publication

    - RELIABILITY ENGINEERING & SYSTEM SAFETY - Year 2022

    Even in the era of automatization maritime safety constantly needs improvements. Regardless of the presence of crew members on board, both manned and autonomous ships should follow clear guidelines (no matter as bridge procedures or algorithms). To date, many safety indicators, especially in collision avoidance have been proposed. One of such parameters commonly used in day-to-day navigation but usually omitted by researchers is...

    Full text available to download

  • Integrity level verification for safety-related functions

    This article describes methods for safety integrity level (SIL) verification of safety-related functions with regard to probabilistic criteria given international standards IEC 61508 and IEC 61511. These functions are to be realized using the electrical, electronic and programmable electronic (E/E/PE) systems or safety instrumented systems (SIS). Some methods are proposed for quantitative probabilistic modelling taking into account...

  • Maritime heritage of small port towns of the Polish coast

    Publication

    - PORTUSPlus - Year 2019

    The article describes problems of the gradual disappearance of real maritime heritage in small Polish port cities. The maritime heritage of small port cities was shaped by coastal processes and urban historical conditions what has led to creation of specific types of landscapes. Special architectural objects of the post-port heritage of small ports of the Polish coast are hydrotechnical constructions (i.e. breakwaters, quays),...

    Full text to download in external service

  • INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS

    Publication

    - TASK Quarterly - Year 2019

    This article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...

    Full text available to download

  • Functional safety and managing competence

    Publication

    - Year 2007

    Są nowe wyzwania związane z badaniami, edukacją i szkoleniem w obszarach bezpieczeństwa i ochrony systemów i sieci krytycznych. W rozdziale podkreśla się, że kompetencje specjalistów powinny być kształtowane w zintegrowanych procesach edukacji i szkolenia. Dlatego uzasadnione jest, aby opracować w Europie standardy i programy kształcenia na bazie odpowiednich prac badawczych i najlepszych doświadczeń z praktyki przemysłowej w celu...

  • Resilience and Security in Software Defined Networking

    Publication
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Year 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Full text to download in external service

  • Safety-Critical Systems 2023

    e-Learning Courses
    • A. Wardziński

    Safety-Critical Systems / Bezpieczeństwo systemówKierunek Informatyka, studia II stopniaProwadzący: Andrzej WardzińskiWykład: Poniedziałek 15:15 EA 07 (od 27 lutego 2023)Projekt w drugiej połowie semestruKod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu

  • Safety PL - a support tool for Road Safety Impact Assessment

    Published on 19 November 2008, the European Union's Directive 2008/96/EC is one of the most important EU documents setting out a road safety orientation, in particular, road infrastructure safety management. It identifies four main areas of activity: road safety impact assessment, road safety audit, ranking of high accident concentration sections and network safety ranking and road infrastructure safety inspection. The Directive...

    Full text to download in external service

  • Safety-Critical Systems 2023

    e-Learning Courses
    • A. Wardziński

    Safety-Critical Systems / Bezpieczeństwo systemówKierunek Informatyka, studia II stopnia Prowadzący: Andrzej Wardziński Wykład: Poniedziałek 15:15 EA 07 (od 27 lutego 2023) Projekt w drugiej połowie semestru Kod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Full text available to download

  • The Sense of Security of the Prison Service Offi cers

    Publication

    Full text to download in external service

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • Scientific Journal of Gdynia Maritime University

    Journals

    ISSN: 2657-5841 , eISSN: 2657-6988

  • Kazimierz Kosmowski prof. dr hab. inż.

    People

    Kazimierz Tadeusz Kosmowski (ur. 12 maja 1947 r. w Nakle nad Notecią) – specjalizacja z zakresu niezawodności i bezpieczeństwa systemów technicznych. Prowadzi badania dotyczące metod identyfikacji zagrożeń oraz analizy i oceny ryzyka ukierunkowanych na obiekty przemysłowe i systemy infrastruktury krytycznej w cyklu życia. Aktualne zainteresowania naukowe dotyczą współdziałania systemów OT i IT oraz bezpieczeństwa funkcjonalnego...

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Suitability of LoRaWAN Technology for the Development of Maritime Applications

    Publication

    The LoRaWAN Technology opens new possibilities for gathering and analysis of distributed data. In the paper we concentrate on its maritime usability which was tested by us in the period from June to August 2018. Measurements of the LoRaWAN network coverage in the Bay of Gdansk area were carried out. Various conditions and places were tested. The research was planned in such a way as to gradually increase the range and control the...

    Full text to download in external service

  • Broadband communication solutions for maritime ITSs: Wider and faster deployment of new e-navigation services

    Publication

    n its initial part, the paper presents an overview of popular technologies and systems currently developed or employed in maritime communication. These solutions are used to provide both ship-to-ship and ship-to-shore communication for the purpose of supporting specific services, often dedicated to maritime safety and e-navigation. Utility of such communication systems have been thoroughly verified over the years and their strengths...

    Full text to download in external service

  • Understanding Fuel Saving and Clean Fuel Strategies Towards Green Maritime

    Publication
    • V. N. Nguyen
    • K. Rudzki
    • M. Dzida
    • N. D. K. Pham
    • M. T. Pham
    • P. Q. P. Nguyen
    • P. N. Xuan

    - Polish Maritime Research - Year 2023

    Due to recent emission-associated regulations imposed on marine fuel, ship owners have been forced to seek alternate fuels, in order to meet the new limits. The aim of achieving low-carbon shipping by the year 2050, has meant that alternative marine fuels, as well as various technological and operational initiatives, need to be taken into account. This article evaluates and examines recent clean fuels and novel clean technologies...

    Full text available to download

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Full text available to download

  • Road Safety Observatories within the Structure of Integrated Transport Safety Systems

    Publication

    - Year 2011

    Accurate knowledge about the causes, circumstances and place of transport accidents is the prerequisite to take the correct action to improve transport safety. Developing appropriate organizational structures, forms and methods of management and implementation of safety measures in the sectoral approach condition the success. Therefore the Safety Information System is one of the integral areas of the Integrated Transport Safety...

  • Maritime Communications Network Development Using Virtualised Network Slicing of 5G Network

    Publication

    - Nase More - Year 2020

    The paper presents the review on perspectives of maritime systems development at the context of 5G systems implementation and their main properties. Firstly, 5G systems requirements and principles are discussed, which can be important for maritime applications. Secondly, the problems of network softwarisation, virtualisation and slicing, and possible types of services for potential implementation in 5G marine applications are described....

    Full text available to download

  • Security ontology construction and integration

    Publication

    - Year 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Maritime traffic situation awareness analysis via high-fidelity ship imaging trajectory

    Publication

    - MULTIMEDIA TOOLS AND APPLICATIONS - Year 2024

    Situation awareness provides crucial yet instant information to maritime traffic participants, and significant attentions are paid to implement traffic situation awareness task via various maritime data source (e.g., automatic identification system, maritime surveillance video, radar, etc.). The study aims to analyze traffic situation with the support of ship imaging trajectory. First, we employ the dark channel prior model to...

    Full text to download in external service

  • Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects

    This article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...

    Full text to download in external service

  • Path Loss Measurements in Wideband Radio Link Designed for Maritime Environment

    In the article, the research and analysis of path loss in designed and evaluated digital radio link for high-speed data transmission in maritime environment is presented. Collected samples of received signal were used to determine the mean path loss and its standard deviation. Measuring campaign was carried out in a real maritime conditions. The mean value of path loss reached 126 dB on a distance of 11.16 km.

  • Modelling selected road safety measures at the regional level in Europe

    Regions are Europe’s basic levels of management. The literature was reviewed to identify regional safety analyses and some of the factors that are important for road safety in the regions. Next, data were collected atthe regional NUTS 2 level in Europe for the years 1999-2008. An analysis of the data helped identify f actors which have the strongest bearing on fatalities and other safety measures. This paper presents the initial...

    Full text to download in external service

  • Evaluation of Connectivity Gaps Impact on TCP Transmissions in Maritime Communications

    Publication

    - Year 2017

    Many organizations and research working groups, including among others IEEE, ITU, ETSI and IMO are currently working towards improvements in communication of different types of vehicles (cars, trains, planes and vessels) and upgrading utilities and services offered to their crews and passengers travelling all over the world. The paper deals with selected aspects of the TCP protocol connectivity in maritime wireless networks. The...

    Full text to download in external service