Search results for: Maritime Safety and Security - Bridge of Knowledge

Search

Search results for: Maritime Safety and Security

Search results for: Maritime Safety and Security

  • Knowledge-based functional safety management using ProSIL software

    In the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented....

    Full text to download in external service

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publication

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Full text to download in external service

  • Security Information Sharing for the Polish Power System

    Publication

    - Year 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Full text available to download

  • Experiment with small objects floating under water in the harbor security aspect.

    Publication

    - Year 2013

    Observation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...

    Full text to download in external service

  • Ireneusz Czarnowski Prof.

    People

    IRENEUSZ CZARNOWSKI is a graduate of the Faculty of Electrical Engineering at Gdynia Maritime University. He gained a doctoral degree in the field of computer science at Poznan University of Technology and a postdoctoral degree in the field of computer science at Wroclaw University of Science and Technology. Since 1998 is associated with Gdynia Maritime University, currently is a professor of computer science in the Department...

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publication

    - Year 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publication

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • M2M communications system proposal for maritime applications

    This article describes the proposal to use the M2M communication to enhance the safety of people, ships and other marine infrastructure, in broadly defined marine systems. In addition, there are numerous examples of planned solutions to be implemented in the near future as well as new services. The proposal for M2M communication system architecture is described below. In addition, the use of the STRUGA system radio interface as...

    Full text available to download

  • Fading Modeling in Maritime Container Terminal Environments

    Publication

    - IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY - Year 2018

    In this paper, an analytical model for slow and fast fading effects in maritime container terminals is derived, from fitting distributions to the results of measurements performed in an actual operational environment. The proposed model is composed of a set of equations, enabling to evaluate fading statistical distribution parameters for different system and environments conditions, as a function of frequency, base station antenna...

    Full text to download in external service

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems

    Publication

    - Year 2021

    This chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...

    Full text to download in external service

  • Problems in designing and operating the functional safety solutions of higher integriity levels

    The aim of this article is to identify and discuss some problems that have been encountered in designing and operating the functional safety solutions of higher safety integrity levels (SIL 3 and SIL 4) in the light of analyses outlined in a new version of the international standard IEC 61508:2010. Examples of such solutions are the electric / electronic / programmable electronic systems (E/E/PESs) and the safety instrumented systems...

  • An Intergrated Model of Motion, Steering, Positioning and Stabilization of an Unmanned Autonomous Maritime Vehicle

    In the paper the aim of an interdisciplinary research is presented. The research method is introduced. An object the unmanned autonomous maritime vehicle is briefly described. The key research problem concerns a combined model of the vehicle motion including the loads of lift and hydrodynamic nature. The model takes into account the gravity and displacement forces, resistance and thrust forces, lift and other hydrodynamic forces....

    Full text available to download

  • Cognitive engineering and functional safety technology for reducing risks in hazardous plants

    Cognitive engineering is considered nowadays as interesting multidisciplinary domain that focuses on improving the relations between humans and the systems that are supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are designed and implemented according to the functional safety concept. The objective is to maintain...

    Full text to download in external service

  • Challenges associated with the design of a small unmanned autonomous maritime vehicle

    The paper contains the preliminary results of the research connected with development of a small unmanned autonomous maritime vehicle. First of all a general description of research is introduced. Next, a concept of a vehicle is presented. Then, a brief description of a research method is given. Next, the current research problems under way are introduced. They concern the ballasting, motion and precise position stabilization system...

    Full text available to download

  • SAFETY SCIENCE

    Journals

    ISSN: 0925-7535 , eISSN: 1879-1042

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Full text available to download

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • Security Assessment of a Turbo-Gas Power Plant

    Publication

    - Year 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Full text to download in external service

  • Application of unmanned USV surface and AUV underwater maritime platforms for the monitoring of offshore structures at sea

    The operation of offshore structures at sea requires the implementation of advanced systems for their permanent monitoring. There is a set of novel technologies that could be implemented to deliver a higher level of effective and safe operation of these systems. A possible novel solution may be the application of a new maritime unmanned (USV) surface and underwater vehicles/platforms (AUV). Application of such vehicles/platforms...

    Full text available to download

  • Functional safety and reliability analysis methodoloogy for hazardous industrial plants

    Publication

    - Year 2013

    This monograph is devoted to current problems and methods of the functional safety and reliability analyses of the programmable control and protection systems for industrial hazardous plants. The results of these analyses are useful in the process of safety management in life cycle, for effective reducing relevant risks at the design stage, and then controlling these risks during the operation of given installation. The methodology...

  • Designing issues of the alarm system in context of functional safety and human factors

    This article addresses selected aspects of the alarm system and human factors that should be evaluated during the design and operation of an industrial hazardous installation. In such installations the layer of protection analysis (LOPA) methodology is often applied for simplified risk analysis based on defined accident scenarios. To reduce and control the risks the safety instrumented functions (SIFs) are identified and their...

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Full text to download in external service

  • Container port expansion towards the sea in the context of maritime spatial planning

    Publication

    - EUROPA XXI - Year 2019

    The growth of ships causes a significant increase in demand for new port surfaces and demands for the depths of water bodies in the ports. Due to technological changes in the transshipment and development pressure ports lacks space and they move towards the sea with their activities. The paper discusses the reasons for the phenomenon of expansion of ports towards the sea and its effects on maritime spatial planning.

    Full text available to download

  • Assessment of performance of unmanned maritime vehicles (USV, UUV, AUV) by CFD and MES investigation, PG_00053662

    e-Learning Courses
    • M. K. Gerigk

    The course entitled "Assessment of Performance of Unmanned Maritime Vehicles" consists of the following problems to be discussed during the lectures (W): - major areas of application of UMV unmanned maritime vehicles, - sea environment, - types of UMV vehicles, - parameters, characteristics and features of UMV vehicles, - research, design, construction, implementation and operation of  UMV vehicles, - systems of UMV vehicles...

  • A heterogenous wireless system for maritime communication - the netBaltic system architecture

    Publication

    - Year 2017

    In the article, the concept of a heterogeneous wireless maritime mesh network offering transmission for e.g., e-navigation services is presented. The constrains of existing and competitive solutions are discussed showing the need for a new system. The authors present detailed information about a netBaltic node's architecture and networking mechanisms offering different transmission capabilities and proposed for use on different...

    Full text to download in external service

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Full text available to download

  • Automatic sound recognition for security purposes

    Publication

    - Year 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publication

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • Safety Assessment of Tram Stops

    Publication

    - Journal of KONBiN - Year 2019

    The safety of public transport stops is the subject of numerous studies in large agglomerations around the world. This is due to the fact that it is a passenger exchange zone where collisions and accidents involving people getting on or off public transport vehicles most often occur. For this reason, the purpose of the article is to present the results of the safety assessment of the stop zones for two selected tram lines in Wroclaw....

    Full text available to download

  • UN DECADE OF ACTION FOR ROAD SAFETY IN THE NATIONAL ROAD SAFETY STRATEGY UNTIL 2020 – POLISH APPROACH

    Publication

    Poland continues to have the highest number of road deaths per one million population in the European Union, according to a 2012 European Commission report – in 2011 the rate in Poland was 109 fatalities compared to the EU average of 61 killed. Adopted by the government in 2005 Poland’s National Road Safety Programme GAMBIT 2005 was the response to the EU’s 3rd Road Safety Action Programme. Despite extensive road safety efforts,...

  • A sense of security and freedom in a residential environment

    The article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...

    Full text available to download

  • Road safety performance indicators and their explanatory value: A critical view based on the experience of Central European countries

    Publication

    - SAFETY SCIENCE - Year 2010

    Counts of road crashes and their victims represent essential information for road safety practitioners allowing them to analyse their spatial and temporal aspects. However, they cannot provide details on the factors causing road crashes. As a result, various road safety performance indicators (RSPIs) were introduced, making it possible to gather information on the effectiveness of interventions on road safety in given areas. However,...

    Full text to download in external service

  • Road safety analysis in Poland using time-series modelling techniques

    A number of international studies argue that there is a correlation between the number of traffic fatalities and the degree of public activity. The studies use the unemployment rate to support that argument. As unemployment grows miles travelled fall, a factor known to affect road safety. This relationship seems to be true for Poland, as well. The model presented in the paper is intended to prove it. It is a structural time-series local...

    Full text to download in external service

  • Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

    Publication

    - Year 2013

    The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...

    Full text to download in external service

  • SDN testbed for validation of cross-layer data-centric security policies

    Publication

    - Year 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Full text to download in external service

  • New model of cooperation between logistics center and maritime container terminal

    Publication

    - Year 2018

    The following article presents the innovative concept of logistics centers called “port-centric logistics”, which finds close co-operation with maritime container port. This concept can reduce the costs of logistics operations. In the first part the author focuses on describing the specifics of logistics centers. The following parts include characteristic of “port-centric logistics” concept. The last part of the paper contains...

    Full text available to download

  • Road Infrastructure Safety Management in Poland

    The objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be identified, assessed and mitigated. Road transport safety is significantly less developed than that of rail, water and air transport. The average individual risk of being a fatality in relation to the distance covered is thirty times higher in road transport that in the other modes. This is...

    Full text available to download

  • Wojciech Kustra dr inż.

      I am a Faculty member (Assistant Professor, Highway and Transportation Engineering Department) at the Faculty of Civil and Environmental Engineering, Gdansk University of Technology, Poland). My main research interests include: road safety, accident analysis, traffic modeling, transportation planning, traffic engineering, transport management, gis analysis.

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publication

    - SENSORS - Year 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Full text available to download

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publication

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Full text to download in external service

  • Security information sharing for smart grids: Developing the right data model

    Publication

    - Year 2014

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Full text to download in external service

  • Security of export transactions in the offer of leading banks on the Polish market

    Publication

    - Year 2018

    The following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...

  • Examination of fresh water chemistry in maritime Antarctica during austral summer 2017

    Publication

    - AIP Conference Proceedings - Year 2019

    Due to the fact that Antarctica is one of the least polluted places on Earth, it is a perfect place to observe the spread of global pollution. Therefore, research conducted on this continent is important due to the possibility of investigating the type of pollution and their way of transport. This work considers presence of organic contaminants in Maritime Antarctica in unexplored until now, Lions Rump headland. Qualitative and...

    Full text available to download

  • INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS

    It has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...

    Full text to download in external service

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Full text available to download