Search results for: SAFETY AND SECURITY - Bridge of Knowledge

Search

Search results for: SAFETY AND SECURITY

Search results for: SAFETY AND SECURITY

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System

    Publication

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Full text to download in external service

  • Feature extraction in detection and recognition of graphical objects

    Publication

    - Year 2022

    Detection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...

  • Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems

    Publication

    This article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...

  • New RFID readers for scalable RFID system

    RFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...

  • Simulating Malware with MAlSim

    Publication

    - Year 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publication

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Full text to download in external service

  • Security of export transactions in the offer of leading banks on the Polish market

    Publication

    - Year 2018

    The following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...

  • The symmetric extendibility of quantum states

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...

    Full text to download in external service

  • Areas of research in maritime security

    Publication

    - Year 2006

    W referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publication

    - Year 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publication
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Full text available to download

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES

    Problems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...

    Full text available to download

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publication

    - Year 2015

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Full text to download in external service

  • Signatures and acoustic images of objects moving in water

    Publication

    Observation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol

    Publication

    The industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...

    Full text available to download

  • ENISA Study: Challenges in Securing Industrial Control Systems

    Publication

    - Year 2013

    In 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...

  • Device-independent quantum key distribution based on measurement inputs

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Full text available to download

  • Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics

    Publication
    • C. Busch
    • F. Deravi
    • D. Frings
    • E. Kindt
    • R. Lessmann
    • A. Nouak
    • J. Salomon
    • M. Achcar
    • F. Alonso-Fernandez
    • D. Bachenheimer... and 38 others

    - IET Biometrics - Year 2023

    Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...

    Full text available to download

  • Security Assessment of a Turbo-Gas Power Plant

    Publication

    - Year 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Full text to download in external service

  • Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras

    The study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.

  • Trust Management Method for Wireless Sensor Networks

    Publication

    - Year 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Full text available to download

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria

    Publication

    - Year 2022

    Information technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...

    Full text available to download

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publication

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Full text to download in external service

  • The role of rewards and demands in burnout among surgical nurses

    Objective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...

    Full text available to download

  • Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments

    Publication

    - Year 2010

    The goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publication

    - Year 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Full text to download in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download

  • On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway

    Publication

    - Year 2008

    Zapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Self-Organizing Wireless Monitoring System for Containers

    This paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...

  • Self-organizing wireless monitoring system for cargo containers

    This paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...

    Full text available to download

  • A place of school in the idea of the sustainable development

    Publication

    Well designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).

    Full text to download in external service

  • Further developments of parameterization methods of audio stream analysis for secuirty purposes

    Publication

    - Year 2009

    The paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • Implementing decisional trust: a first approach for smart reliable systems

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2009

    In this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...

    Full text to download in external service

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Full text available to download

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Full text available to download

  • Resolving conflicts in object tracking for automatic detection of events in video

    An algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...

    Full text to download in external service

  • Towards Cognitive and Perceptive Video Systems

    Publication
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Year 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Full text to download in external service

  • Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system

    Publication

    Motivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.

    Full text available to download

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Full text to download in external service

  • Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19

    Publication

    - Knowledge and Process Management - Year 2022

    Abstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...

    Full text available to download

  • A Paradigm for HV, MV, LV Distribution Grid Development Planning

    Publication

    In the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...

    Full text available to download

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publication

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Full text to download in external service