Search results for: agile, security, software development methods - Bridge of Knowledge

Search

Search results for: agile, security, software development methods

Search results for: agile, security, software development methods

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text available to download

  • Heuristic Minimization of Symmetric Index Generation Functions utilizing their Properties

    Publication

    - Journal of Software and Systems Development - Year 2021

    Full text to download in external service

  • Formal Methods in Software Engineering and Defence Systems Workshop

    Conferences

  • Overcoming Challenges of Virtual Scrum Teams: Lessons Learned Through an Action Research Study

    Publication

    - Year 2023

    After the COVID-19 breakout, agile teams found themselves in situations that “pure agilists” and textbooks on agile methods had preferred to ignore. Whereas agile mindsets helped them to quickly shift to remote work, mere virtualization of agile practices often proved insufficient, and several challenges emerged. This paper reports on an Action Research project carried out in Lufthansa Systems Poland with the aim of (1) revisiting...

    Full text to download in external service

  • An integrated framework for security protocol analysis

    Publication

    - Year 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Acceptance Testing of Software Products for Cloud-Based On-Line Delivery

    Publication

    Software products intended for on-line delivery by distributors serving an open community of subscribers are developed in a specific life-cycle model, in which roles of the major stakeholders are strongly separated, unlike in any other software development model known in software engineering. Its specificity underlines the fact that a distributor of the final product, responsible for its acceptance for publication and delivery...

    Full text available to download

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Full text to download in external service

  • Understanding Sustainable Knowledge-Sharing in Agile Projects: Utilizing Follow-the-Sun Technique (FTS) in Virtual Teams

    Publication

    - Year 2023

    In Agile IT projects, promoting effective knowledge sharing is essential not only for achieving success but also for supporting Sustainable Development Goals (SDGs). However, Companies using virtual teams may face challenges in coordinating work, particularly when teams are distributed across different time zones, ultimately hindering their ability to consistently share knowledge. This can lead to delays and inefficiencies, ultimately...

    Full text available to download

  • Lean Manufacturing, W, Mechatronika, IDE, sem. 03, letni 23/24 (PG_00062997)

    e-Learning Courses
    • J. Kropiwnicki

    Development of Production Systems and Lean Management. Strategies in Process Optimisation. Analytical Methods. Lean Principles and Lean Methods. Change Management. Roll-out Strategies for Lean Manufacturing. Total productive Management.

  • Lean Manufacturing, W, Energetyka, sem. 03, letni 23/24 (PG_00062998)

    e-Learning Courses
    • J. Kropiwnicki

    Development of Production Systems and Lean Management. Strategies in Process Optimisation. Analytical Methods. Lean Principles and Lean Methods. Change Management. Roll-out Strategies for Lean Manufacturing. Total productive Management.

  • Computer-Aided Automated Greenery Design—Towards a Green BIM

    Contemporary climate challenges are changing the architect’s awareness, which results in a broader spectrum of interest. The available software enables the design of vegetation, but it is often very limited and requires specialist knowledge. The available software allows the creation of individual solutions based on visual algorithms or writing scripts; however, they are still not common methods used in architecture and urban planning....

    Full text available to download

  • Expert assessment of arguments: a method and its experimental evaluation

    Publication

    - Year 2008

    Argument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...

    Full text to download in external service

  • International Joint Conference CAAP/FASE on Theory and Practice of Software Development

    Conferences

  • The level of Knowledge and use of tax exemptions for R&D activities

    Open Research Data
    open access

    The following research data contains the answers of 259 entrepreneurs to questions regarding tax reliefs and exemptions for research and development activities. As part of the study answers to the following questions were obtained:Have you ever used the tax relief for new technologies / R&D?Has your company acquired a license / software (intangible...

  • Teaching management skills to software develop- ment teams through the lean start-up methodology

    Publication

    - Year 2014

    In order for development teams to understand the impact of software development on value delivery it is important that all team members, including software engineers, possess adequate management skills which not always have been acquired during university education. The lean start-up methodology techniques enable new ventures to test hypothesis, gather customer feed- back and create a minimum viable product. The obtained information...

  • Extracting concepts from the software requirements specification using natural language processing

    Publication

    - Year 2018

    Extracting concepts from the software require¬ments is one of the first step on the way to automating the software development process. This task is difficult due to the ambiguity of the natural language used to express the requirements specification. The methods used so far consist mainly of statistical analysis of words and matching expressions with a specific ontology of the domain in which the planned software will be applicable....

    Full text to download in external service

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Full text available to download

  • BET specific surface area measurements of silica-coated bismuth oxide (Bi2O3)/gadolinium oxide (Gd2O3) core-shell structures

    Open Research Data

    The BET specific surface area was measured using an N2 adsorption/desorption isotherm (Micromeritics ASAP 2460, Norcross, GA, USA).

  • AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES

    Problems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...

    Full text available to download

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • Leveraging Generative AI Tools for UX Design in Lean and Agile Projects

    Publication

    - Year 2024

    Recent advancements in Generative AI (GenAI) open new opportunities to improve User Experience (UX) practitioners’ efficiency in their projects. Due to intensive teamwork caused by time pressure and readiness for rapid changes, Lean and Agile project management seems particularly predestined for easy adoption of GenAI-supported UX design methods. However, precipitate and spontaneous leveraging of GenAI tools to UX design bears...

    Full text to download in external service

  • DECISION - MAKING IN VIRTUAL SOFTWARE TEAMS USING CLOUD PLATFORMS

    Publication

    Software development projects are usually realized by traditional or virtual IT teams using computing clouds. Team collaboration requires decision - making regarding essential aspects of a project progress. The article concerns methods of decision – making process in the case of traditional and virtual teams’ work. The research results conducted in a group of IT specialists are presented, and to analyze their preferences in decision-making...

    Full text available to download

  • The methods of secure data transmission in the KNX system

    The article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.

    Full text to download in external service

  • Determining and verifying the safety integrity level with security aspects

    Publication

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Full text to download in external service

  • Cybersecurity of Enterprise Infrastructure 2023

    e-Learning Courses
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Managing enterprise IT infrastructure and security 2022

    e-Learning Courses
    • R. Leszczyna
    • B. Woliński

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cybersecurity of Enterprise Infrastructure 2024

    e-Learning Courses
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems

    Publication

    This article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...

  • A Paradigm for HV, MV, LV Distribution Grid Development Planning

    Publication

    In the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...

    Full text available to download

  • ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code

    Conferences

  • Simulating Malware with MAlSim

    Publication

    - Year 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publication

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Full text to download in external service

  • External Security Strategies of Belarus

    Under President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...

    Full text available to download

  • Software Quality, Reliability, and Security (International Conference on Quality Software [QSIC])

    Conferences

  • Ahmer Bin Hafeez

    People

    I have experience in Microbiology & Computational Biology, particularly bioinformatics, homology modeling, phylogenetics, structural biology, and drug discovery. Currently, my interest lies in translatable omics studies and drug discovery against novel protein targets involved in cancer and infectious diseases and Host-Pathogen PPIs. My aim involves the use of computational methods for the identification of novel targets and to...

  • International Conference on Intelligent Software Methodologies, Tools, and Techniques (was International Conference on Software Methods and Tools)

    Conferences

  • Assurance Case Patterns On-line Catalogue

    Publication

    - Year 2017

    Assurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...

    Full text available to download

  • Computer controlled systems - 2022/2023

    e-Learning Courses
    • P. Raczyński

    materiały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...

  • CCS-lecture-2023-2024

    e-Learning Courses
    • P. Raczyński

    materiały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution optimization...

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Full text available to download

  • OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW

    Nieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...

    Full text available to download

  • Building Project and Project Team Characteristics For Creating Hybrid Management Processes

    Publication
    • C. Orłowski
    • T. Deręgowski
    • M. Kurzawski
    • A. Ziółkowski
    • B. Chrabski

    - Year 2016

    This paper introduces a method of building the characteristic of Software Development Project. Project characteristic is determined on the basis of several factors such as the complexity of Software Development Project and Project Team, results of historical projects and information on processes and methodologies, which are implemented in analyzed organizations. Information on project complexity can be applied to many different...

  • Communication methods at selected private universities in Gdańsk, Sopot and Gdynia in 2010

    Open Research Data
    open access

    A university, including a private one, is an organization serving the environment. Therefore, a necessary condition (especially in today's market situation) is the development of cooperation between universities and the environment. Creating mutual relations between universities with the environment, belongs to an important area of activity of this...

  • The role of rewards and demands in burnout among surgical nurses

    Objective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...

    Full text available to download

  • Piotr Grudowski dr hab. inż.

    Professor Dr hab. Eng. Piotr Grudowski heads the Department of Quality and Commodity Management at the Faculty of Management and Economics of Gdansk University of Technology. In the years 1987-2009 he worked at the Faculty of Mechanical Engineering of the Gdansk University of Technology, where he obtained a doctoral degree in technical sciences in the discipline of construction and operation of machines and he headed the Department...

  • Integration and Dependency in Software Lifecycle Based on Jazz Platform

    Publication
    • B. Chrabski

    - Year 2011

    Software delivery organizations are being asked to meet goals that seem mutually exclusive. Teams are asked to increase product quality, accelerate time to market, and meet increasing mandates from regulatory bodies. As software solutions and software development environments become rapidly more complex. Many business drivers compound these challlenges.

  • Virtual Sightseeing in Immersive 3D Visualization Lab

    The paper describes the modern Immersive 3D Visualization Lab (I3DVL) established at the Faculty of Electronics, Telecommunications and Informatics of the Gdańsk University of Technology (GUT) and its potential to prepare virtual tours and architectural visualizations on the example of the application allowing a virtual walk through the Coal Market in Gdańsk. The paper presents devices of this laboratory (CAVE, walk simulator etc.),...

    Full text available to download

  • QUEUE I

    Events

    26-09-2022 10:12 - 30-09-2022 10:12

    Faculty of Applied Physics and Mathematics of Gdańsk Tech invites international students to the next summer school - Quantum and Molecules I (QUEUE I), organized within the ScienceApp project.

  • Data Domain Adaptation in Federated Learning in the Breast Mammography Image Classification Problem

    We are increasingly striving to introduce modern artificial intelligence techniques in medicine and elevate medical care, catering to both patients and specialists. An essential aspect that warrants concurrent development is the protection of personal data, especially with technology's advancement, along with addressing data disparities to ensure model efficacy. This study assesses various domain adaptation techniques and federated...

    Full text to download in external service

  • Yade-open DEM: an open-source software using a discrete element methodto simulate granular material

    Publication

    - ENGINEERING COMPUTATIONS - Year 2008

    Purpose - YADE-OPEN DEM is an open source software based on the Discrete Element Method which uses object oriented programming techniques. The paper describes the softwarearchitecture.Design/methodology/approach - The DEM chosen uses position, orientation, velocity and angular velocity as independent variables of simulated particles which are subject to explicit leapfrog time-integration scheme (Lagrangian method). The three-dimensional...

    Full text available to download