Search results for: SECURITY OF DATA - Bridge of Knowledge

Search

Search results for: SECURITY OF DATA

Search results for: SECURITY OF DATA

  • Karol Zdzisław Zalewski mgr inż.

    People

  • Systemy bezprzewodowej łączności i transmisji danych dla potrzeb bezpieczeństwa publicznego (studium stanu i rozwiązań)

    W niniejszym rozdziale przedstawiono charakterystyki rozwiązań użytkowych zrealizowanych w Katedrze Systemów i Sieci Radiokomunikacyjnych Politechniki Gdańskiej. Autorzy scharakteryzowali opracowane przez zespół badawczy Katedry, systemy bezprzewodowego monitoringu zagrożeń bezpieczeństwa oraz zarządzania i sterowania infrastrukturami krytycznymi. W tym też kontekście omówiono następujące systemy i aplikacje użytkowe: − globalny...

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • The fast identification of explosives, natcotics and other chemicals carried on board of ships or transported in containers

    Publication

    - Year 2011

    The fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is an advanced technique used in state-of-the art laboratories for fast identification of chemicals. No sample preparation is required, and identification can be carried out through transparent packing, such as plastic or glass,...

    Full text to download in external service

  • Development of the System Assurance Reference Model for Generating Modular Assurance Cases

    Publication

    - Year 2023

    Assurance cases are structured arguments used to demonstrate specific system properties such as safety or security. They are used in many industrial sectors including automotive, aviation and medical devices. Larger assurance cases are usually divided into modules to manage the complexity and distribute the work. Each of the modules is developed to address specific goals allocated to the specific objects i.e. components of the...

    Full text to download in external service

  • Extraction of stable foreground image regions for unattended luggage detection

    Publication

    A novel approach to detection of stationary objects in the video stream is presented. Stationary objects are these separated from the static background, but remaining motionless for a prolonged time. Extraction of stationary objects from images is useful in automatic detection of unattended luggage. The proposed algorithm is based on detection of image regions containing foreground image pixels having stable values in time and...

    Full text available to download

  • Analysis of electricity generation variability in 2019 with special consideration of electrical energy generation from wind sources.

    Publication

    - Year 2020

    This article presents issues related to the broadly understood development of wind energy. The state of the art of wind energy in the world has been discussed. This paper also shows issues related to factors affecting the development of renewable energy sources and their impact on the natural environment on the basis of available research. The focus is, however, on the critical analysis of phenomena in the data of the Transmission...

    Full text available to download

  • Koncepcja zdalnego sterowania i monitoringu urządzeń trakcyjnych z wykorzystaniem technologii teleinformatycznych

    Publication

    Advancement in wireless communication enables engineers to apply sophisticated and relatively inexpensive technologies in new fields of industry, which were previously designated solely to wire-based solutions. One of those fields is railway transportation system. In effect of a high reliability and safety demands, this area was resistive to new technologies. Nowadays, increased security and reliability of wireless sensor networks...

  • Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection

    Publication
    • A. G. Akintola
    • A. O. Balogun
    • H. A. Mojeed
    • F. Usman-Hamza
    • S. A. Salihu
    • K. S. Adewole
    • G. B. Balogun
    • P. O. Sadiku

    - International Journal of Interactive Mobile Technologies - Year 2022

    Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...

    Full text available to download

  • Piotr Dalka mgr inż.

    People

  • Audio content analysis in the urban area telemonitoring system

    Publication

    Artykuł przedstawia możliwości rozwinięcie monitoringu miejskiego o automatyczną analizę dźwięku. Przedstawiono metody parametryzacji dźwięku, które możliwe są do zastosowania w takim systemie oraz omówiono aspekty techniczne implementacji. W kolejnej części przedstawiono system decyzyjny oparty na drzewach zastosowany w systemie. System ten rozpoznaje dźwięki niebezpieczne (strzał, rozbita szyba, krzyk) wśród dźwięków zarejestrowanych...

    Full text to download in external service

  • Information-driven network resilience: Research challenges and perspectives

    Publication
    • J. Rak
    • D. Papadimitriou
    • H. Niedermayer
    • P. Romero

    - Optical Switching and Networking - Year 2017

    Internet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...

    Full text to download in external service

  • Clustering Context Items into User Trust Levels

    An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....

    Full text available to download

  • System of monitoring of the Forest Opera in Sopot structure and roofing

    The authors present a solution realized in Forest Opera (name in Polish: Opera Leśna) in Sopot (Poland) in connection with the modernization and construction of a new roof. The complicated structure of the roof of the facility and the used covering in form of membrane made of technical fabric required (for security reasons) to install the unit of devices allowing for the continuous geodetic monitoring of the facility. Monitoring...

    Full text to download in external service

  • Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework

    Publication

    - OCEAN & COASTAL MANAGEMENT - Year 2024

    The rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...

    Full text to download in external service

  • Piotr Szczuko dr hab. inż.

    Piotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...

  • Income obtained according to particular rates only by taxpayers conducting non-agricultural business activity 2015

    Open Research Data
    open access

    Taxation in the form of a lump sum on recorded revenues does not apply to certain types of activity, regardless of their size. We are talking about taxpayers who achieve revenue in whole or in part, among others from on account of running pharmacies, activities in the field of buying and selling foreign exchange values, activities in the field of trade...

  • Theory and implementation of a virtualisation level Future Internet defence in depth architecture

    Publication
    • J. Konorski
    • P. Pacyna
    • G. Kolaczek
    • Z. Kotulski
    • K. Cabaj
    • P. Szalachowski

    - International Journal of Trust Management in Computing and Communications - Year 2013

    An EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...

    Full text to download in external service

  • Feature extraction in detection and recognition of graphical objects

    Publication

    - Year 2022

    Detection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...

  • Simulating Malware with MAlSim

    Publication

    - Year 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publication

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Full text to download in external service

  • The symmetric extendibility of quantum states

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...

    Full text to download in external service

  • WIKI-WS as a C2 NIWA Web Service Management Platform

    Publication

    - TASK Quarterly - Year 2015

    The Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...

    Full text available to download

  • AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES

    Problems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...

    Full text available to download

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Full text available to download

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publication

    - Year 2015

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Full text to download in external service

  • Signatures and acoustic images of objects moving in water

    Publication

    Observation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • ENISA Study: Challenges in Securing Industrial Control Systems

    Publication

    - Year 2013

    In 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...

  • Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics

    Publication
    • C. Busch
    • F. Deravi
    • D. Frings
    • E. Kindt
    • R. Lessmann
    • A. Nouak
    • J. Salomon
    • M. Achcar
    • F. Alonso-Fernandez
    • D. Bachenheimer... and 38 others

    - IET Biometrics - Year 2023

    Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...

    Full text available to download

  • INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS

    Publication

    - TASK Quarterly - Year 2019

    This article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...

    Full text available to download

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria

    Publication

    - Year 2022

    Information technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...

    Full text available to download

  • The role of rewards and demands in burnout among surgical nurses

    Objective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...

    Full text available to download

  • Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review

    Publication
    • S. A. Siddiqui
    • Ö. Süfer
    • G. Çalışkan Koç
    • H. Lutuf
    • T. Rahayu
    • R. Castro Munoz
    • I. Fernando

    - ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY - Year 2024

    Food security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...

    Full text available to download

  • On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway

    Publication

    - Year 2008

    Zapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...

  • A place of school in the idea of the sustainable development

    Publication

    Well designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).

    Full text to download in external service

  • Self-Organizing Wireless Monitoring System for Containers

    This paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...

  • Self-organizing wireless monitoring system for cargo containers

    This paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...

    Full text available to download

  • Further developments of parameterization methods of audio stream analysis for secuirty purposes

    Publication

    - Year 2009

    The paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...

  • Implementing decisional trust: a first approach for smart reliable systems

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2009

    In this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...

    Full text to download in external service

  • Resolving conflicts in object tracking for automatic detection of events in video

    An algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...

    Full text to download in external service

  • Towards Cognitive and Perceptive Video Systems

    Publication
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Year 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Full text to download in external service

  • Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system

    Publication

    Motivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.

    Full text available to download

  • A Paradigm for HV, MV, LV Distribution Grid Development Planning

    Publication

    In the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...

    Full text available to download

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Full text available to download

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Full text available to download

  • IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA

    34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...

    Full text available to download

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Full text available to download

  • Quaternion Encryption Method for Image and Video Transmission

    Quaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...