Filters
total: 1280
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY CONTROLS AND MEASURES
-
European Journal of Social Security
Journals -
Journal of Global Security Studies
Journals -
ACM Transactions on Privacy and Security
Journals -
Journal of Information Security and Applications
Journals -
International Journal of Cryptography and Security
Journals -
Economics of Peace and Security Journal
Journals -
EURASIP Journal on Information Security
Journals -
JOURNAL OF CONFLICT & SECURITY LAW
Journals -
International Journal of Security and Networks
Journals -
Journal of Cyber Security and Mobility
Journals -
Journal of Information Systems Security
Journals -
Journal of Conflict Transformation and Security
Journals -
Journal of Nutrition and Food Security
Journals -
International Journal of Nuclear Security
Journals -
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
PublicationThis report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Early Detection of Malignant Transformation in Resected WHO II Low-Grade Glioma Using Diffusion Tensor-Derived Quantitative Measures
Publication -
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublicationW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publication -
Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic
Publication -
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublicationW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Music Recommendation Based on Multidimensional Description and Similarity Measures . Rekomendacja muzyki na podstawie wielowymiarowego wektora cech i miar podobieństwa
PublicationThis study aims to create an algorithm for assessing the degree to which songs belong to genres defined a priori. Such an algorithm is not aimed at providing unambiguous classification-labelling of songs, but at producing a multidimensional description encompassing all of the defined genres. The algorithm utilized data derived from the most relevant examples belonging to a particular genre of music. For this condition to be met,...
-
The boundaries for inequality aversion and certain measures of income inequality = Granice dla awersji do nierówności i pewnych miar nierówności dochodów
PublicationW srtykule wykazano, że istnieją granice dla awersji do nierówności przy zastosowaniu miar nierówności dochodów Atkinsona i uogólnionej entropii. Wyznaczono te granice dla rozkładu dochodów uogólnionego Beta drugiego rodzaju GB2
-
Indicator Analysis of Security Risk for Electronic Systems Used to Protect Field Command Posts of Army Groupings
Publication -
Issues Related to Power Supply Reliability in Integrated Electronic Security Systems Operated in Buildings and Vast Areas
Publication -
Shock a disposable time in electronic security systems / Porażenie a czas dyspozycyjny w elektronicznych systemach bezpieczeństwa
Publication -
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Mariusz Jaczewski dr inż.
People -
Journal of Security and Sustainability Issues
Journals -
Journal of Asian Security and International Affairs
Journals -
International Journal of Security and Its Applications
Journals -
Security Dimensions: International & National Studies
Journals -
Journal of Digital Forensics Security and Law
Journals -
Security Dimensions and Socio-Legal Studies
Journals -
International Journal of Information Security and Privacy
Journals -
International Journal of Information and Computer Security
Journals -
Stability-International Journal of Security and Development
Journals -
Policija i Sigurnost-Police and Security
Journals -
IEEE Transactions on Information Forensics and Security
Journals -
Journal of Internet Services and Information Security
Journals -
ACM Transactions on Information and System Security
Journals -
International Journal of Computer Science and Security
Journals -
Public administration and state security aspects
Journals -
Journal of Homeland Security and Emergency Management
Journals -
Chinese Journal of Network and Information Security
Journals -
Zagrożenia starych budynków w sąsiedztwie nowej zabudowy = The threat of old buildings security in neighbourhood of new buildings
PublicationNa przykładzie jednego z budynków mieszkalnych, przedstawiono zagrożenia na jakie są narażone stare obiekty w zwartej zabudowie śródmiejskiej, podczas prowadzenia w ich sąsiedztwie prac budowlanych, którym często towarzyszą głębokie wykopy. Powoduje to powstawanie licznych uszkodzeń, uniemozliwiających ich prawidłową eksploatację lub stanowiących nawet zagrożenie bezpieczeństwa.
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublicationA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
Ryszard Katulski prof. dr hab. inż.
People -
International Journal of Electronic Security and Digital Forensics
Journals -
ISeCure-ISC International Journal of Information Security
Journals