Filters
total: 26240
-
Catalog
- Publications 3943 available results
- Journals 585 available results
- Conferences 261 available results
- Publishing Houses 2 available results
- People 508 available results
- Inventions 1 available results
- Projects 23 available results
- Research Teams 1 available results
- e-Learning Courses 125 available results
- Events 3 available results
- Open Research Data 20788 available results
displaying 1000 best results Help
Search results for: INFORMATION%20SECURITY
-
Automatic system for measuring shifts and deformation of dental prostheses
Publication -
Deformation of details projection of components manufactured by Stereolithography method
PublicationW artykule przedstawiono i omówiono zmiany konstrukcyjne w elementach wykonywanych metodami Szybkiego Prototypowania powstające w trakcie przygotowywania danych jak i procesu wytwarzania. Praca opisuje charakter zmaian jak sposoby ich minimalizacji.
-
Effect of head-to-tail cyclization on conformation of histatin-5
Publication -
On the deformation and frequency analyses of SARS-CoV-2 at nanoscale
PublicationThe SARS-CoV-2 virus, which has emerged as a Covid-19 pandemic, has had the most significant impact on people's health, economy, and lifestyle around the world today. In the present study, the SARS-CoV-2 virus is mechanically simulated to obtain its deformation and natural frequencies. The virus under analysis is modeled on a viscoelastic spherical structure. The theory of shell structures in mechanics is used to derive the governing...
-
Changes of Conformation in Albumin with Temperature by Molecular Dynamics Simulations
PublicationThis work presents the analysis of the conformation of albumin in the temperature range of 300K – 312K, i.e., in the physiological range. Using molecular dynamics simulations, we calculate values of the backbone and dihedral angles for this molecule. We analyze the global dynamic properties of albumin treated as a chain. In this range of temperature, we study parameters of the molecule and the conformational entropy derived from...
-
GIS three-dimensional Modelling with geo-informatics techniques
PublicationThe integration issue of virtual models and geo-referenced database have a very broad spectrum of potential applications. Before the integration issue was on the cusp, it was quite problematic to combine three-dimensional models with the geo-referenced database. An integrated database contains a variety of data including such as object orientated data model and raster data. Within this paper, authors present an integration process...
-
Numerical solutions for large deformation problems in geotechnical engineering
PublicationThe problem of large deformations often occurs in geotechnical engineering. Numerical modeling of such issues is usually complex and tricky. The chosen solution has to implicate soil-soil and soil-structure interactions. In this paper, a review of the most popular numerical methods for large deformation problems is presented. The Coupled Eulerian-Lagrangian (CEL) method, the Arbitrary Lagrangian-Eulerian (ALE) method, the Smoothed...
-
Finding deformation of the straight rail track by GNSS measurements
PublicationW 2009 roku na Politechnice Gdańskiej i Akademii Marynarki Wojennej w Gdyni zostały przeprowadzone, po raz pierwszy, ciągłe pomiary satelitarne toru kolejowego z wykorzystaniem względnej metody fazowej na bazie polskiej Aktywnej Sieci Geodezyjnej ASG-EUPOS i serwisu czasu rzeczywistego RTK (GPRS) - NAVGEO. Przeprowadzona analiza wykazała silny związek między lokalizacją odbiornika GNSS i dokładnością wyznaczania pozycji, wpływ...
-
Analysis of Excavation-induced Deformation with Different Soil Models
PublicationMonitorowany wykop budowlany w centrum Warszawy poddano symulacjom numerycznym z wykorzystaniem metody elementów skończonych. Wykop zrealizowany został w pre-konsolidowanych utworach spoistych z zastosowaniem ścian szczelinowych i metody stropowej. Szczególnie ważny w symulacjach tego rodzaju zagadnień jest wybór modelu zachowania się gruntu w warunkach małych odkształceń przed osiągnięciem zniszczenia. Opis aktualnej sztywności...
-
Informational entropy in simulation of one-dimensional random fields
PublicationEntropia ciągłego rozkładu prawdopodobieństwa jest zdefiniowana jako funkcja liczby węzłów skalarnego pola losowego. W przykładzie numerycznym przedstawiono propagacje entropii w zagadnieniu reakcji sprężystego wspornika przy losowym obciążeniu.
-
Selected Methods For Increases Reliability The Of Electronic Systems Security
Publication -
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Methodological issues of security vulnerability analysis and risk assessment
PublicationArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Uncertainty assessment in the safety and security oriented risk analyses
PublicationW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Safety and security governance problems of critical systems and infrastructures
PublicationW artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublicationIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublicationThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Determining and verifying the safety integrity level with security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Anti-theft lab security system based on RFID
PublicationThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Application of BAN Network to Increase Security in Transport Systems
PublicationIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublicationW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Challenges in security and safety management of critical systems and infrastructures
PublicationReferat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...
-
Mechanism of hydroxyl radicals formation on the reduced rutile
Publication -
Formation of carboxymethyl cellulose–casein complexes by electrosynthesis
Publication -
Resonance Raman Study on Carbon Nanotubes Formation
Publication -
Dew Formation and Chemistry Near a Motorway in Poland
PublicationIn this study, the influence of traffic intensity on dewformation efficiency and chemistry is presented. The measurementswere conducted near the A4 motorway in SW Poland in almost flatland relief with intense agricultural activity. The dew/hoarfrost wascollected by means of insulated plain passive radiative condensersat three sites: AN and AS located in the close vicinity of themotorway (30 m) on the opposite sides of the road,...
-
Biofilm formation and its regulation in Staphylococcus aureus
PublicationInfections caused by the major human and animal pathogen, Staphylococcus aureus are becoming an important problem due to its emerging resistance mechanisms and variety of virulence factors. Biofilm formation is considered to be one of the most important factor attributed to high pathogenicity of S. aureus. Described in the literature methods used in identification of biofilm forming abilities of bacteria consist of phenotypic and...
-
Urban dew formation efficiency and chemistry in Poland
PublicationThe measurements of dew formation efficiency and chemistry were performed in Poland in September 2009, as a part of a longer, two-year sampling campaign. Pairs of sites, representing centers of major Polish cities and rural conditions in three different regions, were compared. With the aim to get more detailed landuse-oriented characteristics of dew, two additional sites were set close to Wroclaw. Collection of dew at each site...
-
Enthalpies of formation of rare earth niobates, RE3NbO7
PublicationHigh-temperature oxide melt solution calorimetry was used to investigate energetics of a series of rare earth niobates RE3NbO7. All of investigated compounds were found to be stable in enthalpy in respect to their oxides. The enthalpy of formation from oxides becomes more exothermic as the size of the RE cation increases, a trend seen previously in other RE compounds including pyrochlores, perovskites, and phosphates. For smaller...
-
Easy formation of acyl-Meldrum's acid anhydride
PublicationAcyl Meldrum's acid are usually a good source of ketenes upon definite thermal composition. However we treated acyl-Meldrum's acid with the Lewis acid and we observed formation of 5[[(2,2-dimethyl-4,6-dioxo-1,3-dioxan 5 ylidene)(acyl/arylamino)mathoxy](acyl/arylamino)methylene]-2,2dimethyl-1,3-dioxane-4,6 dione which means acyl-Meldrum's acid anhydride. The chemical properities of acyl-Meldrum's acid anhydride were explored.
-
Formation of bubbles from a single nucleation site.
PublicationPrzedstawiono wyniki systematycznych badań eksperymentalnych wrzenia wody destylowanej i metanolu z pojedynczego, sztucznego centrum nukleacji. Jako centra nukleacji służyły otwory wywiercone na czołowej powierzchni miedzianego pręta. Średnice otworów wynosiły: 0.25 mm, 0.60 mm oraz 1.0 mm. Do pomiaru częstotliwości odrywania się pęcherzyków zastosowano układ laser diodowy-fotodioda. Sygnał z fotodiody był rejestrowany za...
-
Fractal analysis and modelling of gas bubble formation.
PublicationPrzedstawiono wyniki badań eksperymentalnych generowania pęcherzyków powietrznych z dysz o różnej średnicy, umieszczonych pod powierzchnią wody. Sygnał rejestrowany przez układ laser-fotodioda poddano analizie fraktalnej.
-
Formation of wood surface roughness in burnishing process
PublicationW publikacji przedstawiono i omówiono rozwój bezwiórowych metod obróbki wykańczającej drewna przez nagniatanie. Przedstawiono wpływ nagniatania na chropowatość powierzchni drewna. Badania przeprowadzono na próbkach toczonych i nagniatanych. Wyniki odniesiono do głównych parametrów nagniatania jak: siła nagniatania oraz promień zaokrąglenia elementu nagniatającego.
-
Analysis of the Multiple Attribute Decision Making Problem with Incomplete Information about Preferences among the Criteria
Publication -
Investigating relationship between particulate matter air concentrations and suicides using geographic information system
Publication -
The Effects of the Anthropological Race, Gender and Location of Verbal-Pictorial Stimuli on the Usability of Visual Information Conveyance
Publication -
The data exchange between smart glasses and healthcare information systems using the HL7 FHIR standard
PublicationIn this study we evaluated system architecture for the use of smart glasses as a viewer of information, as a source of medical data (vital sign measurements: temperature, pulse rate, and respiration rate), and as a filter of healthcare information. All activities were based on patient/device identification procedures using graphical markers or features based on visual appearance. The architecture and particular use cases were implemented...
-
BUILDING INFORMATION MODELING - ANALIZA ZAKRESU I STANU IMPLEMENTACJI W POLSKIEJ BRANŻY BUDOWLANEJ
PublicationProblematyka BIM (Building Information Modeling) jest obecnie tematem wielu publikacji naukowych, ale także przedmiotem działań podejmowanych przez uczestników szeroko pojętego procesu budowlanego. Liczne zalety i szanse płynące ze stosowania technologii BIM w kolejnych etapach cyklu życia obiektu budowlanego, należy rozpatrywać z punktu widzenia inwestora/zamawiającego, architekta, projektanta konstrukcji i instalacji, dewelopera,...
-
Implementation of spatial information for monitoring and analysis of the area around the port using laser scanning techniques
PublicationNowadays, maritime infrastructure is heavily exploited, which requires monitoring. The article presents the implementation of spatial information which are point clouds for monitoring and analysis of the area around the port (buildings and wharves). For this study, point clouds coming from terrestrial (TLS) and airborne laser scanning (ALS), each of them having different accuracy, were used. An important part of the analysis was...
-
Geographic Information System for Flood Hazard Analysis and Early Warning Using Numerical Weather Predictions
PublicationFloods are a phenomenon which causes significant losses of lives as well as property damage, which in turn severely impact the local economy. The nature of a flooding has been well researched, and several methods of flood hazard simulation have been established over the last decades. The current legislation in the European Union requires the Member States to create, maintain and update flood risk and hazard maps, as well as identify...
-
House dust as a source of analytical information on concentration of polybrominated diphenyl ethers (PBDEs) - first approach
PublicationPolybrominated diphenyl ethers (PBDEs), which are best recognized as flame retardants, were in 2001, by virtue of Stockholm Convention, listed in a group of Persistent Organic Compounds (POPs). Increasing concentration levels of PBDEs, reported in human tissues (e.g., blood, serum, breast milk, etc.) haverecently caught worldwide concern due to their potential tendency to disrupt thyroid hormones, neurobehavioral deficits and endocrine...