Filters
total: 8
Search results for: THREAT INTELLIGENCE
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublicationA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
Automatic Watercraft Recognition and Identification on Water Areas Covered by Video Monitoring as Extension for Sea and River Traffic Supervision Systems
PublicationThe article presents the watercraft recognition and identification system as an extension for the presently used visual water area monitoring systems, such as VTS (Vessel Traffic Service) or RIS (River Information Service). The watercraft identification systems (AIS - Automatic Identification Systems) which are presently used in both sea and inland navigation require purchase and installation of relatively expensive transceivers...
-
How high-tech solutions support the fight against IUU and ghost fishing: a review of innovative approaches, methods, and trends
PublicationIllegal, Unreported, and Unregulated fishing is a major threat to human food supply and marine ecosystem health. Not only is it a cause of significant economic loss but also its effects have serious long-term environmental implications, such as overfishing and ocean pollution. The beginning of the fight against this problem dates since the early 2000s. From that time, a number of approaches and methods have been developed and reported....
-
BODYGUARD PROFESSION A GUIDE TO THE ART OF PERSONAL PROTECTION
PublicationThe book "Bodyguard Profession: A Guide to the Art of Personal Protection" is a comprehensive guide that introduces readers to the intricacies of professional personal protection. The author thoroughly discusses both the physical and psychological aspects of a bodyguard's work, covering elements such as stress management, self-defense techniques, and the use of modern technology in VIP protection. The guide presents...
-
Marek Czachor prof. dr hab.
People