Search results for: threats
-
WP1: Intelligent monitoring and automatic detection of threats -introduction to the WP1
Publication -
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Teaching Architecture – contemporary challenges and threats in the complexity of built environment
PublicationThe complexity of the modern built environment is a problem n ot only of architectural and urban issues. This issue extends to many othe r disciplines as well as covering a wide range of social engagements. The idea of writing this pa per is generally initiated by the debate which took place in Gdańs k on 22.01.2016, and was prepar ed in order to meet representatives of the four circles of interest...
-
Ad hoc routing protocols - security objectives, threats and solution
PublicationZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Investigation of noise threats and their impact on hearing in selected schools - a pilot study.
PublicationNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publication -
Transport of dangerous goods by rail, and threats to the subsoil of the railway surface in the event of a disaster
PublicationIn Poland, in 2020, the mass of dangerous goods (loads) transported by rail was 26 151.06 thousand tone. This translated into the performance of 8 899 691.89 thousand tone - km of transport performance. In 2020, these figures accounted for 11.72% of the weight of goods transported by rail. The situation is similar in other countries around the world. With such a large volume of transport of dangerous...
-
Monitoring of Selected CBRN Threats in the Air in Industrial Areas with the Use of Unmanned Aerial Vehicles
Publication -
Vaccination Against Measles, Mumps, and Rubella in the Light of Current Epidemic Threats: Unjustified Postponement
Publication -
Innovative consciousness and threats estimation connected with implementation of innovations to SMEs cooperating with shipbuilding industry
PublicationPodejmowanie działań innowacyjnych przez małe i średnie przedsiębiorstwa nie jest szeroko rozpowszechnione. Wynika to, między innymi, ze specyfiki tego sektora. MSP często dysponują ograniczonymi środkami finansowymi i nisko wykwalifikowanymi pracownikami, co stanowi w wielu przypadkach barierę we wprowadzaniu innowacji. Nie mniej istotne są inne podmioty działające w otoczeniu MSP włączające się w realizacje procesu innowacyjnego....
-
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublicationIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...
-
THE IMPLICATIONS OF ECONOMIC DEVELOPMENT, CLIMATE CHANGE AND EUROPEAN WATER POLICY ON SURFACE WATER QUALITY THREATS
Publication -
Zagrożenia środowiska podczas eksploatacji gazociągów podmorskich = Environmental threats during oparation of subsea gas pipelines
PublicationPrzedstawiono wybrane zagadnienia eksploatacji gazociągów podmorskich, w tym zagrożenia dla rekreacyjnego i gospodarczego korzystania z morza. Uszkodzenie gazociągu podmorskiego jest zazwyczaj spowodowane korozją, działaniami morskimi lub zagrożeniami naturalnymi. W określonych warunkach mogą wytrącić się kryształy hydratów węglowodorów gazowych, co może prowadzić do zablokowania linii przesyłowej
-
Occurrence of Trichocolea tomentella (Ehrh.) Dumort. (Marchantiophyta, Trichocoleaceae) in the Polish Carpathians: distribution, habitat preferences, current threats, and recommendations
Publication -
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublicationA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
GeoSPAR Project. Validation and selection methods of geoinformation analysis using GIS for ranking and forecasting of terrorist threats and criminal events
PublicationThe paper presents the description of work activities which have already been done within the first two stages – WorkPackage 1 and WorkPackage 2 - of the GeoSPAR Project. In such a context the general conceptual design of the GIS system and associate web service was presented and analysed. In addition, the operational and technical requirements for the GeoSPAR system have been specified and discussed; with special emphasis on system...
-
Civilization Threats and Sustainable Development
e-Learning Courses -
Civilization Threats and Sustainable Development -2022/23
e-Learning Courses