Search results for: ATTACK SCENARIO - Bridge of Knowledge

Search

Search results for: ATTACK SCENARIO

Filters

total: 1144
filtered: 1073

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: ATTACK SCENARIO

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publication

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Full text available to download

  • Advanced oxidation processes for the removal of mono and polycyclic aromatic hydrocarbons – A review

    Publication

    Aromatic hydrocarbons (AHs) are toxic environmental contaminants presented in most of the environmental matrices. Advanced oxidation processes (AOPs) for the removal of AHs in the account of complete mineralization from various environmental matrices have been reviewed in this paper. An in-depth discussion on various AOPs for mono (BTEX) and polyaromatic hydrocarbons (PAHs) and their derivatives is presented. Most of the AOPs were...

    Full text available to download

  • Device-independent quantum key distribution based on measurement inputs

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Full text available to download

  • System Loss in UWB Off-Body Communications in a Ferry Environment

    Publication

    In this paper, the system loss in UWB off-body communications in a ferry environment based on measurements is presented. A mobile measurement set-up, consisting of WBAN nodes with UWB DWM1000 modules, was used. System loss was split into LOS and NLOS conditions. For the former, the smallest mean value, 24.4 dB, was obtained for the user approaching the fixed terminal, with the antenna on his chest, and the largest, 28.1 dB, for...

  • Combined extraction and microextraction techniques: Recent trends and future perspectives

    Publication

    The latest advancements in the analytical sample preparation indicate a trend of combining different extraction techniques with targeting an improvement in separation, cleanup, detection limits, enrichment factors, and dealing with complex matrices. This manuscript identifies mainly two groups of combined sample preparation techniques. The first group integrates conventional or enhanced extraction techniques with microextraction....

    Full text available to download

  • 4D Reconstruction and Visualisation of Krakow Fortress

    Publication
    • E. G. Głowienka
    • K. Michałowska
    • P. Opaliński
    • B. Hejmanowska
    • S. Mikrut
    • P. Kramarczyk
    • A. Struś

    - Year 2017

    The specific aim of the European project named "Cultural Heritage Through Time" (CHT2) and reported in this paper is to fully integrate the fourth dimension (4D) into Cultural Heritage studies for analysing structures and landscapes over time. Krakow-the Fortress City (Poland) is the one of four case studies of the CHT2, which are used for the time varying reconstruction, analysis, visualization, and preservation. The goal of...

  • How to choose drive’s rated power in electrified urban transport?

    Publication

    - Year 2017

    Selection of drive's rated power influences not only vehicle's dynamics, but also its energy efficiency. Mentioned above approach requires a multiphysical model, which covers both mechanical and electrical phenomena. This paper discusses how selection of traction drive's rated power influences vehicle energy consumption on example of a trolleybus. A complex mathematical model was developed in Matlab/Simulink to describe the multiphisical...

    Full text available to download

  • Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions

    Publication
    • J. Rak
    • D. Hutchison
    • J. Tapolcai
    • R. Bruzgiene
    • M. Tornatore
    • C. Mas-Machuca
    • M. Furdek
    • P. Smith

    - Year 2020

    Communication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...

    Full text to download in external service

  • Novel Low-Loss Substrates for 5G Applications

    Publication

    - Year 2022

    This paper presents a feasibility study of a new type of microwave low-loss dielectric substrates for 5G network applications. The new substrate materials are composites of polypropylene and high-dielectric-constant micro-ceramics. This combination is expected to form a very low-loss dielectric material at low fabrication cost. Two substrate samples with different dielectric properties are fabricated and their characteristics at...

    Full text to download in external service

  • On Improved-Reliability Design Optimization of High-Frequency Structures Using Local Search Algorithms

    The role of numerical optimization has been continuously growing in the design of high-frequency structures, including microwave and antenna components. At the same time, accurate evaluation of electrical characteristics necessitates full-wave electromagnetic (EM) analysis, which is CPU intensive, especially for complex systems. As rigorous optimization routines involve repetitive EM simulations, the associated cost may be significant....

    Full text available to download

  • Multicriteria decision analysis in ranking of analytical procedures for aldrin determination in water

    The study presents the possibility of multi-criteria decision analysis (MCDA) application when choosing analytical procedures with low environmental impact. A type of MCDA, Preference Ranking Organization Method for Enrichment Evaluations (PROMETHEE), was chosen as versatile tool that meets all the analytical chemists – decision makers requirements. Twenty five analytical procedures for aldrin determination in water samples (as...

    Full text to download in external service

  • Analysis of the Ways to Identify Rail Running Surface Defects by Means of Vibration Signals

    Publication

    - Problemy Kolejnictwa - Year 2020

    Th e article discusses a preliminary concept of a method enabling the identifi cation of chosen rail running surface defects, such as squats, spalling, and running surface defects, by analysing the parameters of vibration signals. It features a description of the methodology of the conducted tests, the scope thereof, and the selection of the measurement points with specifi c defect types. Th e article covers selected results of...

    Full text available to download

  • Dynamical description of quantum computing: generic nonlocality of quantumnoise

    Publication

    We develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...

    Full text available to download

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publication

    - Year 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Full text to download in external service

  • Security Information Sharing for the Polish Power System

    Publication

    - Year 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publication
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Year 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Full text to download in external service

  • Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...

    Full text to download in external service

  • Service-based Resilience for Embedded IoT Networks

    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publication
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Year 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Full text to download in external service

  • Several notes on technical modernization of a historical building

    Publication

    - Year 2013

    This paper describes methods and means used during the renovation process of several elements of a building – the assembly hall, inner courtyards and attics of the main building at Gdansk University of Technology, both in design and construction domains. A tissue of a historic building required special approach to these tasks, with special emphasis on good recognition of problems, careful planning and consistent implementing of...

    Full text to download in external service

  • Sudden death of effective entanglement

    Publication

    - PHYSICAL REVIEW A - Year 2010

    Sudden death of entanglement is a well-known effect resulting from the finite volume of separable states. We study the case when the observer has a limited measurement capability and analyze the effective entanglement (i.e., entanglement minimized over the output data). We show that in the well-defined system of two quantum dots monitored by single-electron transistors, one may observe a sudden death of effective entanglement when...

    Full text available to download

  • FDTD-Compatible Green's function based on scalar discrete Green's function and multidimensional Z-transform

    Publication

    - Year 2015

    In this contribution, a new formulation of the discrete Green's function (DGF) is presented for the finitedifference time-domain (FDTD) grid. Recently, dyadic DGF has been derived from the impulse response of the discretized scalar wave equation (i.e., scalar DGF) with the use of the multidimensional Z-transform. Its software implementation is straightforward because only elementary functions are involved and a single function...

    Full text to download in external service

  • Video Classification Technology in a Knowledge-Vision-Integration Platform for Personal Protective Equipment Detection: An Evaluation

    Publication

    - Year 2018

    This work is part of an effort for the development of a Knowledge-Vision Integration Platform for Hazard Control (KVIP-HC) in industrial workplaces, adaptable to a wide range of industrial environments. This paper focuses on hazards resulted from the non-use of personal protective equipment (PPE), and examines a few supervised learning techniques to compose the proposed system for the purpose of recognition of three protective...

    Full text to download in external service

  • Quantifying Contextuality

    Publication
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki
    • P. Joshi
    • W. Kłobus
    • A. Wójcik

    - PHYSICAL REVIEW LETTERS - Year 2014

    Contextuality is central to both the foundations of quantum theory and to the novel information processing tasks. Despite some recent proposals, it still faces a fundamental problem: how to quantify its presence? In this work, we provide a universal framework for quantifying contextuality. We conduct two complementary approaches: (i) the bottom-up approach, where we introduce a communication game, which grasps the phenomenon of...

    Full text to download in external service

  • New First - Path Detector for LTE Positioning Reference Signals

    Publication

    - Year 2014

    In today's world, where positioning applications reached a huge popularity and became virtually ubiquitous, there is a strong need for determining a device location as accurately as possible. A particularly important role in positioning play cellular networks, such as Long Term Evolution (LTE). In the LTE Observed Time Difference of Arrival (OTDOA) positioning method, precision of device location estimation depends on accuracy...

    Full text to download in external service

  • Numerical Simulations of Seepage in Dikes Using unsaturated and Two-Phase Flow Models

    Publication

    Modeling of water flow in variably saturated porous media, including flood dikes, is often based on the Richards equation, which neglects the flow of pore air, assuming that it remains at constant atmospheric pressure. However, there is also evidence that the air flow can be important, especially when the connectivity between the pore air and atmospheric air is lost. In such cases a full two-phase air-water flow model should be...

    Full text to download in external service

  • Playback detection using machine learning with spectrogram features approach

    Publication

    - Year 2017

    This paper presents 2D image processing approach to playback detection in automatic speaker verification (ASV) systems using spectrograms as speech signal representation. Three feature extraction and classification methods: histograms of oriented gradients (HOG) with support vector machines (SVM), HAAR wavelets with AdaBoost classifier and deep convolutional neural networks (CNN) were compared on different data partitions in respect...

    Full text available to download

  • Knowledge-Based Virtual Modeling and Simulation of Manufacturing Processes for Industry 4.0

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2020

    ABSTRACT Industry 4.0 aims at providing a digital representation of a production landscape, but the challenges in building, maintaining, optimizing, and evolving digital models in inter-organizational production chains have not been identified yet in a systematic manner. In this paper, various Industry 4.0 research and technical challenges are addressed, and their present scenario is discussed. Moreover, in this article, the novel...

    Full text available to download

  • Subjective Quality Evaluation of Speech Signals Transmitted via BPL-PLC Wired System

    Publication
    • P. Falkowski-Gilski
    • G. Debita
    • M. Habrych
    • B. Miedziński
    • P. Jedlikowski
    • B. Polnik
    • J. Wandzio
    • X. Wang

    - Year 2020

    The broadband over power line – power line communication (BPL-PLC) cable is resistant to electricity stoppage and partial damage of phase conductors. It maintains continuity of transmission in case of an emergency. These features make it an ideal solution for delivering data, e.g. in an underground mine environment, especially clear and easily understandable voice messages. This paper describes a subjective quality evaluation of...

    Full text to download in external service

  • Ancient settlements-atavistic solutions for present water supply and drainage problems engendered by urbanism

    Publication

    - ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY - Year 2021

    Water is the most valuable resource available on earth. Although it is present in abundance, its usable volume is very scarce. This is the reason behind the existence of both floods and droughts around the world. However, human settlements face water scarcity issues that are primarily engendered by improper town planning measures. To create a balance between the available fractions of water, it is therefore imperative to have proper...

    Full text to download in external service

  • Detection of Water on Road Surface with Acoustic Vector Sensor

    Publication

    - SENSORS - Year 2023

    This paper presents a new approach to detecting the presence of water on a road surface, employing an acoustic vector sensor. The proposed method is based on sound intensity analysis in the frequency domain. Acoustic events, representing road vehicles, are detected in the sound intensity signals. The direction of the incoming sound is calculated for the individual spectral components of the intensity signal, and the components...

    Full text available to download

  • Study on transmission quality in cellular 4G and 5G networks between 2019–2021: Impact of the COVID-19 pandemic on the level of provided services by operating base transceiver stations

    The COVID-19 pandemic has significantly limited user mobility, not least among students. Remote learning had a particular impact on resource allocation in relation to using terrestrial cellular networks, especially 4G systems in urban agglomerations. This paper presents the results of a quality evaluation of an outdoor environment, carried out between 2019 and 2021 on the campus of a technical university. Annual studies are conducted...

    Full text available to download

  • MEASUREMENT O F HEALTHCARE SYSTEM EFFICIENCY IN OECD COUNTRIES

    Increased spending on healthcare systems in many countries tends to attract attention to their efficiency. The aim of this paper is to evaluate the efficiency of healthcare systems in the OECD countries and indicate causes of inefficiency by applying Data Envelopment Analysis (DEA) and using additive and super-efficiency models. The homogeneity of the sample is assessed and outliers are excluded. A ranking is established on the...

    Full text available to download

  • Wybrane aspekty oceny satysfakcji i lojalności klientów i pracowników

    Celem artykułu jest przedstawienie propozycji oryginalnego modelu pozwalającego lepiej zrozumieć mechanizmy kształtowania się satysfakcji i lojalności klientów i pracowników oraz umożliwiającego porównywanie satysfakcji klientów różnych przedsiębiorstw w oderwaniu od ich specyfiki branżowej. Zaprezentowany model opiera się na mechanizmach przyczynowo-skutkowych i pozwala na stawianie kwantyfikowalnych celów, dając w rezultacie...

    Full text available to download

  • An optimised placement of the hard quality sensors for a robust monitoring of the chlorine concentration in drinking water distribution systems

    The problem of an optimised placement of the hard quality sensors in drinking water distribution systemsunder several water demand scenarios for a robust monitoring of the chlorine concentration is formulatedin this paper. The optimality is understood as achieving a desired trade off between the sensors and theirmaintenance costs and the accuracy of estimation of the chlorine concentration. The contribution of thiswork is a comprehensive...

    Full text available to download

  • Computer-Aided Automated Greenery Design—Towards a Green BIM

    Contemporary climate challenges are changing the architect’s awareness, which results in a broader spectrum of interest. The available software enables the design of vegetation, but it is often very limited and requires specialist knowledge. The available software allows the creation of individual solutions based on visual algorithms or writing scripts; however, they are still not common methods used in architecture and urban planning....

    Full text available to download

  • Rule-Based Model for Selecting Integration Technologies for Smart Cities Systems

    Publication

    The aim of this article is to present the stages of development for an information technology integration model for the design of systems for smart cities. The Introduction explains the need for integration technologies and presents a model for selecting integration technologies and the conditions for its use in designing smart cities systems. Then two verification stages of the presented model are discussed. In the first stage,...

    Full text available to download

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publication

    - Year 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...

  • Tools, Methods and Services Enhancing the Usage of the Kepler-based Scientific Workflow Framework

    Publication
    • M. Płóciennik
    • S. Winczewski
    • P. Ciecieląg
    • F. Imbeaux
    • B. Guillerminet
    • P. Huynh
    • M. Owsiak
    • P. Spyra
    • T. Aniel
    • B. Palak... and 3 others

    - Procedia Computer Science - Year 2014

    Scientific workflow systems are designed to compose and execute either a series of computational or data manipulation steps, or workflows in a scientific application. They are usually a part of a larger eScience environment. The usage of workflow systems, however very beneficial, is mostly not irrelevant for scientists. There are many requirements for additional functionalities around scientific workflows systems that need to be...

    Full text available to download

  • Analysis of data fusion algorithms for the vessel with the dynamic positioning system

    Publication

    The dynamic positioning (DP) system on the vessel is operated to control the position and heading of the vessel with the use of propellers and thrusters installed on the board. On DP vessels redundant measurement systems of position, heading and the magnitude and direction of environmental forces are required for safety at sea. In this case, a fusion of data is needed from individual measurement devices. The article proposes a...

    Full text available to download

  • Deep eutectic solvents vs ionic liquids: Similarities and differences

    Publication

    - MICROCHEMICAL JOURNAL - Year 2020

    Deep eutectic solvents (DES) were introduced as an alternative to ionic liquids (IL) to overcome the drawbacks of IL solvents. However, some authors consider them to be a subclass of ILs. In contrast, other authors emphasize that these are by their nature independent, different groups of substances. Thus, the question arises: Which solvent group should DESs belong to? Maybe a new class should be added to the existing ones. The...

    Full text available to download

  • CMGNet: Context-aware middle-layer guidance network for salient object detection

    Publication
    • K. Shaheed
    • I. Ullah
    • S. Hussain
    • W. Ali
    • S. Ali Khan
    • Y. Yin
    • Y. Ma

    - Year 2024

    Salient object detection (SOD) is a critical task in computer vision that involves accurately identifying and segmenting visually significant objects in an image. To address the challenges of gridding issues and feature...

  • An empirical study on the impact of AspectJ on software evolvability

    Publication

    Since its inception in 1996, aspect-oriented programming (AOP) has been believed to reduce the effort required to maintain software systems by replacing cross-cutting code with aspects. However, little convincing empirical evidence exists to support this claim, while several studies suggest that AOP brings new obstacles to maintainability. This paper discusses two experiments conducted to evaluate the impact of AspectJ (the most...

    Full text available to download

  • Seismic gap between buildings founded on different soil types experiencing pounding during earthquakes

    Publication

    Several formulas have been suggested in the literature to evaluate the minimum seismic gap that would prevent collisions between adjacent buildings during earthquakes, including those based on the absolute sum of the peak displacements (ABS), square root of the sum of the squares (SRSS), the double difference method (DDC), Australian code, and approach proposed by Naderpour et al. The aim of the present study is to evaluate the...

    Full text to download in external service

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download

  • On Symmetry of Uniform and Preferential Attachment Graphs

    Publication

    - ELECTRONIC JOURNAL OF COMBINATORICS - Year 2014

    Motivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...

    Full text available to download

  • Disaster-resilient communication networks: Principles and best practices

    Publication
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Year 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Full text to download in external service

  • Hydroperoxyl radical and formic acid formation from common DNA stabilizers upon low energy electron attachment

    Publication
    • A. Ribar
    • S. Huber
    • M. Śmiałek-Telega
    • K. Tanzer
    • M. Neustetter
    • R. Schürmann
    • I. Bald
    • S. Denifl

    - PHYSICAL CHEMISTRY CHEMICAL PHYSICS - Year 2018

    2-Amino-2-(hydroxymethyl)-1,3-propanediol (TRIS) and ethylenediaminetetraacetic acid (EDTA) are key components of biological buffers and are frequently used as DNA stabilizers in irradiation studies. Such surface or liquid phase studies are done with the aim to understand the fundamental mechanisms of DNA radiation damage and to improve cancer radiotherapy. When ionizing radiation is used, abundant secondary electrons are formed...

    Full text to download in external service

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • MnCo2O4 deposited by spray pyrolysis as a protective layer for stainless steel interconects

    Stainless steel interconnects working in Solid Oxide Fuel Cells stacks are exposed to high temperature resulting in their corrosion. Protective layers for the hydrogen and oxygen sides are necessary to protect the interconnect material, prolongate the stack lifetime and maintain the output power. In this paper MnCo2O4 protective layer for the oxygen side of the interconnect is deposited by spray pyrolysis and is examined.