Filters
total: 3166
filtered: 2214
-
Catalog
- Publications 2214 available results
- Journals 157 available results
- Conferences 90 available results
- Publishing Houses 5 available results
- People 95 available results
- Projects 24 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 310 available results
- Events 19 available results
- Open Research Data 250 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: IOT SECURITY
-
DETERMINANTS OF THE PROVISION OF MARITIME TRAVEL IN THE CONTEXT OF A SENSE OF SECURITY OF GENERATION Y REPRESENTATIVES
Publication -
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublicationPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublicationThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
THE SITUATION OF WOMEN IN THE POLISH LABOUR MARKET IN THE LIGHT OF CHANGES IN THE PENSION SECURITY SYSTEM
PublicationThe aim of the study is to examine the opinion of a group of women on their economic activity and decisions related to retirement. The first part of the article reviews previous research related to the economic activity of older people with a special focus on women. In the empirical part of the article, women’s opinions on issues related to retirement were analyzed. The research was carried out in 2016 on a sample of 45 women,...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublicationIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19
PublicationAbstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...
-
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
PublicationRecent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublicationThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublicationMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
Software-Defined NB-IoT Uplink Framework - The Design, Implementation and Use Cases
PublicationIn the radiocommunication area, we may observe a rapid growth of new technology, such as 5G. Moreover, all the newly introduced radio interfaces, e.g., narrowband Internet of Things (NB-IoT), are strongly dependent on the software. Hence, the radiocommunication software development and optimization, as well as the 3GPP technical specification, should be introduced at the academic level of education. In this paper, a software-defined...
-
Low-Profile ESPAR Antenna for RSS-Based DoA Estimation in IoT Applications
PublicationIn this paper, we have introduced a low-profile electronically steerable parasitic array radiator (ESPAR) antenna that can successfully be used to estimate the direction-of-arrival (DoA) of incoming signals in wireless sensor network (WSN) applications, in which the height of the complete antenna has to be low. The proposed antenna is over three times lower than high-profile ESPAR antenna designs currently available in the literature...
-
Investigation of Performance and Configuration of a Selected IoT System—Middleware Deployment Benchmarking and Recommendations
PublicationNowadays Internet of Things is gaining more and more focus all over the world. As a concept it gives many opportunities for applications for society and it is expected that the number of software services deployed in this area will still grow fast. Especially important in this context are properties connected with deployment such as portability, scalability and balance between software requirements and hardware capabilities. In...
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublicationAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublicationW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publication -
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publication -
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublicationCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublicationMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
N-doped graphene quantum dot-decorated MOF-derived yolk-shell ZnO/NiO hybrids to boost lithium and sodium ion battery performance
PublicationSurface engineering at the nanoscale to obtain robust interface between metal oxides and quantum dots is essential for improving the performance and stability of battery materials. Herein, we designed and prepared novel N-doped graphene quantum dot-modified ZnO/NiO anode materials with a well-defined yolk-shell structure for lithium and sodium-ion batteries. NG QDs were assembled on the ZnO/NiO microspheres using three different...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
EVALUATION OF THE USE OF M2M-TYPE NB-IoT AND LTE TECHNOLOGIES FOR MARITIME COMMUNICATION SYSTEMS
PublicationThe development of IoT (the Internet of Things) wireless transmission opens a new era in communication systems. In the next years, the development and implementation of IoT systems will be very dynamic. It can be seen that the solutions of LTE – NB-IoT (Long Term Evolution – Narrowband IoT) transmission devices are implemented in a wide range of terrestrial solutions, e.g. smart grids. This paper aims to analyse the possibility...
-
Compact 4 × 4 butler matrix with non‐standard phase differences for IoT applications
PublicationButler matrices represent a popular class of feeding networks for antenna arrays. Large dimensions and the lack of flexibility in terms of achievable output phase difference make conventional Butler structures of limited use for modern communication devices. In this work, a compact planar 4 × 4 matrix with non-standard relative phase shifts of –30º, 150º, –120º, and 60º has been proposed. The structure is designed to operate at...
-
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublicationW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublicationThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublicationExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publication -
Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic
Publication -
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublicationW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublicationIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
Open extensive IoT research and measurement infrastructure for remote collection and automatic analysis of environmental data.
PublicationInternet of Things devices that send small amounts of data do not need high bit rates as it is the range that is more crucial for them. The use of popular, unlicensed 2.4 GHz and 5 GHz bands is fairly legally enforced (transmission power above power limits cannot be increased). In addition, waves of this length are very diffiult to propagate under field conditions (e.g. in urban areas). The market response to these needs are the...
-
Adaptive Positioning Systems Based on Multiple Wireless Interfaces for Industrial IoT in Harsh Manufacturing Environments
PublicationAs the industrial sector is becoming ever more flexible in order to improve productivity, legacy interfaces for industrial applications must evolve to enhance efficiency and must adapt to achieve higher elasticity and reliability in harsh manufacturing environments. The localization of machines, sensors and workers inside the industrial premises is one of such interfaces used by many applications. Current localization-based systems...
-
The Effects of Roadside Hazards on Road Accident Severity
PublicationThe risk of becoming involved in an accident emerges when elements of the transport system do not operate properly (man – vehicle – road – roadside). The road, its traffic layout andsafety equipment have a critical impact on road user safety. This gives infrastructural work a priority in road safety strategies and programmes. Run-off-road accidents continue to be one of the biggest problems of road safety with consequences including...
-
Indicator Analysis of Security Risk for Electronic Systems Used to Protect Field Command Posts of Army Groupings
Publication -
Issues Related to Power Supply Reliability in Integrated Electronic Security Systems Operated in Buildings and Vast Areas
Publication -
Shock a disposable time in electronic security systems / Porażenie a czas dyspozycyjny w elektronicznych systemach bezpieczeństwa
Publication -
Determination of cyanide ion in urine samples using ion chromatography with pulsed amperometric detection.
PublicationCyanides are widely applied in industrial activity, including gold and silver mining and the production of organic chemicals. HCN is also formed directly from fossil fuel combustion sources from gasoline and diesel vehicles. In natural environment, in plants seeds for example an apple seed, it exists as a cyanogenic glycosides. The amount of cyanide ions originating from food products is however rather small. Larger concentrations...
-
Studies on 16-membered azothia-and azoxythiacrown ethers as ion carriers in ion selective membranes.
Publication16-członowe azo iazoksy korony zawierające w makropierścieniu atomy siarki były badane jako nośniki jonów w jonoselektywnych elektrodach membranowych. Związki te badane były pod kątem kompleksowania metali I i II grupy układu okresowego oraz metali ciężkich i przejściowych. Wyznaczone zostały stałe trwałości kompleksów azokoron z wybranymi kationami za pomocą metody sandwiczowej. W wyniku badań potwierdzono tworzenie się silnych...
-
Optimization of the Hardware Layer for IoT Systems using a Trust Region Method with Adaptive Forward Finite Differences
PublicationTrust-region (TR) algorithms represent a popular class of local optimization methods. Owing to straightforward setup and low computational cost, TR routines based on linear models determined using forward finite differences (FD) are often utilized for performance tuning of microwave and antenna components incorporated within the Internet of Things systems. Despite usefulness for design of complex structures, performance of TR methods...
-
The Influence of the Radio Channel on Precision of Position Estimation of the User Terminal Using the NB-IoT Radio Interface
PublicationIn the article the method of user terminal position estimation using the broadcast signals transmitted in the downlink of the NB-IoT interface was presented, including the analysis of the radio channel influence on precision of position estimation as well as the eNodeB (Evolved Node B) synchronization. The practical ability to estimate the position in the test area has been verified in the laboratory conditions, using the reference...
-
A Novel IoT-Perceptive Human Activity Recognition (HAR) Approach Using Multi-Head Convolutional Attention
PublicationTogether with fast advancement of the Internet of Things (IoT), smart healthcare applications and systems are equipped with increasingly more wearable sensors and mobile devices. These sensors are used not only to collect data, but also, and more importantly, to assist in daily activity tracking and analyzing of their users. Various human activity recognition (HAR) approaches are used to enhance such tracking. Most of the existing...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Zagrożenia starych budynków w sąsiedztwie nowej zabudowy = The threat of old buildings security in neighbourhood of new buildings
PublicationNa przykładzie jednego z budynków mieszkalnych, przedstawiono zagrożenia na jakie są narażone stare obiekty w zwartej zabudowie śródmiejskiej, podczas prowadzenia w ich sąsiedztwie prac budowlanych, którym często towarzyszą głębokie wykopy. Powoduje to powstawanie licznych uszkodzeń, uniemozliwiających ich prawidłową eksploatację lub stanowiących nawet zagrożenie bezpieczeństwa.
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...