Filters
total: 876
filtered: 780
-
Catalog
Chosen catalog filters
Search results for: JAMMING ATTACKS
-
Impact of active intra-complex rest intervals on post-back squat versus hip thrust jumping potentiation
Publication -
Microbiological, Antioxidant, Nutritional Properties, and Health Safety of Juice from Organic and Conventional Vitis vinifera L. Farming
Publication -
The mini ELITPC: Reconstruction and identification of charged particles tracks during beam tests at IFIN-HH
Publication -
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
PublicationPresentation Attack Detection (PAD) is crucial in biometric finger vein recognition. The susceptibility of these systems to forged finger vein images is a significant challenge. Existing approaches to mitigate presentation attacks have computational complexity limitations and limited data availability. This study proposed a novel method for identifying presentation attacks in finger vein biometric systems. We have used optimal...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Mechanisms positioned in a neighbourhood of their singular positions - velocity amplification in the electromagnetic damping. Part 1 - Background of the mechanical structure modeling
PublicationW pracy przedstawiono metodę modelowania dynamiki drgającego hybrydowego układu mechanicznego złożonego z odkształcalnego podukładu ciągłego oraz z połączonego z nim mechanizmu. U układzie pojawiają się drgania części odkształcalnej. By je wytłumić, ich energia zamieniana jest w energię elektryczną (za pomocą prądnicy prądu stałego) i rozpraszana na oporności obecnej w układzie elektrycznym. Aby przyśpieszyć tłumienie, wprowadzony...
-
Effects of Flywheel vs. Free-Weight Squats and Split Squats on Jumping Performance and Change of Direction Speed in Soccer Players
Publication -
Assessing Food Insecurity and Its Drivers among Smallholder Farming Households in Rural Oyo State, Nigeria: The HFIAS Approach
Publication -
WHY SHOULD WE ADOPT NON-USED ATTICS OF MONUMENTAL SACRAL CATHOLIC CHURCHES FOR SECULAR PURPOSES?
PublicationA motive for adapting the desecrated churches to new purposes is a broadly discussed matter, progressively better investigated and defined. Is it advisable to introduce a new, permanent function, complementary to the sacred one in the historical ecclesial buildings? This paper presents the results of the research on benefits of adapting the non-utilized attics of monumental churches still performing their sacred function, located...
-
Performance evaluation of GPS anti-spoofing system based on antenna array processing
PublicationThis article concerns the problem of detection and mitigation of spoofing attacks in Global Navigation Satellite Systems. First, background information about spoofing and its possible countermeasures is provided. Next, concept of a novel GPS anti-spoofing system based on antenna array processing is presented and implementation of prototype of this system is described. The third section outlines the performance evaluation of proposed...
-
Early farming settlement of the marginal zone of loess uplands and its palaeoenvironmental context – a case study of the Iłża Piedmont (S Poland)
Publication -
Evaluation of the Influence of Farming Practices and Land Use on Groundwater Resources in a Coastal Multi-Aquifer System in Puck Region (Northern Poland)
PublicationThis study focuses on the modeling of groundwater flow and nitrate transport in a multi-aquifer hydrosystem in northern Poland, adjacent to Puck Bay (Baltic sea). The main goal was to investigate how changes in land use and farming practices may affect groundwater recharge and submarine groundwater discharge (SGD) to the sea and the associated N-NO3 fluxes. An integrated modelling approach has been developed, which couples the...
-
The Weather as an Indicator for Decision-Making Support Systems Regarding the Control of Cutworms in Beets and Cereal Leaf Beetles in Cereals and Their Adoption in Farming Practice
Publication -
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublicationStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Frequency of use, moral incongruence, and religiosity and their relationships with self-perceived addiction to pornography, internet use, social networking and online gaming
PublicationBackground and Aims Moral incongruence involves disapproval of a behaviour in which people engage despite their moral beliefs. Although considerable research has been conducted on how moral incongruence relates to pornography use, potential roles for moral incongruence in other putative behavioural addictions have not been investigated. The aim of this study was to investigate the role of moral incongruence in self‐perceived...
-
A dynamic vehicle-bridge model based on the modal identification results of an existing EN57 train and bridge spans with non-ballasted tracks
PublicationThis paper addresses the methodology of the bridge-vehicle dynamic model definition based on the free response measurements of an existing train and existing bridge spans. In the case of the railway vehicle, the methodology uses the impulse excitations of a single car by means of the wedge method. In the case of the bridge spans, free responses are collected after the passages of trains. The global modal parameters (frequencies...
-
School psychologist’s interventions to promote successful school re-entry of chronically ill children aiming at altering peers’ attitudes towards them
PublicationThe aim of this article is to outline school psychologist’s interventions, which might be useful while supporting a chronically, somatically ill child in their re-entry to school, aiming at broadening their peers’ knowledge about the chronic disease and positively changing their attitudes towards the ill child. In the first part, the importance of peer relationships in childhood and adolescence, the relation of their quality...
-
Laxer Clinical Criteria for Gaming Disorder May Hinder Future Efforts to Devise an Efficient Diagnostic Approach: A Tree-Based Model Study
PublicationInternet Gaming Disorder (IGD) has been recognized in May 2013 and can be evaluated using the criteria developed by American Psychiatric Association (APA). The present study investigated the role each IGD criteria plays in diagnosing disordered gaming. A total of 3,377 participants (mean age 20 years, SD = 4.3 years) participated in the study. The data collected was scrutinized to detect patterns...
-
Device for spoofing in global positioning system
PublicationThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Radial distribution of dose within heavy charged particle tracks – Models and experimental verification using LiF:Mg,Cu,P TL detectors
Publication -
Relationship among the Change of Direction Ability, Sprinting, Jumping Performance, Aerobic Power and Anaerobic Speed Reserve: A Cross-Sectional Study in Elite 3x3 Basketball Players
Publication -
Modal Adjustment of Rayleigh Based Structural Damping and Coordinate-Partitioning Algorithm Dedicated to Frictionless Contact Constraints between Multibody System and Structure Modelled with Finite Elements
PublicationThe paper presents a dedicated numerical algorithm. The algorithm is advantageous during investigations of the dynamics of a hybrid multibody / finite-elements system. We focus our attention on interactions resulting from mechanical contact. Pointwise contact connects a vertex of the multibody structure and a surface of the elastic reference body. Instead of a positive value of the relative penetration factor, constraint equations...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublicationW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublicationThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Towards a modification of a regulatory framework aiming at bunker oil spill prevention from ships - A design aspect of bunker tanks vents location guided by CFD simulations
PublicationAlthough accidental bunker oil spills at seaway are relatively rare events, they can be pose real threat to the natural marine environment. One of the reasons for the bunker spill to occur is a design failure; one of the ways it can demonstrate is an improper location or height of vent heads, leading to a bunker oil discharge during heavy rolling, due to sloshing phenomenon. Design of a ship and her systems is guided by various...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublicationNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Ochrona odbiorników GNSS przed zakłóceniami celowymi
PublicationArtykuł dotyczy zastosowania algorytmów przestrzennego cyfrowego przetwarzania sygnałów dla potrzeb selektywnej eliminacji sygnałów zakłócających pracę odbiorników nawigacji satelitarnej GNSS. Omówiono podatność tych odbiorników na ataki elektroniczne typu zagłuszanie oraz spoofing. Polegają one na celowej emisji sygnałów niepożądanych w paśmie pracy systemu. Następnie przedstawiono koncepcję przeciwdziałania tego rodzaju zakłóceniom...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublicationW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublicationRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
System wykrywania i przeciwdziałania spoofingowi GPS
PublicationSpoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublicationThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublicationA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Effectiveness of Polymer Damper in Damage Reduction of Temporary Steel Grandstand
PublicationA large number of accidents involving damage of temporary grandstands during different types of events were observed in the past. The aim of the paper is to analyse numerically the effectiveness of a polymer damper in damage reduction of a temporary steel scaffolding grandstand exposed to dynamic load due to jumping. The element has been installed as a diagonal one at the back part of the structure. The method has been compared...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publicationarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Bioterrorism — characteristics and possibilities of prevention
PublicationIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Dynamic tests of composite footbridge segment – experimental and numerical studies
PublicationExperimental dynamic tests and numerical simulations of a 3 meters long segment of a footbridge made of polymer composites are presented in the paper. The span-length is reduced, however dimensions of cross-section are the same as the target footbridge. The segment structure is made of sandwich panels, which consist of fibre reinforced polymer (GFRP) laminates (skins) and a PET foam (core). The first part of the paper contains...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublicationThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Mathematical Modeling of Ice Dynamics as a Decision Support Tool in River Engineering
PublicationThe prediction of winter flooding is a complicated task since it is affected by many meteorological and hydraulic factors. Typically, information on river ice conditions is based on historical observations, which are usually incomplete. Recently, data have been supplemented by information extracted from satellite images. All the above mentioned factors provide a good background of the characteristics of ice processes, but are not...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...