Filters
total: 625
filtered: 569
Search results for: TERRORIST ATTACK
-
Energy Recovery Analysis in A-Type Pressure Regulation and Measurement Stations in Istanbul, Esenyurt
Publication -
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublicationThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Bioterrorism — characteristics and possibilities of prevention
PublicationIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublicationCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublicationCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublicationGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublicationIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
PublicationTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and forecasting its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. This article presents a new framework for the setting-out of a railway track axis. The process presented in the manuscript is based on the specific filtration and extraction...
-
Impedance monitoring of fuel cell stacks
PublicationThis paper presents an innovative, electrochemical impedance method for monitoring of electrochemical behaviour of a multi-cell, direct methanol fuel cell (DMFC) device. This method not only provides classical voltage changes at successive cells but also allows their detailed impedance behaviour to be presented. Impedance characteristics of individual cells within a fuel cell stack (depending on actual operating conditions) are...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublicationDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Adapting the pinch point analysis to improve the ORC design process
PublicationPinch point analysis can be adapted so as to assist in the early stages of designing the ORC systems. Typically used in determining the working parameters of heat exchangers, it can be employed to improve the heat fitting between the source of heat and the working fluids of the ORC system. To attain the parametric match, an algorithm was built enabling quick estimation of the possible heat reception by the specific working fluid....
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublicationFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublicationThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
Enzymatic activities behind degradation of glucosinolates
PublicationMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Design of compound curves adapted to the satellite measurements
PublicationThe paper deals with a novelty related to the design of a region for an alternative railway track direction adequate for mobile satellite measurements. The new approach may become particularly useful in the design of the existing track axis control when the determination of both the main track directions becomes impossible. The only solution in that case is to apply to the geometrical system two circular arcs of a different radius,...
-
The process of identification of the track's geometrical layout and the alignment project based on the of satellite measurements
PublicationIn the paper a methodology of restoring of railway track’s geometrical shape in a horizontal plane on the base of conducted mobile satellite surveying was presented. The authors proposed a calculating algorithm for designing the track sections placed in horizontal arcs. In the algorithm an analytical methodology with mathematical formulas is applied. The procedure has an universal character, i.e. provides the possibility of varying...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublicationThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublicationTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublicationThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Safety at railway level crossings and Vision Zero
PublicationIn this work, safety analysis at the railway level crossings is presented using advanced mathematical modelling. Resistivity of track subgrade panels is taken into account. The analysis does not refer to the assessment of the current regulations. Specific cases of generalized dynamic system are considered by introducing operations S=Δ, S=P defined in space C(N) of real sequences. In this model, generalized discrete exponential...
-
Interpolation methods in GPR tomographic imaging of linear and volume anomalies for cultural heritage diagnostics
PublicationThis paper presents results of a ground penetrating radar (GPR) survey conducted in St. Joseph’s Church in Gdańsk, Poland. The aim of the study was to produce tomographic imaging of a renovated floor as well as the objects buried under the floor to detect linear and volume inclusions. The assumed track spacing was meaningfully greater than the single signal spacing in each track, which induced the need for interpolation methods...
-
Assessment of Subsoil Subsidence Under the Railway Surface with the Use of Fuzzy Sets
PublicationThe cause of the subsidence of the railway track is the subsidence of the track bed itself and it is often related to the subsidence of the subsoil. Such settlement leads to: uneven longitudinal railways and track twist. These phenomena have a negative impact on the comfort and safety of driving, and in extreme cases lead to a train derailment. It has been shown that the magnitude of these settlements is determined by many parameters...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublicationStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Technical diagnostics and monitoring of traction current collectors
PublicationNew evaluation methods of the technical condition of rolling stock current collectors are proposed in this paper. The method of automatic measurement of the pantograph static force characteristic, realized when the vehicle runs through the test section of the track with especially prepared overhead line height distribution, has been practically implemented by the Polish Railways. The method of testing the slipper spring suspension...
-
Influence of permanent magnetic field on wear performance of dry sliding contacts
PublicationResults of experimental studies concerning the influence of permanent magnetic field on wear of dry sliding contact are presented.It was found that magnetic field of horizontal orientation is causing temporary reduction of material's hardness. It also facilitates and accelerates removal process of wear particles from the contact zone.Formation of bulges, consisting of accumulated and compacted anti-ferromagnetic material produced...
-
Teams tools. Leading high-performance teams with different types of intelligence
PublicationThe subject of this paper is the analysis of necessary tools for global teams, image of the team leader, styles of leadership in global teams. The analysis is based on selected examples from high-performance teams with visible results. The purpose of the work is to answer for the following questions: What are the characteristics of the leading global teams? Which style of leadership use the global teams? Is a female leader different...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublicationThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublicationA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints
PublicationThe paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Opinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi
PublicationOpinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi dla firmy TRACK TEC KOLTRAM
-
Tonality Estimation and Frequency Tracking of Modulated Tonal Components
PublicationA novel method for tonality estimation and frequency tracking of tonal components modulated in frequency and amplitude is presented. The algorithm detects the local maxima of magnitude spectra corresponding to three contiguous frames of a signal and matches them into the tonal track candidates. The magnitude-based and phase-based methods are used to estimate the frequency jumps between spectrum maxima belonging to the tonal track...
-
Research project BRIK: development of an innovative method for determining the precise trajectory of a railway vehicle
PublicationIn the paper the essential assumptions regarding a research project implemented by a consortium of Gdansk University of Technology and Gdynia Maritime University are presented. The project has been commissioned by National Center of Research and Development with cooperation with Polish Railways (PKP Polskie Linie Kolejowe S.A.). The project is focused in implementation of modern measurement techniques using Global Navigation Positioning...
-
Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT
PublicationW artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...
-
Implementation of DEIS for reliable fault monitoring and detection in PEMFC single cells and stacks
PublicationDynamic Electrochemical Impedance Spectroscopy (DEIS) was presented as novel method for diagnostic and monitoring of PEMFC stack and single cells operation. Impedance characteristics were obtained simultaneously with current - voltage characteristics for stack and each individual cell. Impedance measurements were performed in galvanodynamic mode. It allowed to compare performance of each cell and identification of faulty cell operation...
-
Correction of determined coordinates of railway tracks in mobile satellite measurements
PublicationThis article examines one of the basic issues related to the technique of mobile satellite measurements in railway tracks. This problem concerns the correction of the determined coordinates of the track centerline. The need to perform this operation results from the GNSS receivers positioning at a certain height above the level of the existing track axis, leading to longitudinal and lateral shifts of antennas. The key problem here...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Electron attachment to hexafluoropropylene oxide (HFPO)
PublicationWe probe the electron attachment in hexafluoropropylene oxide (HFPO), C3F6O, a gas widely used in plasma technologies. We determine the absolute electron attachment cross section using two completely different experimental approaches: (i) a crossed-beam experiment at single collision conditions (local pressures of 5 × 10−4 mbar) and (ii) a pulsed Townsend experiment at pressures of 20–100 mbar. In the latter method, the cross sections...
-
How to fund an additional secular function in the monumental church?
PublicationThe implementation of a new public function into the non-used church spaces like attics or cellars in context of revitalizing a lawfully protected historical city areas have diversified aspects. The article describes the financial aspect of adaptation of omitted spaces of monumental sacral buildings by presenting funding possibilities in the European Union countries available in period of 2017-2018 and the funds planned for the...
-
Power equalization of AES FPGA implementation
PublicationThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents
PublicationAutomation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...
-
An innovative approach to the forecasting of energetic effects while wood sawing
PublicationIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specific cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture...