Filters
total: 1680
-
Catalog
- Publications 1237 available results
- Journals 131 available results
- Conferences 82 available results
- Publishing Houses 1 available results
- People 43 available results
- Projects 9 available results
- e-Learning Courses 16 available results
- Events 3 available results
- Open Research Data 158 available results
displaying 1000 best results Help
Search results for: BATHING SECURITY
-
ECG measurement in the bathtub - drl on one side of the bathtub, the other side of the bathtub is grounded and the system ground is grounded- men
Open Research DataThe measurement data shows the measurement of the ECG signal in water in the bathtub. The data includes the measurement time, the reference ECG signal from the chest, and the ECG signal measured by electrodes placed in the bathtub without contact with the human body. Using the presented data, it is possible to estimate the optimal arrangement of measuring...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublicationIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Michal Piechowicz dr
PeopleAdjunct at the Department of European Studies at the Faculty of Political Science and Security Studies. Doctoral thesis defended in 2011. Author of publications in the field of European integration and security. Research interests focus on issues related to the decision-making processes and EU defense and security policy issues. I'm visiting the CEEs constantly. My ongoing and future-oriented goal is establishing research and trust-based...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publicationartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Number of devices accepting electronic payment instruments per million inhabitants in EU countries 2015
Open Research DataThis research data presents the number of devices accepting electronic payment instruments per million inhabitants in the EU countries in 2015. It is an element of the so-called the banking index, which in the subject literature is defined as the number of people actively using services banking. It is noted that this coefficient is also an expression...
-
Błażej Kochański dr
PeopleBłażej Kochański is an assistant professor at the Department of Statistics and Econometrics at the Faculty of Management and Economics of Gdańsk University of Technology, banking risk expert. He worked for banks in Poland and Europe, as a risk specialist, planning and analysis manager, chief risk officer, supervisory board member and management consultant. He built numerous credit risk management models, successfully managed credit...
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Feature extraction in detection and recognition of graphical objects
PublicationDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Number of non-cash transactions made with payment cards per capita in EU countries 2015
Open Research DataThe following data presents the number of non-cash transactions made with payment cards per capita in EU countries 2015.It is an element of the so-called the banking index, which in the subject literature is defined as the number of people actively using services banking.
-
On symmetric extendibility of quantum states and its applications
PublicationThis dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublicationW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
Oleksandr Melnychenko dr hab.
PeopleOleksandr Melnychenko works as a professor in a group of research and teaching staff at the Department of Finance of the Faculty of Management and Economics, the Gdańsk University of Technology; is a sworn translator of the Ukrainian language in Poland; an entrepreneur with many years of experience in running his own business and managing the companies' finances; has experience working in a commercial bank in a position dealing...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
New RFID readers for scalable RFID system
PublicationRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
The symmetric extendibility of quantum states
PublicationStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublicationW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Usenix Security Symposium
Conferences -
Information Security Symposium
Conferences -
International Workshop on Security
Conferences -
Information Security Conference
Conferences -
Conference on RFID Security
Conferences -
Piotr Grudowski dr hab. inż.
PeopleProfessor Dr hab. Eng. Piotr Grudowski heads the Department of Quality and Commodity Management at the Faculty of Management and Economics of Gdansk University of Technology. In the years 1987-2009 he worked at the Faculty of Mechanical Engineering of the Gdansk University of Technology, where he obtained a doctoral degree in technical sciences in the discipline of construction and operation of machines and he headed the Department...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publication -
Financial Markets and Bankruptcy Systems: Is there a Relationship?
PublicationPurpose: Filling the cognitive gap in the theory of ex-post transaction costs, i.e., at the stage of enforcing market transactions by examining the relationship between friendliness/severity of the bankruptcy and restructuring law towards debtors, the level of development of financial markets, the effectiveness of the judicial system and the rate of debt recovery. Design/Methodology/Approach: In the research, the following methods...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublicationThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES
PublicationProblems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Semantic Integration of Heterogeneous Recognition Systems
PublicationComputer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...
-
Should Polish banks be domesticated?
PublicationThe financial crisis revealed vulnerabilities in the regulation and supervision of the banking system. The overarching goal of the proposal (Bazylea III and CRD IV) is to strengthen the resilience of the EU banking sector. The effects of these regulations will be detrimental to the Polish banking system and economy. This follows from the fact that listed banks in Poland are subsidiaries of international banking groups. The article...
-
Signatures and acoustic images of objects moving in water
PublicationObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublicationThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublicationArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublicationW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Nowa metoda obliczania rozpływu prądów zwarciowych w przewodach odgromowych linii wysokiego napięcia
PublicationReferat przedstawia nowatorską metodę obliczania wartości prądów płynących w przewodach odgromowych w czasie zwarć, pozwalającą na dobór przewodów odgromowych pod względem wytrzymałości cieplnej. Proponowana metoda charakteryzuje się większą dokładnością i większą uniwersalnością niż powszechnie stosowane metody, pozwalając tym samym na dobór przewodów odgromowych z mniejszym ryzykiem niepewności. Prezentowana metoda obliczeniowa...
-
Klaudia Skelnik dr
Peopledr Klaudia Skelnik Prodziekan Wydziału Prawa i Administracji Wyższa Szkoła Bankowa w Gdańsku, doktor nauk społecznych w dyscyplinie nauki o bezpieczeństwie, absolwent studiów MBA zarządzanie bezpieczeństwem, mgr politologii w specjalizacji ustrojowo-samorządowej, posiadająca podyplomowe wykształcenie wyższe w zakresie prawa Unii Europejskiej, Edukacji dla bezpieczeństwa, Bezpieczeństwa i Higiena Pracy oraz szereg kursów i szkoleń...
-
Determination of Liquid Detergent Pods as a Potential Microplastic Source
PublicationWashing pods became a popular way to add detergent to washing machines. Despite the claims about the degradability of the pod film, the sludge in pipes can be observed after the usage of such pods. This study focused on a quantitative and qualitative analysis of washing pod films as a source of microplastic.
-
Kacper Wereszko mgr inż.
PeopleKacper Wereszko received the M.Sc. in 2016 (field of study: computer science, specialization: Internet technologies and algorithms). Since 2017 he is a Ph.D. student in the field of computer science. He works as assistant in Department of Algorithms and System Modelling. His research interests focus on security properties of graphs, domination problems in graphs and their practical applications.
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublicationDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
Towards Healthcare Cloud Computing
PublicationIn this paper we present construction of a software platform for supporting medical research teams, in the area of impedance cardiography, called IPMed. Using the platform, research tasks will be performed by the teams through computer-supported cooperative work. The platform enables secure medical data storing, access to the data for research group members, cooperative analysis of medical data and provide analysis supporting tools...
-
FINANCIAL COMPARISON OF WESTERN BALKAN AND BALTIC SEA STATES USING THE CAMEL APPROACH
Publication• The aim - This article aims to compare the situation in the banking sectors of two regions, which due to their political and economic history have much in common. These are the Western Balkan States of Serbia, Croatia and Macedonia, and the Baltic Sea States of Lithuania, Estonia, and Latvia. • Methods - It presents three approaches to defining banking stability that can be found in the literature and carries out an initial...
-
Effect of the Road Environment on Road Safety in Poland
PublicationRun-off-road accidents tend to be very severe because when a vehicle leaves the road, it will often crash into a solid obstacle (tree, pole, supports, front wall of a culvert, barrier). A statistical analysis of the data shows that Poland's main roadside hazard is trees and the severity of vehicles striking a tree in a run-off-road crash. The risks are particularly high in north-west Poland with many of the roads lined up with...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublicationThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
The effect of flaxseed addition on the quality and basic composition of wheat bread
Open Research DataThe dataset includes the effect of flaxseed addition on the properties of toasted bread bakery products such as basic composition, moisture content immediately after baking and after a defined time, porosity, acidity and total baking loss. The following bread variants were investigated: control bread, bread with 8% and 12% flaxseed addition and competitive...
-
Cybersecurity of Enterprise Infrastructure 2023
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Cybersecurity of Enterprise Infrastructure 2024
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
IEEE Symposium on Security and Privacy
Conferences