Filters
total: 1433
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY ONTOLOGY
-
Extracting concepts from the software requirements specification using natural language processing
PublicationExtracting concepts from the software require¬ments is one of the first step on the way to automating the software development process. This task is difficult due to the ambiguity of the natural language used to express the requirements specification. The methods used so far consist mainly of statistical analysis of words and matching expressions with a specific ontology of the domain in which the planned software will be applicable....
-
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers
PublicationThe aim of the study was to examine the relationship between job demands and salary in the subjective perception of mid-level police managers. An occupational stress model in which effort spent on job demands are not balanced by the received reward, was adopted. The study comprised 51 police officers (4 women). The partial least squares method was used for the analysis, and the SmartPLS 2.0 program was applied. The income and...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublicationWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
Fatigue and Professional Burnout in Police Officers and Firefighters
PublicationExcessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...
-
Identification of Emotional States Using Phantom Miro M310 Camera
PublicationThe purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...
-
The Effectiveness of Basic Resuscitation Activities Carried out by Combat Paramedics of the Police, as Exemplified by Polish Counterterrorist Units
PublicationThe tasks carried out by Police officers are often accompanied by dangerous situations that threaten the life and health of the people involved, the police themselves, and bystanders. It concerns especially counter-terrorism police units whose activities are aimed at terrorists and particularly dangerous criminals, and their course is violent and aggressive. In conjunction with the inability to bring civilian rescue services into...
-
Psychosocial risks associated with the profession of train driver
PublicationExcellent competencies as well as a good physical and mental health are required in train drivers’ profession. Despite the changes in the structure of employment the train drivers above 46 years and job tenure longer than 30 years are the largest group. The generation gap is becoming more pronounced, and its fulfilment will not be easy. It is related not only to training of new personnel but also promotion of healthy work environment...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublicationAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Modelling the malware propagation in mobile computer devices
PublicationNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublicationCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Piotr Szczuko dr hab. inż.
PeoplePiotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...
-
Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness
e-Learning Courses -
Usable Security and Privacy (Usable Security Workshop)
Conferences -
The methods of secure data transmission in the KNX system
PublicationThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Michal Piechowicz dr
PeopleAdjunct at the Department of European Studies at the Faculty of Political Science and Security Studies. Doctoral thesis defended in 2011. Author of publications in the field of European integration and security. Research interests focus on issues related to the decision-making processes and EU defense and security policy issues. I'm visiting the CEEs constantly. My ongoing and future-oriented goal is establishing research and trust-based...
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Ontologically Aided Rule Model for the Implementation of ITIL Processes
PublicationThe implementation of ITIL processes in IT organizations can be seen as a set of interdependent projects. The sequence of the ITIL implementation relies on such parameters as scope, depth, the capability of processes and the maturity of the organization. These factors can form common patterns of ITIL implementation that might be expressed as rules. Also-to semantically reinforce such a model in its predictiveness and replicativeness-the...
-
Measures for Evaluation of Structure and Semantics of Ontologies
PublicationArtykuł przedstawia zagadnienie miar jakości ontologii ze szczególnym uwzględnieniem ich podziału na syntaktyczne (strukturalne) i semantyczne. Na tym tle przedstawione jest nowe podejście do pomiaru właściwości semantycznych ontologii bazujące na kartografii wiedzy.
-
Income obtained according to particular rates only by taxpayers conducting non-agricultural business activity 2015
Open Research DataTaxation in the form of a lump sum on recorded revenues does not apply to certain types of activity, regardless of their size. We are talking about taxpayers who achieve revenue in whole or in part, among others from on account of running pharmacies, activities in the field of buying and selling foreign exchange values, activities in the field of trade...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublicationIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublicationMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publicationartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Feature extraction in detection and recognition of graphical objects
PublicationDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublicationW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
New RFID readers for scalable RFID system
PublicationRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
The symmetric extendibility of quantum states
PublicationStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Description logic based generator of data-centric applications
PublicationThe knowledge stored in Ontology Management Systems (OMS) that originally has the form of expressions, can be seen as a user application specification or as knowledge provided by an expert. The generator of applications discussed in this paper is defined as a program that automatically generates an application that meets a certain specification stored in OMS. It is shown that it is possible to build a user interface for data management...
-
Description logic based generator of data-centric applications
PublicationThe knowledge stored in Ontology Management Systems (OMS) that originally has the form of expressions, can be seen as a user application specification or as knowledge provided by an expert. The generator of applications discussed in this paper is defined as a program that automatically generates an application that meets a certain specification stored in OMS. It is shown that it is possible to build a user interface for data management...
-
Information technology assessment using a functional prototype of the agent based system
PublicationIn the paper authors present the progress of works related with the agent-based system serving the purpose of information technology assessment. Currently this is a prototype including agents, the knowledge base and the ontology; the domain incorporated by the assessment-enterprise managing technologies with special attention paid to technologies directed to IT projects. In this paper, besides indication of expected functionalities...
-
Usenix Security Symposium
Conferences -
Information Security Symposium
Conferences -
International Workshop on Security
Conferences -
Information Security Conference
Conferences -
Conference on RFID Security
Conferences -
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublicationW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publication -
Piotr Grudowski dr hab. inż.
PeopleProfessor Dr hab. Eng. Piotr Grudowski heads the Department of Quality and Commodity Management at the Faculty of Management and Economics of Gdansk University of Technology. In the years 1987-2009 he worked at the Faculty of Mechanical Engineering of the Gdansk University of Technology, where he obtained a doctoral degree in technical sciences in the discipline of construction and operation of machines and he headed the Department...
-
Conscious Cities Anthology 2018:Human-Centred Design, Science, and Technology
Journals -
Semantic memory architecture for knowledge acquisition and management
PublicationRozumienie informacji zawartej w tekście przez komputer wymaga wiedzy stojacej za systemem informatycznym. Wiedza ta nie jest implicite zapisanej w analizowanym tekscie. Zapisana może być ona w postaci ontologii badanej dziedziny. Zasadniczym zagadnieniem jest konstrukcja takiej ontologii. Artykuł przedstawia podeście oparte na grze 20 pytań do budowy przestrzeni semantycznej dla wybranej dziedziny.
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublicationThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Zarządzanie wiedzą ontologiczną w środowisku semantycznego internetu
PublicationW rozdziale zaprezentowano wyniki grupy badawczej Knowledge Management Group at Gdańsk University of Technology (KMG@GUT) w zakresie nowych metod reprezentacji i przetwarzania wiedzy sformułowanej w formie ontologii. Metody te wpisują się w aktualne kierunki rozwojowe inicjatywy Semantic Web: wykorzystują do zapisu ontologii logikę opisową (a więc są zgodne ze standardem OWL-DL), biorą pod uwagę rozproszenie wiedzy pomiędzy różne...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES
PublicationProblems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...