Filters
total: 2943
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY OF SEAPORTS
-
The instantaneous flicker sensation level measured in the industrial power system supplying the rolling mill motors
Open Research DataThe dataset presents the instantaneous flicker sensation level measured on the bus bars of the main switchgear of the industrial power network for the supply of rolling mills. The data were obtained during an experiment whose purpose was to determine a level of short-term and long-term flicker caused by voltage fluctuations. In the virtual application...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway
PublicationZapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...
-
Bezpieczeństwo elektroenergetyczne dla pokoleń
PublicationW artykule przeanalizowano źródła energii pierwotnej, ich wystarczalnośći dywersyfikację w skali lokalnej i globalnej, problem dekarbonizacji polskiej elektroenergetyki na tle europejskiej polityki klimatycznej, osiągalność źródeł gazu jako efektywnego paliwa dla energetyki, polski program energetyki jądrowej, bezpieczeństwo zasilania elektrycznych systemów trakcyjnych jako strategicznej alternatywy...
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublicationW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
Assessment of the Speed Management Impact on Road Traffic Safety on the Sections of Motorways and Expressways Using Simulation Methods
PublicationMethods used to evaluate the impact of Intelligent Transport System (ITS) services on road safety are usually based on expert assessments or statistical studies. However, commonly used methods are challenging to apply in the planning process of ITS services. This paper presents the methodology of research using surrogate safety measures calculated and calibrated with the use of simulation techniques and a driving simulator. This...
-
Self-Organizing Wireless Monitoring System for Containers
PublicationThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublicationThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
A place of school in the idea of the sustainable development
PublicationWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Safety of erection and repair of steel tanks with geometric imperfections using heavylift jack-up system
PublicationSafety analysis is performed of cylindrical vertical steel tanks during erection using heavylift jack up system. During an assembly or repair process a set of hydraulic supports is used. It allows to use the in-place lifting of heavy steel constructions on the required height. Wind can strongly influence stability of the lifted tank. Any geometric imperfections can reduce the critical or limit load. In the work failures of the...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
International Conference on Information Security and Assurance
Conferences -
International Conference on Security in Pervasive Computing
Conferences -
International Conference on Computational Intelligence and Security
Conferences -
International Workshop on Visualization for Cyber Security
Conferences -
Australian Information Security Management Conference
Conferences -
Information Hiding and Multimedia Security Workshop
Conferences -
International Conference on Information and Communications Security
Conferences -
International Conference on Information Theoretic Security
Conferences -
International Conference on Principles of Security and Trust
Conferences -
IFIP Information Security & Privacy Conference
Conferences -
Australasian Conference on Information Security and Privacy
Conferences -
International Workshop on Information Security Applications
Conferences -
International IEEE Security in Storage Workshop
Conferences -
International Conference on Information Security and Cryptology
Conferences -
Workshop on Security and Privacy in e-Commerce
Conferences -
Computational Intelligence in Security for Information Systems
Conferences -
International Conference on Security of Information and Networks
Conferences -
International Conference on Information Systems Security
Conferences -
Australian Information Warfare and Security Conference
Conferences -
Financial Cryptography and Data Security Conference
Conferences -
Workshop in Information Security Theory and Practices
Conferences -
International Conference on Information Security and Cryptography
Conferences -
International Symposium on Information Assurance and Security
Conferences -
Australasia Conference on Information Security and Privacy
Conferences -
International Conference on Cryptology and Network Security
Conferences -
Symposium on Requirements Engineering for Information Security
Conferences -
SKLOIS Conference on Information Security and Cryptology
Conferences -
Annual Conference on Privacy, Security and Trust
Conferences -
International Workshop on Issues in the Theory of Security
Conferences -
Information Security Practice and Experience Conference
Conferences -
International Conference on network and System Security
Conferences -
International Workshop on Security in Information Systems
Conferences -
IEEE European Symposium on Security and Privacy
Conferences -
ACM Conference on Computer and Communications Security
Conferences -
Annual Computer Security Applications Conference
Conferences -
European Symposium On Research In Computer Security
Conferences -
International Conference on Availability, Reliability and Security
Conferences -
Implementing decisional trust: a first approach for smart reliable systems
PublicationIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Parametric analysis of Istanbul's Ring Road viaduct for three levels of seismic load
PublicationThe paper presents a parametric analysis of the Istanbul's ring road viaduct that is currently under construction within the Northern Marmara Highway project. The structure, due to its location on seismic prone areas is exposed to seismic loads of different strengths and different return periods. The study is focused on concrete bridge supports that are design to work in nonlinear range. The parametric study, conducted in MATLAB...