Search results for: SECURITY ONTOLOGY - Bridge of Knowledge

Search

Search results for: SECURITY ONTOLOGY

Search results for: SECURITY ONTOLOGY

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Full text available to download

  • External Security Strategies of Belarus

    Under President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...

    Full text available to download

  • Postbiotics in oncology: science or science fiction?

    Publication
    • A. Kudra
    • K. Kaźmierczak-Siedlecka
    • B. K. Sobocki
    • D. Muszyński
    • J. Polom
    • L. Carbone
    • L. Marano
    • F. Roviello
    • L. Kalinowski
    • E. Stachowska

    - Frontiers in Microbiology - Year 2023

    The gut microbiome has been increasingly understood to play a critical role in carcinogenesis and cancer disease progression. The most recent research advancements have shown that different tools of microbiota manipulation contribute to gut microbiome–immune–oncology axis modulation, offering exciting opportunities for targeted interventions aimed at improving the efficacy of established anti-cancer therapy. Postbiotics are a new...

    Full text available to download

  • Metody opisu ontologii: Inżynieria ontologii i jej zastosowania

    Publication

    - Year 2008

    Przedstawiono rozwój języków opisu technologii i wskazano mozliwości ich zastosowania w różnych dziedzinach, a zwłaszcza do integracji i automatycznego uruchamiania usług sieciowych.

  • Wyszukiwanie informacji z wykorzystaniem algorytmu Ontology Clustering by Directions

    Publication

    - Year 2009

    Artykuł opisuje algorytm Ontology Clustering by Directions. Algorytm ten ma na celu wspieranie użytkowników w formułowaniu ontologicznych zapytań. Ontologiczne zapytania służą do wydobywania informacji sformułowanych za pomocą ontologii opisanych np. językiem OWL. Artykuł przedstawia rodzaje języków wykorzystywanych do formułowania ontologicznych zapytań. W szczególności opisuje języki, które mają być przyjazne użytkownikom. Na...

  • A video monitoring system using ontology-driven identification of threats

    Publication

    In this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...

    Full text to download in external service

  • An Ontology-based Contextual Pre-filtering Technique for Recommender Systems

    Publication

    - Year 2016

    Full text to download in external service

  • Validation of an Agent and Ontology-based Information Technology Assessment System

    The aim of this paper is to present a new method of the validation of an Agent and Ontology-based Information Technology Assessment System. In the introduction part of the paper, the characteristics of the proposed multi-agent system are presented. Next, some important details regarding the ontology functionality of this system are described and an approach to its verification process is proposed. The approach employs semantic...

  • An Ontology-based Contextual Pre-filtering Technique for Recommender Systems

    Publication

    - Year 2016

    Context-aware Recommender Systems aim to provide users with the most adequate recommendations for their current situation. However, an exact context obtained from a user could be too specific and may not have enough data for accurate rating prediction. This is known as the data sparsity problem. Moreover, often user preference representation depends on the domain or the specific recommendation approach used. Therefore, a big effort...

    Full text to download in external service

  • Serendipitous Recommendations Through Ontology-Based Contextual Pre-filtering

    Publication

    Context-aware Recommender Systems aim to provide users with better recommendations for their current situation. Although evaluations of recommender systems often focus on accuracy, it is not the only important aspect. Often recommendations are overspecialized, i.e. all of the same kind. To deal with this problem, other properties can be considered, such as serendipity. In this paper, we study how an ontology-based and context-aware...

    Full text to download in external service

  • Zastosowania ontologii: Organizacja ontologii bazy treści i zajęć dydaktycznych

    Publication

    - Year 2008

    Przedstawiono koncepcję organizacji ontologii nauczania wiedzy informatycznej, według aktualnie obowiązujacego raportu CC 2005 i jego części dziedzinowych. Wyodrębniono struktury hierarchiczne porządkujące bazę treści dydaktycznych oraz organizację toku studiów. Wskazano na zalety rozwiązań zawartych w raporcie oraz zaproponowano modyfikacje struktur organizacyjnych ontologii w celu ich większej elastyczności. Opisano strategię...

  • Resilience and Security in Software Defined Networking

    Publication
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Year 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Full text to download in external service

  • Indo-French Defence and Security Partnership

    Publication
    • M. Bharti

    - Slovak Journal of International Relations - Year 2023

    Full text to download in external service

  • The Impact of Terrorism on International Peace and Security

    Publication
    • M. Bharti

    - Year 2022

    Full text to download in external service

  • Aspects of maritime security and safety of Poland

    Publication

    - Year 2005

    Referat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...

  • An integrated framework for security protocol analysis

    Publication

    - Year 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • An integrated method for security protocols analysis

    Publication
    • M. (. Olszewski

    - Year 2008

  • Automatic sound recognition for security purposes

    Publication

    - Year 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Architecture supporting security of agent systems

    Publication

    - Year 2006

    W rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Full text to download in external service

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • A sense of security and freedom in a residential environment

    The article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...

    Full text available to download

  • Mobile Security: Threats and Best Practices

    Publication

    - Mobile Information Systems - Year 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Full text available to download

  • Techniki modularyzacji ontologii

    Publication

    W ciągu ostatnich kilku lat tematem wielu prac naukowych stała się modularyzacja ontologii. Istnieje kilka przyczyn dużego zainteresowania tym kierunkiem prac. Z jednej strony ontologie wykazały swoją przydatność w różnego rodzaju przedsięwzięciach związanych z inicjatywą Semantic Web. Z drugiej strony okazało się, że po przekroczeniu pewnej granicy wielkości ontologii inżynierowie wiedzy natykają się na problemy, z którymi inżynieria...

  • Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis

    Publication

    - Year 2013

    Context-aware applications running in the intelligent space are taken into account and their execution in the service oriented environment is considered. It has been presented where and how SOA services can be utilized during their execution: to analyze current context of the application and to support execution of strictly determined actions suitable for that context. The proposed mechanism of context-aware service selection and...

  • Quantum information isomorphism: Beyond the dilemma of the Scylla of ontology and the Charybdis of instrumentalism.

    Publication

    - Year 2004

    Zaprezentowano koncepcję izomorfizmu kwantowej informacji, zgodnie z którym kwantowy opis natury jest izomorficzny z samą naturą.

  • Dynamic OWL Ontology matching Using Lexical Wordnet-based Measures

    Ontologies are often used as a means of describing knowledge and the domain of operation of modern applications. S need arises for the ability to quickly match those ontologies to enable interoperability of such systems. This paper presents an extension to Noy and McGuiness ontology construction methodology which should improve ontology interoperability and a lexicon-based algorithm for merging and aligning of such ontologies stored...

    Full text available to download

  • Zespołowa budowa ontologii z wykorzystaniem systemu OCS oraz edytora Protégé

    Konstruowanie ontologii wymaga współpracy wielu osób. W idealnej sytuacji nad pojedynczą ontologią pracować będzie duża, rozproszona społeczność tworząca tym samym wspólną reprezentację wiedzy z danej dziedziny. W publikacji zaprezentowano propozycję modelu pracy grupowej nad ontologią. Zdefiniowano model zarządzania wersjami ontologii. Przedstawiono system Ontology Creation System (OCS) oraz architekturę i implementację rozszerzenia...

    Full text available to download

  • COMPUTERS & SECURITY

    Journals

    ISSN: 0167-4048 , eISSN: 1872-6208

  • Health Security

    Journals

    ISSN: 2326-5094 , eISSN: 2326-5108

  • Food Security

    Journals

    ISSN: 1876-4517 , eISSN: 1876-4525

  • African Security

    Journals

    ISSN: 1939-2206 , eISSN: 1939-2214

  • Democracy & Security

    Journals

    ISSN: 1741-9166 , eISSN: 1555-5860

  • European Security

    Journals

    ISSN: 0966-2839 , eISSN: 1746-1545

  • Asian Security

    Journals

    ISSN: 1479-9855

  • Security Challenges

    Journals

    ISSN: 1833-1459

  • INTERNATIONAL SECURITY

    Journals

    ISSN: 0162-2889 , eISSN: 1531-4804

  • Security Forum

    Journals

    ISSN: 2544-1809

  • Security and Privacy

    Journals

    ISSN: 2475-6725

  • Water Security

    Journals

    eISSN: 2468-3124

  • SECURITY STUDIES

    Journals

    ISSN: 0963-6412 , eISSN: 1556-1852

  • Security Journal

    Journals

    ISSN: 0955-1662 , eISSN: 1743-4645

  • SECURITY DIALOGUE

    Journals

    ISSN: 0967-0106 , eISSN: 1460-3640

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Full text available to download

  • Integrated functional safety and cyber security analysis

    Publication

    - IFAC-PapersOnLine - Year 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Full text available to download

  • Sectarianism as a Factor Shaping Persian Gulf Security

    Publication

    - International Studies - Year 2015

    Full text to download in external service

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publication

    - Year 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Hierarchical approach to security monitoring and risk evaluation

    Publication

    - Year 2005

    Przedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.