Filters
total: 1433
-
Catalog
displaying 1000 best results Help
Search results for: SECURITY ONTOLOGY
-
Ukraine’s Energy Security in Strategies
PublicationDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
External Security Strategies of Belarus
PublicationUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
Postbiotics in oncology: science or science fiction?
PublicationThe gut microbiome has been increasingly understood to play a critical role in carcinogenesis and cancer disease progression. The most recent research advancements have shown that different tools of microbiota manipulation contribute to gut microbiome–immune–oncology axis modulation, offering exciting opportunities for targeted interventions aimed at improving the efficacy of established anti-cancer therapy. Postbiotics are a new...
-
Metody opisu ontologii: Inżynieria ontologii i jej zastosowania
PublicationPrzedstawiono rozwój języków opisu technologii i wskazano mozliwości ich zastosowania w różnych dziedzinach, a zwłaszcza do integracji i automatycznego uruchamiania usług sieciowych.
-
Wyszukiwanie informacji z wykorzystaniem algorytmu Ontology Clustering by Directions
PublicationArtykuł opisuje algorytm Ontology Clustering by Directions. Algorytm ten ma na celu wspieranie użytkowników w formułowaniu ontologicznych zapytań. Ontologiczne zapytania służą do wydobywania informacji sformułowanych za pomocą ontologii opisanych np. językiem OWL. Artykuł przedstawia rodzaje języków wykorzystywanych do formułowania ontologicznych zapytań. W szczególności opisuje języki, które mają być przyjazne użytkownikom. Na...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
An Ontology-based Contextual Pre-filtering Technique for Recommender Systems
Publication -
Validation of an Agent and Ontology-based Information Technology Assessment System
PublicationThe aim of this paper is to present a new method of the validation of an Agent and Ontology-based Information Technology Assessment System. In the introduction part of the paper, the characteristics of the proposed multi-agent system are presented. Next, some important details regarding the ontology functionality of this system are described and an approach to its verification process is proposed. The approach employs semantic...
-
An Ontology-based Contextual Pre-filtering Technique for Recommender Systems
PublicationContext-aware Recommender Systems aim to provide users with the most adequate recommendations for their current situation. However, an exact context obtained from a user could be too specific and may not have enough data for accurate rating prediction. This is known as the data sparsity problem. Moreover, often user preference representation depends on the domain or the specific recommendation approach used. Therefore, a big effort...
-
Serendipitous Recommendations Through Ontology-Based Contextual Pre-filtering
PublicationContext-aware Recommender Systems aim to provide users with better recommendations for their current situation. Although evaluations of recommender systems often focus on accuracy, it is not the only important aspect. Often recommendations are overspecialized, i.e. all of the same kind. To deal with this problem, other properties can be considered, such as serendipity. In this paper, we study how an ontology-based and context-aware...
-
Zastosowania ontologii: Organizacja ontologii bazy treści i zajęć dydaktycznych
PublicationPrzedstawiono koncepcję organizacji ontologii nauczania wiedzy informatycznej, według aktualnie obowiązujacego raportu CC 2005 i jego części dziedzinowych. Wyodrębniono struktury hierarchiczne porządkujące bazę treści dydaktycznych oraz organizację toku studiów. Wskazano na zalety rozwiązań zawartych w raporcie oraz zaproponowano modyfikacje struktur organizacyjnych ontologii w celu ich większej elastyczności. Opisano strategię...
-
Resilience and Security in Software Defined Networking
PublicationThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
Indo-French Defence and Security Partnership
Publication -
The Impact of Terrorism on International Peace and Security
Publication -
Aspects of maritime security and safety of Poland
PublicationReferat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...
-
An integrated framework for security protocol analysis
PublicationAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
An integrated method for security protocols analysis
Publication -
Automatic sound recognition for security purposes
PublicationIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Architecture supporting security of agent systems
PublicationW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Security aspects in functional safety analysis
PublicationA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Cost assessment of computer security activities
PublicationComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
A sense of security and freedom in a residential environment
PublicationThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Techniki modularyzacji ontologii
PublicationW ciągu ostatnich kilku lat tematem wielu prac naukowych stała się modularyzacja ontologii. Istnieje kilka przyczyn dużego zainteresowania tym kierunkiem prac. Z jednej strony ontologie wykazały swoją przydatność w różnego rodzaju przedsięwzięciach związanych z inicjatywą Semantic Web. Z drugiej strony okazało się, że po przekroczeniu pewnej granicy wielkości ontologii inżynierowie wiedzy natykają się na problemy, z którymi inżynieria...
-
Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis
PublicationContext-aware applications running in the intelligent space are taken into account and their execution in the service oriented environment is considered. It has been presented where and how SOA services can be utilized during their execution: to analyze current context of the application and to support execution of strictly determined actions suitable for that context. The proposed mechanism of context-aware service selection and...
-
Quantum information isomorphism: Beyond the dilemma of the Scylla of ontology and the Charybdis of instrumentalism.
PublicationZaprezentowano koncepcję izomorfizmu kwantowej informacji, zgodnie z którym kwantowy opis natury jest izomorficzny z samą naturą.
-
Dynamic OWL Ontology matching Using Lexical Wordnet-based Measures
PublicationOntologies are often used as a means of describing knowledge and the domain of operation of modern applications. S need arises for the ability to quickly match those ontologies to enable interoperability of such systems. This paper presents an extension to Noy and McGuiness ontology construction methodology which should improve ontology interoperability and a lexicon-based algorithm for merging and aligning of such ontologies stored...
-
Zespołowa budowa ontologii z wykorzystaniem systemu OCS oraz edytora Protégé
PublicationKonstruowanie ontologii wymaga współpracy wielu osób. W idealnej sytuacji nad pojedynczą ontologią pracować będzie duża, rozproszona społeczność tworząca tym samym wspólną reprezentację wiedzy z danej dziedziny. W publikacji zaprezentowano propozycję modelu pracy grupowej nad ontologią. Zdefiniowano model zarządzania wersjami ontologii. Przedstawiono system Ontology Creation System (OCS) oraz architekturę i implementację rozszerzenia...
-
COMPUTERS & SECURITY
Journals -
Health Security
Journals -
Food Security
Journals -
African Security
Journals -
Democracy & Security
Journals -
European Security
Journals -
Asian Security
Journals -
Security Challenges
Journals -
INTERNATIONAL SECURITY
Journals -
Security Forum
Journals -
Security and Privacy
Journals -
Water Security
Journals -
SECURITY STUDIES
Journals -
Security Journal
Journals -
SECURITY DIALOGUE
Journals -
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Integrated functional safety and cyber security analysis
PublicationThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Sectarianism as a Factor Shaping Persian Gulf Security
Publication -
Wybrane problemy ochrony żeglugi (Maritime Security)
Publicationprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Hierarchical approach to security monitoring and risk evaluation
PublicationPrzedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.