Filters
total: 876
Search results for: JAMMING ATTACKS
-
On the estimation of the design loads on container stacks due to excessive acceleration in adverse weather conditions
Publication -
Effect of Pendolino high-speed rail on the structure of buildings located the proximity of the railway tracks
PublicationThe following research focuses on the dynamic analysis of the impact of the high-speed train inducted vibrations on the structures located near railway tracks. The office complex chosen as the subject of calculations is located in the northern part of Poland, in Gdańsk, in the proximity of Pendolino, the high speed train route. The high speed trains are the response for the growing needs for more efficient railway system. However...
-
BGA – BEST Gaming Arena
EventsBGA – BEST Gaming Arena jest największym wydarzeniem e-sportowym skierowanym do studentów, podczas którego odbywać się będą turnieje gier multiplayer, takich jak Counter Strike, League of Legends czy Hearthstone.
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublicationA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
International Journal of Gaming and Computer-Mediated Simulations
Journals -
Numerical Studies on Propellers in Open Water and behind Hulls aiming to support the Evaluation of Propulsion Tests
PublicationA RANS based numerical analysis of propellers can contribute considerably to our understanding of propeller/hull interaction. It may also allow for a review of scaling procedures on results from experimental fluid dynamics (EFD). Using various RANS codes (Fluent, CFX, STAR-CCM+ and FreSCo+) on common test cases the authors first focused on propeller open water (POW) calculations. Next we simulated the propeller hull interaction...
-
Microbiological, Antioxidant, Nutritional Properties, and Health Safety of Juice from Organic and Conventional Vitis vinifera L. Farming
Publication -
Impact of active intra-complex rest intervals on post-back squat versus hip thrust jumping potentiation
Publication -
Acute Effects of High-Load vs. Plyometric Conditioning Activity on Jumping Performance and the Muscle-Tendon Mechanical Properties
Publication -
Effects of Complex Training on Jumping and Change of Direction Performance, and Post-Activation Performance Enhancement Response in Basketball Players
Publication -
Analytical expression between the impact damping ratio and the coefficient of restitution in the non-linear viscoelastic model of structural pounding
PublicationWyniki wcześniejszych badań pokazują, iż nieliniowy model lepko-sprężysty zderzeń konstrukcji budowlanych podczas trzęsień ziemi najdokładniej symuluje siłę zderzenia w czasie kontaktu oraz odpowiedź konstrukcji. Celem niniejszego artykułu jest wyprowadzenie wzoru na zależność pomiędzy liczbą tłumienia zderzenia (parametr wspomnianego modelu) a współczynnikiem odbicia, który jest parametrem często stosowanym i analizowanym w literaturze....
-
The mini ELITPC: Reconstruction and identification of charged particles tracks during beam tests at IFIN-HH
Publication -
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
PublicationPresentation Attack Detection (PAD) is crucial in biometric finger vein recognition. The susceptibility of these systems to forged finger vein images is a significant challenge. Existing approaches to mitigate presentation attacks have computational complexity limitations and limited data availability. This study proposed a novel method for identifying presentation attacks in finger vein biometric systems. We have used optimal...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Assessing Food Insecurity and Its Drivers among Smallholder Farming Households in Rural Oyo State, Nigeria: The HFIAS Approach
Publication -
Effects of Flywheel vs. Free-Weight Squats and Split Squats on Jumping Performance and Change of Direction Speed in Soccer Players
Publication -
Mechanisms positioned in a neighbourhood of their singular positions - velocity amplification in the electromagnetic damping. Part 1 - Background of the mechanical structure modeling
PublicationW pracy przedstawiono metodę modelowania dynamiki drgającego hybrydowego układu mechanicznego złożonego z odkształcalnego podukładu ciągłego oraz z połączonego z nim mechanizmu. U układzie pojawiają się drgania części odkształcalnej. By je wytłumić, ich energia zamieniana jest w energię elektryczną (za pomocą prądnicy prądu stałego) i rozpraszana na oporności obecnej w układzie elektrycznym. Aby przyśpieszyć tłumienie, wprowadzony...
-
WHY SHOULD WE ADOPT NON-USED ATTICS OF MONUMENTAL SACRAL CATHOLIC CHURCHES FOR SECULAR PURPOSES?
PublicationA motive for adapting the desecrated churches to new purposes is a broadly discussed matter, progressively better investigated and defined. Is it advisable to introduce a new, permanent function, complementary to the sacred one in the historical ecclesial buildings? This paper presents the results of the research on benefits of adapting the non-utilized attics of monumental churches still performing their sacred function, located...
-
Performance evaluation of GPS anti-spoofing system based on antenna array processing
PublicationThis article concerns the problem of detection and mitigation of spoofing attacks in Global Navigation Satellite Systems. First, background information about spoofing and its possible countermeasures is provided. Next, concept of a novel GPS anti-spoofing system based on antenna array processing is presented and implementation of prototype of this system is described. The third section outlines the performance evaluation of proposed...
-
Early farming settlement of the marginal zone of loess uplands and its palaeoenvironmental context – a case study of the Iłża Piedmont (S Poland)
Publication -
Evaluation of the Influence of Farming Practices and Land Use on Groundwater Resources in a Coastal Multi-Aquifer System in Puck Region (Northern Poland)
PublicationThis study focuses on the modeling of groundwater flow and nitrate transport in a multi-aquifer hydrosystem in northern Poland, adjacent to Puck Bay (Baltic sea). The main goal was to investigate how changes in land use and farming practices may affect groundwater recharge and submarine groundwater discharge (SGD) to the sea and the associated N-NO3 fluxes. An integrated modelling approach has been developed, which couples the...
-
Gaming Law Review-Economics Regulation Compliance and Policy
Journals -
The Weather as an Indicator for Decision-Making Support Systems Regarding the Control of Cutworms in Beets and Cereal Leaf Beetles in Cereals and Their Adoption in Farming Practice
Publication -
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublicationStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Frequency of use, moral incongruence, and religiosity and their relationships with self-perceived addiction to pornography, internet use, social networking and online gaming
PublicationBackground and Aims Moral incongruence involves disapproval of a behaviour in which people engage despite their moral beliefs. Although considerable research has been conducted on how moral incongruence relates to pornography use, potential roles for moral incongruence in other putative behavioural addictions have not been investigated. The aim of this study was to investigate the role of moral incongruence in self‐perceived...
-
A dynamic vehicle-bridge model based on the modal identification results of an existing EN57 train and bridge spans with non-ballasted tracks
PublicationThis paper addresses the methodology of the bridge-vehicle dynamic model definition based on the free response measurements of an existing train and existing bridge spans. In the case of the railway vehicle, the methodology uses the impulse excitations of a single car by means of the wedge method. In the case of the bridge spans, free responses are collected after the passages of trains. The global modal parameters (frequencies...
-
School psychologist’s interventions to promote successful school re-entry of chronically ill children aiming at altering peers’ attitudes towards them
PublicationThe aim of this article is to outline school psychologist’s interventions, which might be useful while supporting a chronically, somatically ill child in their re-entry to school, aiming at broadening their peers’ knowledge about the chronic disease and positively changing their attitudes towards the ill child. In the first part, the importance of peer relationships in childhood and adolescence, the relation of their quality...
-
Laxer Clinical Criteria for Gaming Disorder May Hinder Future Efforts to Devise an Efficient Diagnostic Approach: A Tree-Based Model Study
PublicationInternet Gaming Disorder (IGD) has been recognized in May 2013 and can be evaluated using the criteria developed by American Psychiatric Association (APA). The present study investigated the role each IGD criteria plays in diagnosing disordered gaming. A total of 3,377 participants (mean age 20 years, SD = 4.3 years) participated in the study. The data collected was scrutinized to detect patterns...
-
Device for spoofing in global positioning system
PublicationThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Radial distribution of dose within heavy charged particle tracks – Models and experimental verification using LiF:Mg,Cu,P TL detectors
Publication -
Relationship among the Change of Direction Ability, Sprinting, Jumping Performance, Aerobic Power and Anaerobic Speed Reserve: A Cross-Sectional Study in Elite 3x3 Basketball Players
Publication -
Modal Adjustment of Rayleigh Based Structural Damping and Coordinate-Partitioning Algorithm Dedicated to Frictionless Contact Constraints between Multibody System and Structure Modelled with Finite Elements
PublicationThe paper presents a dedicated numerical algorithm. The algorithm is advantageous during investigations of the dynamics of a hybrid multibody / finite-elements system. We focus our attention on interactions resulting from mechanical contact. Pointwise contact connects a vertex of the multibody structure and a surface of the elastic reference body. Instead of a positive value of the relative penetration factor, constraint equations...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublicationW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublicationThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Towards a modification of a regulatory framework aiming at bunker oil spill prevention from ships - A design aspect of bunker tanks vents location guided by CFD simulations
PublicationAlthough accidental bunker oil spills at seaway are relatively rare events, they can be pose real threat to the natural marine environment. One of the reasons for the bunker spill to occur is a design failure; one of the ways it can demonstrate is an improper location or height of vent heads, leading to a bunker oil discharge during heavy rolling, due to sloshing phenomenon. Design of a ship and her systems is guided by various...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublicationNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Ochrona odbiorników GNSS przed zakłóceniami celowymi
PublicationArtykuł dotyczy zastosowania algorytmów przestrzennego cyfrowego przetwarzania sygnałów dla potrzeb selektywnej eliminacji sygnałów zakłócających pracę odbiorników nawigacji satelitarnej GNSS. Omówiono podatność tych odbiorników na ataki elektroniczne typu zagłuszanie oraz spoofing. Polegają one na celowej emisji sygnałów niepożądanych w paśmie pracy systemu. Następnie przedstawiono koncepcję przeciwdziałania tego rodzaju zakłóceniom...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
This dataset contains results of our investigation aiming in determination of antioxidant potential of the propolis extract produced in our laboratory.
Open Research DataThis dataset contains results of our investigation aiming in determination of antioxidant potential of the propolis extract produced in our laboratory. The propolis samples were delivered by Polish beekeepers. DPPH and FREAP methods were used. Moreover, total phenolic contents in the extracts were determined.
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublicationW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
Conference for the International Simulation and Gaming Association
Conferences -
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublicationRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
The International Symposium on Research in Attacks, Intrusions and Defenses (International Symposium on Recent Advances in Intrusion Detection)
Conferences -
System wykrywania i przeciwdziałania spoofingowi GPS
PublicationSpoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....