Filters
total: 1255
-
Catalog
- Publications 889 available results
- Journals 119 available results
- Conferences 81 available results
- Publishing Houses 1 available results
- People 51 available results
- Inventions 5 available results
- Projects 11 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 63 available results
displaying 1000 best results Help
Search results for: JOB SECURITY
-
Adaptation of various persons' identification techniques as a solution for security and safety
PublicationPrzedstawiono różne metody identyfikacji osób w oparciu o ich cechy biometryczne w zastosowaniu do bezpieczeństwa i zabezpieczeń. Takimi biometrycznymi cechami mogą być właściwości fizjologiczne jak odciski palców, kształt dłoni, właściwości tęczówki jak również cechy behawioralne jak sposób pisania lub wypowiadania się.
-
A model-based approach to analysis of security protocols - a case study
PublicationArtykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...
-
Security of energy supply under the demonopolization of energy production in Poland,
PublicationOmówiono wzrost zapotrzebowania na energie elektryczną, udział nośników energii pierwotnej w pokryciu zapotrzebowania na paliwa. Omówiono pokrótce akty prawne związane z ochrona środowiska i energetyka. Scharakteryzowano proces starzenia się elektrowni w Polsce i rolę dużych elektrowni systemowych. Na tym tle przedstawiono rozproszone źródła energii elektrycznej i ich wpływ na bezpieczeństwo dostaw energii w sytuacjach ekstremalnych,...
-
LRIT - a novel system of vessels monitoring for maritime security and safety
PublicationW artykule przedstawiono propozycję architektury przyszłego, globalnego systemu monitorowania statków LRIT (Long Range ship's Identification and Tracking) podlegających konwencji SOLAS. Przedstawiono i scharakteryzowano poszczególne komponenty systemu ze szczególnym uwzględnieniem aspektów radiokomunikacyjnych.
-
Scheduling of compatible jobs on parallel machines
PublicationThe dissertation discusses the problems of scheduling compatible jobs on parallel machines. Some jobs are incompatible, which is modeled as a binary relation on the set of jobs; the relation is often modeled by an incompatibility graph. We consider two models of machines. The first model, more emphasized in the thesis, is a classical model of scheduling, where each machine does one job at time. The second one is a model of p-batching...
-
Shared processor scheduling of multiprocessor jobs
PublicationWe study a problem of shared processor scheduling of multiprocessor weighted jobs. Each job can be executed on its private processor and simultaneously on possibly many processors shared by all jobs. This simultaneous execution reduces their completion times due to the processing time overlap. Each of the m shared processors may charge a different fee but otherwise the processors are identical. The goal is to maximize the total...
-
SPIRITUALITY AND JOB SATISFACTION. MEDIATING ROLE OF STRESS, GRATITUDE TOWARDS ORGANIZATION AND TRUST IN SUPERVISOR. MODERATING ROLE OF RELIGIOUS PRACTICES
Publication -
Commitment-based human resource practices, job satisfaction and proactive knowledge-seeking behavior: The moderating role of organizational identification
Publication -
Information and Computer Security
Journals -
Food and Energy Security
Journals -
Journal of Computer Security
Journals -
Conflict Security & Development
Journals -
BIOINFO Security Informatics
Journals -
Security and Defence Quarterly
Journals -
African Security Review
Journals -
Contemporary Security Policy
Journals -
Journal of Transportation Security
Journals -
Information Security Journal
Journals -
Intelligence and National Security
Journals -
Journal of Human Security
Journals -
Homeland Security Affairs
Journals -
Agriculture and Food Security
Journals -
Journal of Strategic Security
Journals -
Journal of Regional Security
Journals -
Security and Human Rights
Journals -
Science & Global Security
Journals -
Social Security Bulletin
Journals -
Water Biology and Security
Journals -
Critical Studies on Security
Journals -
Aviation and Security Issues
Journals -
Journal of Cyber Security
Journals -
Journal of Baltic Security
Journals -
Security and Communication Networks
Journals -
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublicationThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Experiment with small objects floating under water in the harbor security aspect.
PublicationObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Security information sharing for smart grids: Developing the right data model
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublicationEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublicationIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
EU's Energy Policy and Assessing Europe's Spiraling Energy Security Crises
Publication -
INDO–FRENCH DEFENCE PARTNERSHIP AND REGIONAL SECURITY BALANCE IN SOUTH ASIA
Publication -
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Topology improvements in scale-free networks when assuring security and survivability
PublicationW artykule zaproponowano heurystyczny algorytm iteracyjny (NEA) kontrolowanego rozrostu sieci, zmniejszający stopień jej bezskalowości. Pokazano, że odpowiednia kontrola rozrostu sieci, prowadzi do uzyskania sieci o topologii zbliżonej do regularnej, a więc w duzym stopniu odpornej na celowe działania niszczące - ataki. Właściwości algorytmu zostały przebadane przy pomocy dedykowanego symulatora dla reprezentatywnej próby inicjalnych...
-
Overview of current communication systems for security forces. Features, limitations and potential solutions
Publication