Filters
total: 857
Search results for: jamming attacks
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Effectiveness of Polymer Damper in Damage Reduction of Temporary Steel Grandstand
PublicationA large number of accidents involving damage of temporary grandstands during different types of events were observed in the past. The aim of the paper is to analyse numerically the effectiveness of a polymer damper in damage reduction of a temporary steel scaffolding grandstand exposed to dynamic load due to jumping. The element has been installed as a diagonal one at the back part of the structure. The method has been compared...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publicationarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Stanisław Barański
PeopleStanisław Barański received BSc in 2019 and MSc in 2020 in informatics at Gdańsk University of Technology. Currently, he is a PhD candidate at the Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. His research interests include blockchains and cryptography, especially the issue of blockchain-based internet voting and mitigation of content poisoning...
-
The AFM micrographs of pitting corrosion evolution on high-alloy steel 1.4301
Open Research DataThe dataset contains the results of topographic imaging of high-alloy stainless steel 1.4301 on which the pitting corrosion process was induced by electrochemical methods. The study of the effects of a local attack allows for conclusions about the intensity and mechanism of this type of corrosion. The file contains atomic force microscopy (AFM) data...
-
Bioterrorism — characteristics and possibilities of prevention
PublicationIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Dynamic tests of composite footbridge segment – experimental and numerical studies
PublicationExperimental dynamic tests and numerical simulations of a 3 meters long segment of a footbridge made of polymer composites are presented in the paper. The span-length is reduced, however dimensions of cross-section are the same as the target footbridge. The segment structure is made of sandwich panels, which consist of fibre reinforced polymer (GFRP) laminates (skins) and a PET foam (core). The first part of the paper contains...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublicationThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Imaging of the effects of pitting corrosion with the use of AFM
Open Research DataPitting corrosion is a local attack on a metal surface, limited to a point or small area, which appears as a hole. Pitting corrosion is one of the most harmful forms of corrosion due to the fact that it is associated with small, difficult to detect damage, that can even lead to perforation of the structure. A single pit may range in size from micrometers...
-
Mathematical Modeling of Ice Dynamics as a Decision Support Tool in River Engineering
PublicationThe prediction of winter flooding is a complicated task since it is affected by many meteorological and hydraulic factors. Typically, information on river ice conditions is based on historical observations, which are usually incomplete. Recently, data have been supplemented by information extracted from satellite images. All the above mentioned factors provide a good background of the characteristics of ice processes, but are not...
-
AeroSense Measurements: Wind Tunnel ETH Zurich
Open Research DataData from wind tunnel tests of Aerosesne measurement system installed on NACA 0012 at ETH Zurich wind tunnel.
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Programmed metalloporphyrins for self-assembly within light-harvesting stacks: 5,15-dicyano-10,20-bis(3,5-di-tert-butylphenyl)-porphyrinato zinc(II) and its push-pull 15-N,N-dialkylamino-5-cyano congeners obtained by a facile direct amination.
PublicationThe title dicyano compound was synthesized via cyanation and it self-assembles in nonpolar solvents giving red-shifted and broad absorption maxima just as the bacteriochlorophylls which are encountered in the light-harvesting organelles of early photosynthetic bacteria. In the crystal, stacks are formed through a hierarchic combination of π-stacking and a CNZn electrostatic interaction. Push−pull 15-N,N-dialkylamino-5-cyano congeners...
-
Detection of illicit chemicals by portable Raman spectrometer
PublicationThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Assessment of the ice jam potential on regulated rivers and reservoirs with the use of numerical model results
PublicationThis study presents an attempt at estimating the jam potential on rivers with significant anthropogenic intervention in the course or flow characteristics of the river. The DynaRiCE model was used for forecasting both the place and time of an ice jam occurrence. In this modified method, two ice parameters are subjected to analysis, namely the relative ice-to-water velocity (vi/vw),and the ice thickness to single floe thickness...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublicationIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Analysis of Ferroresonance Mitigation Effectiveness in Auxiliary Power Systems of High-Voltage Substations
PublicationFerroresonance in power networks is a dangerous phenomenon, which may result in overcurrents and overvoltages, causing damage to power equipment and the faulty operation of protection systems. For this reason, the possibility of the occurrence of ferroresonance has to be identified, and adequate methods need to be incorporated to eliminate or reduce its effects. The aim of this paper is to evaluate the effectiveness of ferroresonance...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublicationThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
Demonstrator technologii C-IED
PublicationArtykuł przedstawia budowę i działanie opracowanego na Politechnice Gdańskiej demonstratora technologicznego systemu AEGIS, przeznaczonego do przeciwdziałania atakom z wykorzystaniem prowizorycznych urządzeń wybuchowych detonowanych drogą radiową (RCIED — Radio Controlled Improvised Explosive Devices). Przedstawiono zaimplementowaną oryginalną metodę generowania sygnału zagłuszającego o dowolnie ukształtowanym widmie częstotliwościowym,...
-
Experimental Study on the Effectiveness of Polyurethane Flexible Adhesive in Reduction of Structural Vibrations
PublicationThe aim of the present study is to consider the idea of using polyurethane flexible adhesive in to reduce the vibrations in structures exposed to dynamic loads and evaluate their damping properties in relation to large deformations. Firstly, two aluminium cantilever beams, simulating structural elements (without and with polyurethane layer in the form of tape), were analysed, in order to check the damping of the unconstrained polymer...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
Michał Lech dr inż.
PeopleMichał Lech was born in Gdynia in 1983. In 2007 he graduated from the faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. In June 2013, he received his Ph.D. degree. The subject of the dissertation was: “A Method and Algorithms for Controlling the Sound Mixing Processes by Hand Gestures Recognized Using Computer Vision”. The main focus of the thesis was the bias of audio perception caused...
-
Rural Design Lectures
e-Learning CoursesThe lectures are aiming to provide the students with the general understanding of the vernacular architecture, landscape, future, resilience and history.
-
Theory of Rural Design 2023
e-Learning CoursesThe lectures are aiming to provide the students with the general understanding of the vernacular architecture, landscape, future, resilience and history.
-
Application of polymer element in reduction of temporary steel grandstand vibrations
PublicationThe numerical analysis focused on reduction of vibrations of a temporary steel scaffolding grandstand has been conducted in this paper. These types of structures are regularly subjected to dynamic loads which, in conjunction with light and quite slender structural members, may induce dangerous vibrations. To increase their safety, temporary steel grandstands are usually strengthened with the diagonal stiffeners of tubular cross...
-
HYBRID REDUCED MODEL OF ROTOR
PublicationIn the paper, the authors describe the method of model reduction of a rotor system. The proposed approach enables to obtain a low order model including e.g. nonproportional damping or the gyroscopic effect. This method is illustrated using the example of a rotor system. First, a model of the system was built without gyroscopic and damping effects by using the rigid finite element method. Next, this model was reduced. Finally, two...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublicationThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Scanning electron microscopy studies of the weld decay on SS 304 of water supply pipeline
Open Research DataThis dataset contains micrographs made with scanning electron microscope (SEM) Hitachi S-3400N, of the weld decay for water supply system pipelines made of AISI 304 stainless steel. Within the dataset one can see the different corrosion mechanisms. The micrographs were made after the Strauss test (excluding pictures labeled as pits_in_HAZ, done without...
-
Badanie dynamiki platform pływających morskich turbin wiatrowych z zastosowaniem metod numerycznej mechaniki płynów
PublicationPraca dotyczy badania ruchu platform pływających pod morskie turbiny wiatrowe. Przedstawiono w niej główne metody obliczeń i przedyskutowano ich zastosowanie. Na przykładzie koncepcji konstrukcji 3-kolumnowej platformy typu Spar przedstawiono metodykę wykonywania obliczeń z zastosowaniem programu AQWA opartego na metodzie dyfrakcyjnej, rozszerzonego o współczynniki wynikające z lepkości wyznaczone za pomocą obliczeń RANSE-CFD....
-
MIC/MBC values of the investigated extracts of propolis. Interactions of selected extracts with azoles and echinocandins.
Open Research DataThis dataset contains results of our investigation aiming in determination of antimicrobial potential of the propolis extracts produced in our laboratory. The propolis samples were delivered by Polish beekeepers. Moreover in this dataset we presented results of our investigation aiming in assessment of interaction of the selected extracts of propolis...
-
Możliwości zamiany elektrycznych przepływomierzy powietrza stosowanych w silnikach spalinowych samochodów
PublicationW artykule przedstawiono podstawowe typy przepływomierzy powietrza, stosowane w silnikach spalinowych samochodów: z klapąspiętrzającą, HLM, HFM, Vortex i MAP. Przedstawiono wyniki badania tych przepływomierzy na specjalnie przygotowanym stanowisku pomiarowym. Przeanalizowano możliwość ich zamiany i zweryfikowano taką możliwość w praktyce.
-
Music Information Retrieval – Soft Computing versus Statistics . Wyszukiwanie informacji muzycznej - algorytmy uczące versus metody statystyczne
PublicationMusic Information Retrieval (MIR) is an interdisciplinary research area that covers automated extraction of information from audio signals, music databases and services enabling the indexed information searching. In the early stages the primary focus of MIR was on music information through Query-by-Humming (QBH) applications, i.e. on identifying a piece of music by singing (singing/whistling), while more advanced implementations...
-
The effectiveness of polymer adhesive in reduction of vibrations of structural members
PublicationIn this paper, the idea of using polymer adhesive as a damping layer is proposed. An experimental study of two aluminium cantilevered beams has been conducted. One of them presents a plain cantilevered beam, while the second one considers two aluminium beams bonded with a polymer adhesive of different thickness (0,5; 1,2; 1,75; 3,1 and 5 mm). The polymer adhesive considered in the study is a specially designed flexible...
-
Hybrid model of geared rotor system
PublicationIn the paper a hybrid model of a geared multirotor system has been developed. The model is obtained by application of both the modal decomposition methodology and the spatial discretization method. Reduced modal model was constructed for the system without gyroscopic and damping effects. The gyroscopic interaction, damping and other phenomena which are difficult to include in the modal approach were modeled by application of simply...
-
Experimental and numerical analysis of an aluminum cantilevered beam with polymer adhesive
PublicationIn this paper, experimental and numerical investigation on a composite cantilevered aluminum beam has been conducted. The subject of the study consists of two plain aluminum elements bonded with polymer adhesive of different thickness. It has been proven in the previous study that this kind of material has high damping properties. During an experimental investigation, value of damping ratios have been obtained. The aim of a numerical...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Representativity of ISO test track surface based on controlled pass-by measurements
PublicationWithin the Polish-Norwegian research project ELANORE, a limited Round Robin Test has been performed on four ISO tracks in Northern Europe. The basic objective of the project is to improve the EU directive on labelling of tyres for noise and rolling resistance. This directive is based on the measurement procedures proscribed in the UNECE Reg.117. Measurements on 3 ISO tracks were performed in 2021 and presented at InterNoise 2022....
-
Enhancing the Seismic Resistance of Columns by GFRP Confinement Using Flexible Adhesive-Experimental Study
PublicationIn this paper, the results of two experiments, focused on testing the effectiveness of a method of enhancing the seismic (dynamic) resistance of masonry columns with the use of flexible polymer adhesive, are shown. The first experiment was devoted to investigate the damping properties of a polymer working between two stiff layers, whereas the aim of the second one was to verify if the identified damping properties of the polymer...
-
Jaising Toppo PhD (Pursuing)
People -
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover it shows how this kind of system can be taught during subsequent games with a large number of players.
-
From Regenerative Buildings to Regenerative Urban Projects: Design frameworks to scale up within the area of regenerative practice
PublicationIn this chapter, a discussion will be presented of design frameworks and assessment tools that are useful for boosting the scale jumping of regenerative design practices and the paradigm shift. Our main objectives will be to identify existing design and assessment frameworks, to describe the way they work and how they can contribute to scale-jumping regenerative design, as well as to identify shortcomings and opportunities. We...