Filters
total: 3166
-
Catalog
- Publications 2214 available results
- Journals 157 available results
- Conferences 90 available results
- Publishing Houses 5 available results
- People 95 available results
- Projects 24 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 310 available results
- Events 19 available results
- Open Research Data 250 available results
displaying 1000 best results Help
Search results for: IOT SECURITY
-
EVALUATION OF THE USE OF M2M-TYPE NB-IoT AND LTE TECHNOLOGIES FOR MARITIME COMMUNICATION SYSTEMS
PublicationThe development of IoT (the Internet of Things) wireless transmission opens a new era in communication systems. In the next years, the development and implementation of IoT systems will be very dynamic. It can be seen that the solutions of LTE – NB-IoT (Long Term Evolution – Narrowband IoT) transmission devices are implemented in a wide range of terrestrial solutions, e.g. smart grids. This paper aims to analyse the possibility...
-
Compact 4 × 4 butler matrix with non‐standard phase differences for IoT applications
PublicationButler matrices represent a popular class of feeding networks for antenna arrays. Large dimensions and the lack of flexibility in terms of achievable output phase difference make conventional Butler structures of limited use for modern communication devices. In this work, a compact planar 4 × 4 matrix with non-standard relative phase shifts of –30º, 150º, –120º, and 60º has been proposed. The structure is designed to operate at...
-
RECHERCHE TRANSPORTS SECURITE
Journals -
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublicationW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublicationThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublicationExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publication -
Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic
Publication -
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublicationW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Securitas Imperii
Journals -
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublicationIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
Open extensive IoT research and measurement infrastructure for remote collection and automatic analysis of environmental data.
PublicationInternet of Things devices that send small amounts of data do not need high bit rates as it is the range that is more crucial for them. The use of popular, unlicensed 2.4 GHz and 5 GHz bands is fairly legally enforced (transmission power above power limits cannot be increased). In addition, waves of this length are very diffiult to propagate under field conditions (e.g. in urban areas). The market response to these needs are the...
-
Adaptive Positioning Systems Based on Multiple Wireless Interfaces for Industrial IoT in Harsh Manufacturing Environments
PublicationAs the industrial sector is becoming ever more flexible in order to improve productivity, legacy interfaces for industrial applications must evolve to enhance efficiency and must adapt to achieve higher elasticity and reliability in harsh manufacturing environments. The localization of machines, sensors and workers inside the industrial premises is one of such interfaces used by many applications. Current localization-based systems...
-
The Effects of Roadside Hazards on Road Accident Severity
PublicationThe risk of becoming involved in an accident emerges when elements of the transport system do not operate properly (man – vehicle – road – roadside). The road, its traffic layout andsafety equipment have a critical impact on road user safety. This gives infrastructural work a priority in road safety strategies and programmes. Run-off-road accidents continue to be one of the biggest problems of road safety with consequences including...
-
Indicator Analysis of Security Risk for Electronic Systems Used to Protect Field Command Posts of Army Groupings
Publication -
Issues Related to Power Supply Reliability in Integrated Electronic Security Systems Operated in Buildings and Vast Areas
Publication -
Shock a disposable time in electronic security systems / Porażenie a czas dyspozycyjny w elektronicznych systemach bezpieczeństwa
Publication -
Determination of cyanide ion in urine samples using ion chromatography with pulsed amperometric detection.
PublicationCyanides are widely applied in industrial activity, including gold and silver mining and the production of organic chemicals. HCN is also formed directly from fossil fuel combustion sources from gasoline and diesel vehicles. In natural environment, in plants seeds for example an apple seed, it exists as a cyanogenic glycosides. The amount of cyanide ions originating from food products is however rather small. Larger concentrations...
-
Studies on 16-membered azothia-and azoxythiacrown ethers as ion carriers in ion selective membranes.
Publication16-członowe azo iazoksy korony zawierające w makropierścieniu atomy siarki były badane jako nośniki jonów w jonoselektywnych elektrodach membranowych. Związki te badane były pod kątem kompleksowania metali I i II grupy układu okresowego oraz metali ciężkich i przejściowych. Wyznaczone zostały stałe trwałości kompleksów azokoron z wybranymi kationami za pomocą metody sandwiczowej. W wyniku badań potwierdzono tworzenie się silnych...
-
Optimization of the Hardware Layer for IoT Systems using a Trust Region Method with Adaptive Forward Finite Differences
PublicationTrust-region (TR) algorithms represent a popular class of local optimization methods. Owing to straightforward setup and low computational cost, TR routines based on linear models determined using forward finite differences (FD) are often utilized for performance tuning of microwave and antenna components incorporated within the Internet of Things systems. Despite usefulness for design of complex structures, performance of TR methods...
-
The Influence of the Radio Channel on Precision of Position Estimation of the User Terminal Using the NB-IoT Radio Interface
PublicationIn the article the method of user terminal position estimation using the broadcast signals transmitted in the downlink of the NB-IoT interface was presented, including the analysis of the radio channel influence on precision of position estimation as well as the eNodeB (Evolved Node B) synchronization. The practical ability to estimate the position in the test area has been verified in the laboratory conditions, using the reference...
-
A Novel IoT-Perceptive Human Activity Recognition (HAR) Approach Using Multi-Head Convolutional Attention
PublicationTogether with fast advancement of the Internet of Things (IoT), smart healthcare applications and systems are equipped with increasingly more wearable sensors and mobile devices. These sensors are used not only to collect data, but also, and more importantly, to assist in daily activity tracking and analyzing of their users. Various human activity recognition (HAR) approaches are used to enhance such tracking. Most of the existing...
-
Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas
PublicationIndustrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...
-
Journal of Security and Sustainability Issues
Journals -
Journal of Asian Security and International Affairs
Journals -
International Journal of Security and Its Applications
Journals -
Security Dimensions: International & National Studies
Journals -
Journal of Digital Forensics Security and Law
Journals -
Security Dimensions and Socio-Legal Studies
Journals -
International Journal of Information Security and Privacy
Journals -
International Journal of Information and Computer Security
Journals -
Stability-International Journal of Security and Development
Journals -
Policija i Sigurnost-Police and Security
Journals -
IEEE Transactions on Information Forensics and Security
Journals -
Journal of Internet Services and Information Security
Journals -
ACM Transactions on Information and System Security
Journals -
International Journal of Computer Science and Security
Journals -
Public administration and state security aspects
Journals -
Journal of Homeland Security and Emergency Management
Journals -
Chinese Journal of Network and Information Security
Journals -
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Zagrożenia starych budynków w sąsiedztwie nowej zabudowy = The threat of old buildings security in neighbourhood of new buildings
PublicationNa przykładzie jednego z budynków mieszkalnych, przedstawiono zagrożenia na jakie są narażone stare obiekty w zwartej zabudowie śródmiejskiej, podczas prowadzenia w ich sąsiedztwie prac budowlanych, którym często towarzyszą głębokie wykopy. Powoduje to powstawanie licznych uszkodzeń, uniemozliwiających ich prawidłową eksploatację lub stanowiących nawet zagrożenie bezpieczeństwa.
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublicationThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublicationIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
A graphene-based nanostructure with expanded ion transport channels for high rate Li-ion batteries
Publication -
IET Systems Biology
Journals -
IET Power Electronics
Journals -
IET Signal Processing
Journals