Search results for: ATTACK SCENARIO - Bridge of Knowledge

Search

Search results for: ATTACK SCENARIO

Search results for: ATTACK SCENARIO

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Depolarisation Model for a BAN Indoor Scenario

    Publication
    • M. M. Ferreira
    • F. D. Cardoso
    • S. J. Ambroziak
    • M. Särestöniemi
    • K. Turbic
    • L. M. Correia

    - Year 2023

    In this paper, an analysis of depolarisation in Body Area Networks for Body-to-Infrastructure communications based on a measurement campaign in the 5.8 GHz band in an indoor environment is performed. Measurements were made with an offbody antenna transmitting linearly polarised signals and dualpolarised receiving antennas carried by the user on the body. A Normal Distribution with a mean of 2.0 dB and a standard deviation of 4.3...

    Full text available to download

  • Modeling of event trees for the rapid scenario development

    Publication

    - Year 2015

    The paper concerns the safety of ships in abnormal/damage conditions. Some conclusions following from the research associated with development of a method for safety assessment of ships in abnormal/damage conditions is presented in the paper. The method called SSAMADC (Ship Safety Assessment Method in Abnormal/Damage Conditions) is a risk-based method and is connected with application of the quantitative risk assessment QRA approach....

  • Scenario-planning solutions for waterfront flood-prone areas

    The aim of this article is to discuss the potential of applying scenario planning to achieve resilient and future-oriented solutions for flood-prone areas. The authors have proposed additions to scenario-planning processes based on the introduction of research-by-design architectural inquiries. Examined in this article is the insight into the testing of such a modified scenario-planning methodology during two courses that accompanied...

    Full text available to download

  • Adversarial attack algorithm for traffic sign recognition

    Publication

    - MULTIMEDIA TOOLS AND APPLICATIONS - Year 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Full text to download in external service

  • Dynamic Analysis of Enterprise Business Scenarios

    Publication

    - Year 2011

    W artykule przedstawiono system wspomagający projektowanie i poprawęscenariuszy procesów biznesowych. Scenariusze są wykonywane oraz monitorowane w środowisku SOA. Zaproponowany system oferuje dynamiczne gromadzenie i ocenianie metryk scenariuszy. Na podstawie wyników analizy wydajność, jakość oraz użyteczność scenariuszy są ulepszane. Dzięki elastycznemu API, system obsługuje dowolną rozszerzalną technologię wykonania scenariuszy...

  • Lightweight structures in architecture: scenarios for the future

    Publication

    - Year 2016

    Lightweight structures - structures with a reduced weight, which otherwise retain the qualities necessary for the building performance, ensuring a proper durability and strength, safety, indoor environmental quality and energy efficiency; stuctures which strive for the optimization of structural systems - are in tune with current trends and socio-economic, environmental and technological factors. The growing interest in the lightweight...

  • Human reliability analysis in the context of accident scenarios

    Publication

    Artykuł przedstawia problematykę analizy niezawodności człowieka (HRA) w kontekście zidentyfikowanych scenariuszy awaryjnych. Podkreślono potrzebę kontekstowej analizy postępowania człowieka-operatora ze szczególnym uwzględnieniem błędów i uszkodzeń zależnych w rozważanych scenariuszach awaryjnych. Analizę bezpieczeństwa funkcjonalnego z uwzględnieniem oceny niezawodności człowieka zilustrowano na przykładzie warstw zabezpieczeń...

    Full text available to download

  • Scenarios in regional planning – theory and practice in Poland

    Abstract. It is important to recognise future conditions in planning because it primes future actions. Scenarios are useful prognostic tools, especially when the social and institutional behaviour plays a crucial role. The aims of the paper are: (1) to indicate the roles and the place of scenarios in the strategic plan building process; (2) to analyse and evaluate the application of scenarios in regional planning in Poland; (3)...

    Full text available to download

  • Scenarios in the development strategies of larger cities in Poland

    Summary: Planning prepares decisions and future actions. Therefore, future conditions should be considered in planning, in particular strategic planning, due to its long-term nature. To accomplish this, certain prognostic methods should be applied. A scenario method is seen as one of the most useful prognostic method, especially in cases when social and institutional behaviour plays a crucial role. The aim of the paper is an analysis...

    Full text available to download

  • Towards Resource Theory of Coherence in Distributed Scenarios

    Publication

    - Physical Review X - Year 2017

    The search for a simple description of fundamental physical processes is an important part of quantum theory. One example for such an abstraction can be found in the distance lab paradigm: if two separated parties are connected via a classical channel, it is notoriously difficult to characterize all possible operations these parties can perform. This class of operations is widely known as local operations and classical communication....

    Full text available to download

  • An Improved Convolutional Neural Network for Steganalysis in the Scenario of Reuse of the Stego-Key

    Publication

    - Year 2019

    The topic of this paper is the use of deep learning techniques, more specifically convolutional neural networks, for steganalysis of digital images. The steganalysis scenario of the repeated use of the stego-key is considered. Firstly, a study of the influence of the depth and width of the convolution layers on the effectiveness of classification was conducted. Next, a study on the influence of depth and width of fully connected...

    Full text to download in external service

  • A game-theoretic study of CSMA/CA under a backoff attack

    Analizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...

  • Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack

    Publication

    - Year 2005

    Przedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.

  • Performance of an ad-hoc 802.11 LAN under a backoff attack

    Publication

    - Year 2005

    Samowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...

  • Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features

    Publication

    - Year 2017

    Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...

    Full text to download in external service

  • Assessment of Adjustment of GNSS Railway Measurements with Parameter-Binding Conditions in a Stationary Scenario

    Publication

    - Applied Sciences-Basel - Year 2022

    The study aims to assess the applicability of the ordinary least squares method, robust estimation, and conditions-binded adjustment in processing the six synchronous coordinate pairs of global navigation satellite system (GNSS) receivers. The research is part of the research project InnoSatTrack, focused on the enhancement of the determination of geometrical parameters of railway tracks using GNSS, inertial, and other sensors....

    Full text available to download

  • Assessment of Adjustment of GNSS Railway Measurements with Parameter-Binding Conditions in a Stationary Scenario

    Publication

    Full text to download in external service

  • iGEL vs laryngeal tube for airway management during a normal airway scenario

    Publication

    Full text to download in external service

  • Manufacturing Data Analysis in Internet of Things/Internet of Data (IoT/IoD) Scenario

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2018

    Computer integrated manufacturing (CIM) has enormous benefits as it increases the rate of production, reduces errors and production waste, and streamlines manufacturing sub-systems. However, there are some new challenges related to CIM operating in the Internet of Things/Internet of Data (IoT/IoD) scenarios associated with Industry 4.0 and cyber-physical systems. The main challenge is to deal with the massive volume of data flowing...

    Full text available to download

  • Exposure scenario and risk assessment of infants and newborns to bisphenols and their derivatives from diapers

    Newborns and infants are more sensitive to harmful compounds such as bisphenols and their derivatives because of their not fully developed detoxification mechanism. Exposure to these substances can lead to developmental problems and health consequences in adulthood. Since disposable baby diapers are used from the first days of life and remain in contact with the baby skin, it seems important to monitor the levels of endocrine disrupting chemicals...

    Full text available to download

  • SMART SHOP SERVICES FOR BUILDING CUSTOMER-ORIENTED SCENARIOS

    Publication

    The shops of today mostly support the customer by offering him or her products based on basic relationships between products viewed or ordered by users with similar tastes. This common approach may fail in many cases especially when the user does not have sufficient knowledge about the market, or when he or she wants to build a set of products in more than one shop. New categories of smart shop services are proposed in order to...

    Full text available to download

  • Jamming and jamming mitigation for selected 5G military scenarios

    Publication
    • P. Skokowski
    • J. M. Kelner
    • K. Malon
    • K. Maślanka
    • A. Birutis
    • M. A. Vazquez
    • S. Saha
    • W. Low
    • A. Czapiewska
    • J. Magiera... and 2 others

    - Procedia Computer Science - Year 2022

    This paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....

    Full text available to download

  • Mashup Approaches for Improving Service Oriented Business Scenarios

    Publication

    Two kinds of business scenarios are considered: application- and service-oriented. It is shown that the former are more flexible and easier reconfigurable for both traditional (human-oriented) and IT services. Moreover, complex IT services can be created by simple IT services using the modern mashup technology. It is the reason why such business scenarios can be modeled by BPMN in much easier ways. A simple example of a supply...

    Full text available to download

  • Using UML/WS-CDL for modelling negotiation scenarios

    Publication

    W celu usprawnienia realizacji przedsięwzięć ludzkich w Internecie potrzebne jest zdefiniowanie reguł i procedur komunikacji pomiędzy uczestnikami. Scenariusze przedsięwzięć mogą być wyrażane w językach opisu choreografii. Artykuł prezentuje metodologię tworzenia scenariuszy w języku WS-CDL oraz wyniki eksperymentów polegających na przeprowadzeniu negocjacji w Internecie z wykorzystaniem różnych scenariuszy negocjacyjnych.

  • Overview of the Virtual Transcription Laboratory Usage Scenarios and Architecture

    Publication

    - Year 2014

    Full text to download in external service

  • Abandoned luggage detection - scenarios at Poznan-Lawica airport

    Publication

    - Year 2009

  • SERVICE ORIENTED SCENARIOS FOR SUPPORT ENTERPRISE PROJECT MANAGEMENT

    Publication

    In the paper, a service oriented architecture is used to describe various scenarios of human-oriented enterprises. They can be modeled by BPMN to show basic information flow. We consider business scenarios to present another modeling solution called service orchestration or service mashup. That approach gives an opportunity for the right management through taking the best possible choice of services, or composition of services....

    Full text to download in external service

  • Application of Smart IoT Technology in Project Management Scenarios

    Publication
    • K. Rasheed
    • S. Ammad
    • A. Y. Said
    • M. Balbehaith
    • V. K. Oad
    • A. Khan

    - Year 2023

    The report presents a low-cost and flexible solution to control and monitor home and industrial appliances. The popularity of automation devices has increased greatly in recent years due to higher affordability and simplicity through IoT phone and tablet connectivity. For this purpose, we have developed the IoT Outlet: a stand-alone communication unit, used to connect outlets to the internet. The IoT Plug is a power switch which...

    Full text to download in external service

  • Beam-based scenario for Am242m isomer depletion via nuclear excitation by electron capture

    Publication
    • J. Rzadkiewicz
    • M. Polasik
    • K. Słabkowska
    • Ł. Syrocki
    • E. Wȩder
    • J. Carroll
    • C. Chiara
    • Ł. Syrocki

    - PHYSICAL REVIEW C - Year 2019

    Full text to download in external service

  • Fundamental Schemes to Determine Disjoint Paths for Multiple Failure Scenarios

    Publication
    • T. Gomes
    • L. Jorge
    • R. Girão-Silva
    • J. Yallouz
    • P. Babarczi
    • J. Rak

    - Year 2020

    Disjoint path routing approaches can be used to cope with multiple failure scenarios. This can be achieved using a set of k (k> 2) link- (or node-) disjoint path pairs (in single-cost and multi-cost networks). Alternatively, if Shared Risk Link Groups (SRLGs) information is available, the calculation of an SRLG-disjoint path pair (or of a set of such paths) can protect a connection against the joint failure of the set of links...

    Full text to download in external service

  • Mobility’s Influence on System Loss in Off-Body BAN Scenarios

    Publication

    - Year 2022

    In this paper, a measurement campaign for off body communications in an indoor environment is investigated for a set of on-body antennas. The channel impulse response was measured with the user approaching and departing from an off-body fixed antenna using two user dynamics, standing at fixed positions and walking. The processing of the measurement data allowed to evaluate system loss statistics. Different antenna configurations...

    Full text to download in external service

  • Methodology of Conformity Testing of VoIP Connections Scenarios for SIP Protocol

    Conformity and conformity testing have always had a crucial role in telecommunications. These issues are especially important in VoIP technology with SIP protocol as there are many hardware, software and service implementations. In this paper a methodology of automatic conformity testing of VoIP connections scenarios applying to any IP network is proposed. Example implementation of the methodology as Linux shell scripts is presented....

  • Radio Channel Measurements in Body-to-Body Communications in Different Scenarios

    Publication

    - Year 2016

    This paper presents body-to-body radio channel measurements at the 2.45 GHz band, for different body motion scenarios and on-body antenna placements, and both indoor and outdoor environments. Measurement equipment, investigated scenarios and considered environments are described, an initial analysis of results being presented. The mean path loss and the standard deviation depend on the mutual location of transmitting and receiving...

  • Radio Channel Measurements in Body-to-Body Communications in Different Scenarios

    Publication

    - Year 2016

    This paper presents body-to-body radio channel measurements at the 2.45 GHz band, for different body motion scenarios and on-body antenna placements, and both indoor and outdoor environments. Measurement equipment, investigated scenarios and considered environments are described, an initial analysis of results being presented. The mean path loss and the standard deviation depend on the mutual location of transmitting and receiving...

  • Necessary and Sufficient Condition for State-Independent Contextual Measurement Scenarios

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    The problem of identifying measurement scenarios capable of revealing state-independent contextuality in a given Hilbert space dimension is considered. We begin by showing that for any given dimension d and any measurement scenario consisting of projective measurements, (i) the measure of contextuality of a quantum state is entirely determined by its spectrum, so that pure and maximally mixed states represent the two extremes...

    Full text to download in external service

  • An Experimental Study of Scenarios for the Agent-Based RBF Network Design

    Publication

    - Year 2015

    Full text to download in external service

  • System Loss Model for Body Area Networks in Room Scenarios

    Publication
    • M. M. Ferreira
    • F. D. Cardoso
    • S. J. Ambroziak
    • M. Särestöniemi
    • L. M. Correia

    - Year 2023

    This paper presents an analysis of system loss in Body Area Networks for room scenarios, based on a wideband measurement campaign at 5.8 GHz. The measurements were performed with a fixed antenna transmitting vertically and horizontally polarised signals, while the user wears dualpolarised antennas. The average system losses in co- and crosspolarised channels are 41.4 and 42.6 dB for vertically polarised transmitted signals and...

    Full text to download in external service

  • A random access protocol under backoff attack: performance and game-theoretic deterrent

    Publication

    - Year 2005

    Przedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Service restoration in survivable networks under attacks

    Publication

    W artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publication

    - IEEE COMMUNICATIONS MAGAZINE - Year 2018

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Full text available to download

  • The estimation of regional oil recovery capacity based on marine oil spill response scenario in Vietnam

    Publication
    • P. Hung
    • K. Kim

    - Journal of International Maritime Safety, Environmental Affairs, and Shipping - Year 2019

    Full text to download in external service

  • A Fuzzy Event Tree Model for Accident Scenario Analysis of Ship Stuck in Ice in Arctic Waters

    Publication

    - Year 2016

    Full text to download in external service

  • User Mobility’s Influence on System Loss in Off-Body BAN Scenarios

    Publication

    - Year 2022

    In this paper, a measurement campaign for off-body communications in an indoor environment is investigated for a set of on-body antennas. The channel impulse response was measured with the user approaching and departing from an off-body fixed antenna using two user dynamics: standing at fixed positions and walking. The processing of the measurement data allowed to evaluate system loss statistics. Different antenna configurations...

    Full text to download in external service

  • Quantum-correlation breaking channels, broadcasting scenarios, and finite Markov chains

    Publication

    - PHYSICAL REVIEW A - Year 2012

    One of the classical results concerning quantum channels is the characterization of entanglementbreakingchannels [M. Horodecki et al., Rev. Math. Phys 15, 629 (2003)]. We address the questionwhether there exists a similar characterization on the level of quantum correlations which may gobeyond entanglement. The answer is fully affirmative in the case of breaking quantum correlationsdown to the, so called, QC (Quantum-Classical)...

    Full text available to download

  • MARKAL long-term power generation scenarios for Poland - Concept of the model

    Publication

    In this paper we have presented the concept of Polish MARKAL optimization model developed for the needs of power generation scenarios in long-term perspective i.e. by 2040. The depiction of Polish MARKAL with Reference Energy System structure was provided. In addition, basic model assumptions, energy technology database, projections of electricity demand and power plant ageing pathways were presented. Our goal is to test MARKAL...

    Full text to download in external service

  • Scenarios of mercury emission to air, water and soil in Poland to year 2020

  • Sustainable Development of Water Housing Using the Example of Poland: An Analysis of Scenarios

    At the turn of the 20th and 21st centuries, Polish cities began the process of returning to live by water. There is a growing interest in water reservoirs not only as places for recreation, but also as new areas suitable for living, at the very center of the city. Unfortunately, due to the lack of appropriate legal regulations, the dynamic development of floating homes (FHs) is starting to raise increasing concerns in Poland. Regardless...

    Full text available to download

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publication
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Year 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Full text available to download