Filters
total: 5633
-
Catalog
- Publications 3859 available results
- Journals 70 available results
- Conferences 5 available results
- Publishing Houses 2 available results
- People 93 available results
- Projects 8 available results
- e-Learning Courses 177 available results
- Events 4 available results
- Open Research Data 1415 available results
displaying 1000 best results Help
Search results for: FINGER-PRINT ANTI-SPOOF ATTACKS
-
ANTI-CORROSION METHODS AND MATERIALS
Journals -
A Finer Point on Vision
PublicationAs an IES Member, I look forward to each issue of LD+A and read them with great interest as they are often very informative. To my surprise, the Research article (May 2019, p. 76) has an error which should be corrected.
-
Spool
Journals -
Print Quarterly
Journals -
Script and Print
Journals -
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Service restoration in survivable networks under attacks
PublicationW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublicationAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
Influence of Asphalt Binder on the Compactability of Asphalt Mixtures Using Locking Point
PublicationCompaction is an important process for the asphalt mixture service life. A properly compacted mixture is crucial for long-lasting pavement. The objective of this study was to evaluate the influence of asphalt binders on the compactability of the asphalt mixtures by utilizing the concept of the locking point. To achieve this objective, two compaction methods (impact and gyration), different temperatures and asphalt content, and...
-
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
PublicationPresentation Attack Detection (PAD) is crucial in biometric finger vein recognition. The susceptibility of these systems to forged finger vein images is a significant challenge. Existing approaches to mitigate presentation attacks have computational complexity limitations and limited data availability. This study proposed a novel method for identifying presentation attacks in finger vein biometric systems. We have used optimal...
-
Anti-Microbiological, Anti-Hyperglycemic and Anti-Obesity Potency of Natural Antioxidants in Fruit Fractions of Saskatoon Berry
Publication -
Journal of Fixed Point Theory and Applications
Journals -
Reliable Anycast and Unicast Routing: Protection against Attacks
PublicationObecne sieci są przeważnie chronione przed awariami losowymi, a topologie sieci są w większości uznawane za regularne. Znane mechanizmy ochrony dotyczą typowo transmisji unicast (jeden-do-jednego). Jednakże w związku z obserwowaną konwergencją technologii/usług, inne odmiany transmisji (np. anycast - jeden-do-jednego-z-wielu) nabierają znaczenia. Co więcej, okazuje się, iż często awarie nie mają losowego charakteru, a topologie...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Service restoration in survivable networks under malicious attacks
PublicationW artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Survivability of unicast and anycast flows under attacks on networks
PublicationW artykule zaproponowano nowy algorytm zwany RA zapewniania ochrony transmisji anycast przed atakami na sieci o topologii nieregularnej. Założono wykorzystanie pojedynczej ścieżki podstawowej chroniącej połączenie przed awarią pojedynczego węzła sieci. Serwery: podstawowy i zabezpieczający każdej transmisji anycast rozlokowano w odrębnych węzłach sieci. Zaproponowano: specjalną metrykę kosztu łączy służącą do wyznaczania ścieżek...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Anti-Inflammatory and Anti-Allergy Agents in Medicinal Chemistry
Journals -
Anti-Trafficking Review
Journals -
Anti-Tumor Pharmacy
Journals -
Anti-Infective Agents
Journals -
POINT VETERINAIRE
Journals -
Point of Care
Journals -
Inti
Journals -
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
A station strategy to deter backoff attacks in IEEE 802.11 LANs
PublicationDla konstrukcji strategii zapobiegającej atakom na mechanizm odczekania w sieciach lokalnych IEEE 802.11 zastosowano wybór konfiguracji MAC sterowany przez liczniki etapów gry z losowymi wartościami początkowymi. Wykazano, że przy pewnych warunkach nałożonych na rozkady prawdopodobieństwa liczników standardowe ustawienia parametrów MAC stają się punktem doskonałej równowagi strategicznej.
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Potential of ASH technology for protection against chemical and biological attacks
PublicationTechnologia wykorzystująca reaktor cyklonowy dzięki dużej wydajności posiada szczególne predyspozycje do usuwania lub niszczenia składników broni chemicznej i biologicznej ze strumieni gazów o dużym natężeniu przepływu, pochodzących z systemów ogrzewania, wentylacji i klimatyzacji, bez powodowania znacznych spadków ciśnienia. Reaktor cyklonowy posiada znaczne mniejsze rozmiary, około 10% objętości tradycyjnych systemów oczyszczania...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
NASN school nurse (Print)
Journals -
Postquarter-Point Case of Ship’s Side-Berthing and Its Influence on Marine Fender Pitch
PublicationThis paper presents a critical analysis of some selected codes and practical recommendations used as basic rules in the design procedures of modern marine fender systems. The first part of the discussion pertains to the existing equations used in calculating the eccentricity coefficient in the ship’s kinetic energy equation and the maximum allowable fender pitch (spacing) in a set of fenders installed along a quay wall. A new approach...
-
Multilevel inverter neutral-point voltage sensor diagnostic based on the Extended Kalman Filter
PublicationA new algorithm for neutral point voltage imbalance estimation in DC link of the three-level (3L) neutral point clamped (NPC) voltage source inverter (VSI) is proposed. Application of the proposed algorithm does not require any additional sensors. The unbalanced voltage calculation is based on the information derived from the inverter output measured currents and from the knowledge of the load model parameters. In order to estimate...
-
Mineral Profile, Antioxidant, Anti-Inflammatory, Antibacterial, Anti-Urease and Anti-α-Amylase Activities of the Unripe Fruit Extracts of Pistacia atlantica
Publication -
Chronic treatment with zinc hydroaspartate induces anti-inflammatory and anti-ulcerogenic activity in rats
Publication -
Tackling Alzheimer's disease: Hypothetical synergism between anti-inflammatory and anti-diabetic agents
Publication -
In vivo anti-inflammatory and anti-allergic activities of cynaroside evaluated by using hydrogel formulations
Publication -
Multivariate models of inter-resonator couplings for microwave filter synthesis
PublicationArtykuł przedstawia technikę budowy modeli częstotliwości rezonansowej, współczynnika sprzężenia między rezonatorami oraz sprzężenia ze źródłem/obciążeniem. Przedstawiony jest model siedmiu zmiennych uwzglęgniający topologię rezonatorów. Na podstawie modelu wykonana została synteza filtrów mikrofalowych.
-
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublicationIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Publication -
Network Protection Against Node Attacks Based on Probabilistic Availability Measures
Publication -
CSMA/CA performance under backoff attacks: a game-theoretic context.
PublicationW pracy zaproponowano markowowski model analityczny dostosowany do techniki Monte Carlo dla oceny proporcji rozdziału pasma sieci bezprzewodowej w obecności stacji z egoistyczną konfiguracją mechanizmu CSMA/CA. Udziały pasma poszczególnych stacji traktowane są jako wypłaty w grze niekooperacyjnej. Przedyskutowano własności takiej gry w zależności od wymagań stacji na jakość usług sieci (minimalne akceptowane udziały pasma). Zwrócono...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Anti-Inflammatory Therapy of Infections
Publication -
The Motion Analysis of Attacus Atlas Rigid Wing
PublicationThe remarkable aerodynamic efficiency of flapping insect wings has fascinated researchers for many years. Butterfly wings are distinguished by a much larger lifting surface, and thus, a different style of flapping flight. The considerations described in the article are an introduction to a fully flexible analysis of the wing in motion. The study of the rigid wing gives the basic knowledge necessary in the further process. The yaw,...
-
ANTI-CANCER DRUGS
Journals