Nie znaleźliśmy wyników w zadanych kryteriach!
Ale mamy wyniki w innych katalogach.Filtry
wszystkich: 10724
-
Katalog
- Publikacje 7119 wyników po odfiltrowaniu
- Czasopisma 350 wyników po odfiltrowaniu
- Konferencje 110 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 179 wyników po odfiltrowaniu
- Wynalazki 23 wyników po odfiltrowaniu
- Projekty 58 wyników po odfiltrowaniu
- Laboratoria 3 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 7 wyników po odfiltrowaniu
- Kursy Online 190 wyników po odfiltrowaniu
- Wydarzenia 13 wyników po odfiltrowaniu
- Dane Badawcze 2670 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: COMMUNICATION SYSTEM SECURITY
-
Security and Communication Networks
Czasopisma -
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Overview of current communication systems for security forces. Features, limitations and potential solutions
Publikacja -
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
ACM Transactions on Information and System Security
Czasopisma -
A heterogenous wireless system for maritime communication - the netBaltic system architecture
PublikacjaIn the article, the concept of a heterogeneous wireless maritime mesh network offering transmission for e.g., e-navigation services is presented. The constrains of existing and competitive solutions are discussed showing the need for a new system. The authors present detailed information about a netBaltic node's architecture and networking mechanisms offering different transmission capabilities and proposed for use on different...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Reliable underwater communication system for shallow coastal waters
PublikacjaThis paper presents a reliable and robust low data rate spread spectrum approach which is implemented in the acoustic underwater communication system for shallow coastal waters. It shows operation assumptions of spread spectrum techniques based on the wellknown Shannon equation. It describes two methods of spread spectrum: frequency hopping spread spectrum and direct sequence spread spectrum; their block diagram and their characteristics...
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Analytical method of modelling the geometric system of communication route
PublikacjaThe paper presents a new analytical approach to modelling the curvature of a communication route by making use of differential equations. The method makes it possible to identify both linear and nonlinear curvature. It enables us to join curves of the same or opposite signs of curvature. Solutions of problems for linear change of curvature and selected variants of nonlinear curvature in polynomial and trigonometric form were analyzed....