Wyniki wyszukiwania dla: node-targeted attacks - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: node-targeted attacks

Filtry

wszystkich: 1880
wybranych: 385

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: node-targeted attacks

  • MAlSim - Mobile Agent Malware Simulator

    Publikacja

    - Rok 2008

    One of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...

  • Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast

    Recent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...

    Pełny tekst do pobrania w portalu

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Time versus space trade-offs for randezvous in trees

    Publikacja

    - DISTRIBUTED COMPUTING - Rok 2014

    Two identical (anonymous) mobile agents start from arbitrary nodes of an unknown tree and have to meet at some node. Agents move in synchronous rounds: in each round an agent can either stay at the current node or move to one of its neighbors. We consider deterministic algorithms for this rendezvous task. The main result of this paper is a tight trade-off between the optimal time of completing rendezvous and the size of memory...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain

    Publikacja

    The main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...

  • Synthesis of green benzamide-decorated UiO-66-NH2 for biomedical applications

    Publikacja
    • N. Rabiee
    • A. M. Ghadiri
    • V. Alinezhad
    • A. Sedaghat
    • S. Ahmadi
    • Y. Fatahi
    • P. Makvandi
    • M. Saeb
    • M. Bagherzadeh
    • M. Asadnia... i 2 innych

    - CHEMOSPHERE - Rok 2022

    Metal-organic frameworks (MOFs) biocompatible systems can host enzymes/bacteria/viruses. Herein we synthesized a series of fatty acid amide hydrolase (FAAH)-decorated UiO-66-NH2 based on Citrus tangerine leaf extract for drug delivery and biosensor applications. Five chemically manipulated FAAH-like benzamides were localized on the UiO-66-NH2 surface with physical interactions. Comprehensive cellular and molecular analyses were...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Interactions with recognized objects

    Publikacja

    - Rok 2014

    Implicit interaction combined with object recognition techniques opens a new possibility for gathering data and analyzing user behavior for activity and context recognition. The electronic eyewear platform, eGlasses, is being developed, as an integrated and autonomous system to provide interactions with smart environment. In this paper we present a method for the interactions with the recognized objects that can be used for electronic...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection

    A methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Distinguishing views in symmetric networks: A tight lower bound

    Publikacja

    The view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.

    Pełny tekst do pobrania w portalu

  • Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks

    Publikacja

    - Electronics - Rok 2022

    Dominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...

    Pełny tekst do pobrania w portalu

  • Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej

    Stacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.

  • Biometric identity verification

    Publikacja

    - Rok 2022

    This chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...

  • Design and Performance Evaluation of the Energy Subsystem of a Hybrid Light andWave Energy Harvester

    The paper presents the design and performance of an energy subsystem (ES) dedicated to hybrid energy harvesters (HEHs): wave energy converters (WECs) combined with photovoltaic panels (PVPs). The considered ES is intended for compact HEHs powering autonomous end-node devices in distributed IoT networks. The designed ES was tested experimentally and evaluated in relation to the mobile and wireless distributed communication use case....

    Pełny tekst do pobrania w portalu

  • Asynchronous time difference of arrival (ATDOA) method

    A new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The reliability of any-hop star networks with respect to failures of communication nodes.

    Publikacja

    - Rok 2009

    This paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci

    architecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...

    Pełny tekst do pobrania w portalu

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publikacja

    - Rok 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Pełny tekst do pobrania w portalu

  • Simulating Malware with MAlSim

    Publikacja

    - Rok 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publikacja

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Modele budowy wartości dla klienta - charakterystyka i rozwinięcie

    Publikacja

    Rozwój form realizacji biznesu umożliwił zbadanie nowych obiektów związanych z generowaniem wartości dla klienta i przedsiębiorstwa. W pracy scharakteryzowano logiki tworzenia wartości będące podstawą modeli łańcucha wartości, sklepu wartości, sieci wartości oraz chmury wartości. Zaproponowano także wprowadzenie nowego składnika do struktury tych modeli w postaci węzła wartości.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Thin-walled frames and grids - statics and dynamics

    Publikacja

    Frames and grids assembled with thin-walled beams of open cross-section are widely applied in various civil engineering and vehicle or machine structures. Static and dynamic analysis of theses structures may be carried out by means of different models, startingfrom the classical models made of beam elements undergoing the Kirchhoff assumptions to the FE discretization of whole frame into plane elements. The former model is very...

  • Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing

    Publikacja

    Protection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...

  • Comparison of Transmission Capacities of Two Regulation Systems: Lateral and in-phase Control Transformers

    This paper presents a comparison of regulation capabilities of lateral and in-phase control transformers in a selected node of a power system. Their regulation capabilities are presented, as well as cross-system exchange options.

    Pełny tekst do pobrania w portalu

  • Fracture simulations in concrete beam under bending using a mesoscopic model with cohesive elements

    Publikacja

    - Rok 2016

    The main aim of this paper was to investigate a complex fracture process in a concrete beam subjected to 3-point bending test by means of the 2D meso-scale FEM with 4-node cohesive elements embedded in the initial mesh of 3-node solid elements. The material heterogeneity was taken into account by considering 3 different phases (aggregate, cement matrix, ITZs) on the basis of randomly generated internal structure of concrete and...

  • Influence of Dielectric Overlay Permittivity on Size and Performance of Miniaturized ESPAR Antenna

    Publikacja

    In this paper, influence of dielectric overlay permittivity on miniaturized ESPAR antenna parameters is presented. ESPAR antenna is a low-cost and energy-efficient way to implement beam steering capability to a node and improve network performance. The antenna size reduction is obtained by embedding its active and passive elements in ABS based materials of relative permittivity equal to 4, 5.5 and 7.5 in order to achieve network...

    Pełny tekst do pobrania w portalu

  • Bioterrorism — characteristics and possibilities of prevention

    In the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.

    Pełny tekst do pobrania w portalu

  • Toward Fast Calculation of Communication Paths for Resilient Routing

    Publikacja

    - NETWORKS - Rok 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Reliability model of the crankshaft-piston assembly

    Publikacja

    - Journal of KONES - Rok 2012

    The laws that govern the durability of crankshaft-piston assembly friction nodes can be proved or at least derived or justified in an intuitive way. Operation of all the friction nodes is disturbed by external factors occurring with randomly changing intensity and also appearing at random. As the crankshaft-piston assembly friction nodes have a series structure and effects of those disturbances accumulate, their fitness for use...

    Pełny tekst do pobrania w portalu

  • Project-Based Collaborative Research and Training Roadmap for Manufacturing Based on Industry 4.0

    Publikacja

    - Rok 2023

    The importance of the economy being up to date with the latest developments, such as Industry 4.0, is more evident than ever before. Successful implementation of Industry 4.0 principles requires close cooperation of industry and state authorities with universities. A paradigm of such cooperation is described in this paper stemming from university partners with partly overlapping and partly complementary areas of expertise in manufacturing....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships

    Publikacja
    • M. Adam
    • H. Tomita
    • M. Szymański
    • P. Klimowicz
    • S. Tyszkowski
    • B. Wolska

    - Ido Movement for Culture. Journal of Martial Arts Anthropology - Rok 2015

    There is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...

    Pełny tekst do pobrania w portalu

  • Interior Point Method Evaluation for Reactive Power Flow Optimization in the Power System

    The paper verifies the performance of an interior point method in reactive power flow optimization in the power system. The study was conducted on a 28 node CIGRE system, using the interior point method optimization procedures implemented in Power Factory software.

    Pełny tekst do pobrania w portalu

  • The reliability of tree and star networks.

    Publikacja

    - Rok 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • On a Recurrence Arising in Graph Compression

    Publikacja

    - ELECTRONIC JOURNAL OF COMBINATORICS - Rok 2012

    In a recently proposed graphical compression algorithm by Choi and Szpankowski (2012), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability p) or the right subtree (with probability 1􀀀p). A new node is created as long as...

    Pełny tekst do pobrania w portalu

  • How Specific Can We Be with k-NN Classifier?

    Publikacja

    This paper discusses the possibility of designing a two stage classifier for large-scale hierarchical and multilabel text classification task, that will be a compromise between two common approaches to this task. First of it is called big-bang, where there is only one classifier that aims to do all the job at once. Top-down approach is the second popular option, in which at each node of categories’ hierarchy, there is a flat classifier...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Receiver-side fingerprinting method for color images based on a series of quaternion rotations

    The proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...

  • Mission impossible for cellular internalization: When porphyrin alliance with UiO-66-NH2 MOF gives the cell lines a ride

    Publikacja
    • S. Ahmadi
    • V. Jajarmi
    • M. Ashrafizadeh
    • A. Zarrabi
    • J. Haponiuk
    • M. Saeb
    • E. C. Lima
    • M. Rabiee
    • N. Rabiee

    - JOURNAL OF HAZARDOUS MATERIALS - Rok 2022

    Is it possible to accelerate cell internalization by hybridization of nanomaterials? Herein we support the realization of using metal-organic frameworks (MOFs) with the assistance of rigid porphyrin structure (H2TMP) aimed at drug loading, drug release, relative cell viability, and targeted in vitro drug delivery. There are several MOFs, i.e., UiO-66-NH2 (125 ± 12.5 nm), UiO-66-NH2 @H2TMP (160 ± 14 nm), UiO-66-NH2 @H2TMP@DOX, and...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Porównanie możliwości przesyłowych dwóch układów regulacyjnych: transformatorów z regulacją poprzeczną oraz transformatorów z regulacją wzdłużną

    W artykule przedstawiono porównanie możliwości regulacyjnych transformatorów z regulacją poprzeczną oraz wzdłużną w wybranym węźle systemu elektroenergetycznego. Zaprezentowano możliwości regulacyjne tych układów oraz możliwości kształtowania wymiany międzysystemowej.

    Pełny tekst do pobrania w portalu

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Pełny tekst do pobrania w portalu

  • Approximation Strategies for Generalized Binary Search in Weighted Trees

    Publikacja

    - Rok 2017

    We consider the following generalization of the binary search problem. A search strategy is required to locate an unknown target node t in a given tree T. Upon querying a node v of the tree, the strategy receives as a reply an indication of the connected component of T\{v} containing the target t. The cost of querying each node is given by a known non-negative weight function, and the considered objective is to minimize the total...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study

    Publikacja

    This study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Collision-Free Network Exploration

    Publikacja
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Rok 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Detection of illicit chemicals by portable Raman spectrometer

    The Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...

    Pełny tekst do pobrania w portalu

  • Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

    Publikacja

    - Rok 2013

    The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Receiver-side fingerprinting method based on quaternion sandwich product

    In this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...

  • Collision-free network exploration

    Publikacja
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Rok 2017

    Mobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...

    Pełny tekst do pobrania w portalu

  • Bounds on the cover time of parallel rotor walks

    Publikacja

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Rok 2016

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...

    Pełny tekst do pobrania w portalu

  • Timber frame houses resistant to dynamic loads - seismic analysis

    The aim of the article is to present results of seismic analysis results of two real-sized timber frame buildings subjected to seismic excitations. The first model was insulated with mineral wool, the second one with polyurethane foam. Technology and specifications involved in both models construction is based on the previously conducted experimental research on timber frame houses, including wall panels tests, wall numerical models...

    Pełny tekst do pobrania w portalu

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publikacja

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Rok 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Towards Scalable Simulation of Federated Learning

    Federated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...

    Pełny tekst do pobrania w serwisie zewnętrznym