Filtry
wszystkich: 355
wybranych: 335
Wyniki wyszukiwania dla: network security
-
Political Parties in the Digital World
PublikacjaThe aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....
-
A framework for automatic detection of abandoned luggage in airport terminal
PublikacjaA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
Expert assessment of arguments: a method and its experimental evaluation
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublikacjaAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublikacjaThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublikacjaCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublikacjaHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
Support for argument structures review and assessment
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublikacjaThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublikacjaCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublikacjaThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublikacjaIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
Electricity demand prediction by multi-agent system with history-based weighting
PublikacjaEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublikacjaSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
A model-based approach to analysis of authentication protocols.
PublikacjaW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Health monitoring services based on off-the-shelf mobile devices
PublikacjaDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublikacjaSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
A sense of security and freedom in a residential environment
PublikacjaThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
I, Robot: between angel and evil
PublikacjaThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublikacjaW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
Macro-nutrients recovery from liquid waste as a sustainable resource for production of recovered mineral fertilizer: Uncovering alternative options to sustain global food security cost-effectively
PublikacjaGlobal food security, which has emerged as one of the sustainability challenges, impacts every country. As food cannot be generated without involving nutrients, research has intensified recently to recover unused nutrients from waste streams. As a finite resource, phosphorus (P) is largely wasted. This work critically reviews the technical applicability of various water technologies to recover macro-nutrients such as P, N, and...
-
Towards the value-based design of on-line services
PublikacjaThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Experiment with small objects floating under water in the harbor security aspect.
PublikacjaObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublikacjaHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublikacjaA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Flexicurity. Elastyczność i bezpieczeństwo
PublikacjaFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Assurance Case Patterns On-line Catalogue
PublikacjaAssurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...
-
Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water
PublikacjaThe article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublikacjaImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublikacjaA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Assembling and testing of quasi-static hybrid piezoelectric motor based on electroactive lubrication principle
PublikacjaThe presented paper concerns a novel concept of hybrid piezoelectric motor based on electroactive lubrication principle. Its structure is combined of quasi-static and resonance piezoelectric actuators, synchronizing their work to generate the rotary movement. The hybrid motor topology is compared to the existing piezoelectric motors, regarding its field of applications in embedded systems with very high security requirements. The...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria
PublikacjaNiniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...
-
Comparison of state feedback and PID control of pressurizer water level in nuclear power plant
PublikacjaThe pressurizer water level control system in nuclear power plant with pressurized water reactor (PWR) is responsible for coolant mass balance. The main control goal is to stabilize the water level at a reference value and to suppress the effect of time-varying disturbances (e.g. coolant leakage in primary circuit pipeline system). In the process of PWR power plant operation incorrect water level may disturb pressure control or...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Federated Learning in Healthcare Industry: Mammography Case Study
PublikacjaThe paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...
-
Efficient removal of 2,4,6-trinitrotoluene (TNT) from industrial/military wastewater using anodic oxidation on boron-doped diamond electrodes
PublikacjaWith growing public concern about water quality particular focus should be placed on organic micropollutants, which are harmful to the environment and people. Hence, the objective of this research is to enhance the security and resilience of water resources by developing an efficient system for reclaiming industrial/military wastewater and protecting recipients from the toxic and cancerogenic explosive compound – 2,4,6-trinitrotoluene...