Filtry
wszystkich: 4213
wybranych: 2543
-
Katalog
- Publikacje 2543 wyników po odfiltrowaniu
- Czasopisma 369 wyników po odfiltrowaniu
- Konferencje 202 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 348 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 174 wyników po odfiltrowaniu
- Wydarzenia 6 wyników po odfiltrowaniu
- Dane Badawcze 556 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: COMPUTER SECURITY LABORATORY
-
Cost assessment of computer security activities
PublikacjaComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Computer-assisted assessment of learning outcomes in the laboratory of metrology
PublikacjaIn the paper, didactic experience with broad and rapid continuous assessment of students’ knowledge, skills and competencies in the Laboratory of Metrology, which is an example of utilisation of assessment for learning, is presented. A learning management system was designed for manage, tracking, reporting of learning program and assessing learning outcomes. It has ability to provide with immediate feedback, which is used by the...
-
Transient detection for speech coding applications
PublikacjaSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Extendable Safety and Security Ontology
PublikacjaSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublikacjaThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Towards systemic functional safety and security management in hazardous plants
PublikacjaThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Generalized access control in hierarchical computer network
PublikacjaThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublikacjaA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Quaternion Encryption Method for Image and Video Transmission
PublikacjaQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublikacjaArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublikacjaAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Real-Time Sensor-Based Human Activity Recognition for eFitness and eHealth Platforms
PublikacjaHuman Activity Recognition (HAR) plays an important role in the automation of various tasks related to activity tracking in such areas as healthcare and eldercare (telerehabilitation, telemonitoring), security, ergonomics, entertainment (fitness, sports promotion, human–computer interaction, video games), and intelligent environments. This paper tackles the problem of real-time recognition and repetition counting of 12 types of...
-
Image projection in Immersive 3D Visualization Laboratory
PublikacjaIn recent years, many centers in the world attempted to build a virtual reality laboratory. The main idea of such laboratory is to allow the user to “immerse” into and move in a computer-generated virtual world. In the paper, the underlying principles of the system of virtual reality (VR) are described. The selected implementations constructed by the research centers of the world are also presented. The cave automatic virtual environment...
-
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublikacjaA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Modelowanie matematyczne górnej sieci trakcyjnej dla potrzeb diagnostyki odbieraków prądu
PublikacjaGórna sieć trakcyjna jest obecnie najbardziej skutecznym sposobem zasilania kolejowych pojazdów elektrycznych. Wzrost prędkości pojazdów zwiększa pobór mocy i wymaga zapewnienia właściwej współpracy odbieraków prądu pojazdów z siecią jezdną. Metody modelowania i projektowania wspomaganego komputerowo dla górnej sieci trakcyjnej są obecnie na całym świecie szeroko rozwijane. W artykule przedstawiono nowy model matematyczny elementów...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Koncepcja analizy stanów emocjonalnych użytkowników w kontekście systemów zabezpieczeń transportowych
PublikacjaAutorzy, przywołując własne i światowe badania nad rozpoznawaniem emocji ludzkich z obrazu twarzy, wskazują na możliwość zastosowania algorytmów komputerowych i ich implementacji w komputerach osobistych (i innych urządzeniach personalnych wyposażonych w dostatecznie silny procesor obliczeniowy). Zastosowanie takiego rozwiązania może poprawić bezpieczeństwo użytkowania urządzeń, maszyn i pojazdów, których operatorzy muszą gwarantować...
-
Funkcjonowanie zespołów napędu hydraulicznego maszyn w niskich temperaturach otoczenia
PublikacjaW pracy przedstawiono cztery warianty klasyfikacji rozruchów oziębionego napędu hydraulicznego. Pierwsza sytuacja dotyczy zagadnienia, w którym wszystkie zespoły układu napędowego wraz z olejem mają taką samą niską temperaturę podczas rozruchu. Pozostałe warianty odnoszą się do rozruchu w warunkach szoku termicznego wywołanych zasilaniem ciepłym czynnikiem roboczym oziębionych zespołów hydraulicznych. Rozruch zespołów...
-
Data Model Development for Security Information Sharing in Smart Grids
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publikacja -
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
External Security Strategies of Belarus
PublikacjaUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Ukraine’s Energy Security in Strategies
PublikacjaDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Multimodal Augmented Reality System for Real-Time Roof Type Recognition and Visualization on Mobile Devices
PublikacjaThe utilization of augmented reality (AR) is becoming increasingly prevalent in the integration of virtual reality (VR) elements into the tangible reality of the physical world. It facilitates a more straightforward comprehension of the interconnections, interdependencies, and spatial context of data. Furthermore, the presentation of analyses and the combination of spatial data with annotated data are facilitated. This is particularly...
-
Areas of research in maritime security
PublikacjaW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
An integrated framework for security protocol analysis
PublikacjaAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Innovative Solutions for Immersive 3D Visualization Laboratory
PublikacjaThe paper presents results of the work concerning the technical specification of Immersive 3D Visualization Laboratory to be opened in late summer 2014 at the Faculty of Electronics, Telecommunications and Informatics at Gdańsk University of Technology in Poland. The person immersed in VR space will be placed in a transparent sphere with a diameter of over 10 feet, supported on rollers and equipped with a motion tracking system....
-
Launch of the Immersive 3D Visualization Laboratory
PublikacjaThe paper presents the concept of Immersive 3D Visualization Laboratory, formed at the Faculty of Electronics, Telecommunications and Informatics at Gdańsk University of Technology under the project Gdańsk University of Technology's Modern auditoriums. The basic unit of this laboratory will be cubic CAVE (Cave Automatic Virtual Environment) enriched with spherical walk simulator. This device will allow the user unlimited walking,...
-
Resilience and Security in Software Defined Networking
PublikacjaThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
Energy Security of Polish Consumers in 2004-2021
PublikacjaTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
The Sense of Security of the Prison Service Offi cers
Publikacja