Filtry
wszystkich: 1939
-
Katalog
- Publikacje 1385 wyników po odfiltrowaniu
- Czasopisma 325 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 84 wyników po odfiltrowaniu
- Projekty 12 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 33 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 14 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY
-
Oczekiwania stron konfliktu i mediatorów wobec e-mediacji. Czy e-mediacja ma przyszłość?
PublikacjaArtykuł prezentuje możliwości prowadzenia mediacji – skutecznej i korzystnej, ale rzadko wykorzystywanej w Polsce metody pozasądowego rozstrzygania sporów - z wykorzystaniem profesjonalnej platformy internetowej. Na podstawie badań przeprowadzonych na grupie mediatorów oraz stron konfliktów określono oczekiwania dotyczące prowadzenia e-mediacji i wyzwania, jakie stawia przed mediatorami mediacja on-line.
-
International Conference on Information Security and Assurance
Konferencje -
International Conference on Security in Pervasive Computing
Konferencje -
International Conference on Computational Intelligence and Security
Konferencje -
International Workshop on Visualization for Cyber Security
Konferencje -
Australian Information Security Management Conference
Konferencje -
Information Hiding and Multimedia Security Workshop
Konferencje -
International Conference on Information and Communications Security
Konferencje -
International Conference on Information Theoretic Security
Konferencje -
International Conference on Principles of Security and Trust
Konferencje -
IFIP Information Security & Privacy Conference
Konferencje -
Australasian Conference on Information Security and Privacy
Konferencje -
International Workshop on Information Security Applications
Konferencje -
International IEEE Security in Storage Workshop
Konferencje -
International Conference on Information Security and Cryptology
Konferencje -
Workshop on Security and Privacy in e-Commerce
Konferencje -
Computational Intelligence in Security for Information Systems
Konferencje -
International Conference on Security of Information and Networks
Konferencje -
International Conference on Information Systems Security
Konferencje -
Australian Information Warfare and Security Conference
Konferencje -
Financial Cryptography and Data Security Conference
Konferencje -
Workshop in Information Security Theory and Practices
Konferencje -
International Conference on Information Security and Cryptography
Konferencje -
International Symposium on Information Assurance and Security
Konferencje -
Australasia Conference on Information Security and Privacy
Konferencje -
International Conference on Cryptology and Network Security
Konferencje -
Symposium on Requirements Engineering for Information Security
Konferencje -
SKLOIS Conference on Information Security and Cryptology
Konferencje -
Annual Conference on Privacy, Security and Trust
Konferencje -
International Workshop on Issues in the Theory of Security
Konferencje -
Information Security Practice and Experience Conference
Konferencje -
International Conference on network and System Security
Konferencje -
International Workshop on Security in Information Systems
Konferencje -
IEEE European Symposium on Security and Privacy
Konferencje -
ACM Conference on Computer and Communications Security
Konferencje -
Annual Computer Security Applications Conference
Konferencje -
European Symposium On Research In Computer Security
Konferencje -
International Conference on Availability, Reliability and Security
Konferencje -
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublikacjaThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Implementing decisional trust: a first approach for smart reliable systems
PublikacjaIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Asia Conference on Information, Computer and Communications Security (ACM Symposium on Information, Computer and Communications Security)
Konferencje -
Trudności ochrony środowiska w planowaniu przestrzennym–struktura problemu
PublikacjaArtykuł zawiera ogólną systematykę negatywnych oddziaływań na środowisko przyrodnicze. Autor omawia trudności zapobiegania przez planowanie przestrzenne zagrożeniom środowiska. Analizuje strukturę problemu, wskazując czynniki: społeczne, gospodarcze, prawne i polityczne, w tym rolę: motywacji, hierarchii wartości, świadomości ekologicznej, przekonań. Autor wskazuje też działania prowadzące do ograniczenia zagrożeń.
-
Forecasted climate changes and their influence on cities and regions in 2050 in terms of extreme hydrological events
PublikacjaGlobal climate change is a problem which arises numerous theories and uncertainties, especially in terms of speculated human impact. Independent from the fact, what is the main driver for the changes, some of the climate shifts are visible already nowadays. Both contemporary and future cities will have to face such problems. Although climate change may cause numerous effects on different fields, a special stress in this article...
-
EHV transmission lines wires location on line operation issues - case studies
PublikacjaTransmission lines towers construction affects the line parameters and influences on its operation in the future. Misguided design of the tower can lead to serious problems such as overvoltages, electric arc extinction difficulties, voltage asymmetry, resonance phenomena or increasing of magnetic field near the line. The paper points out those threats on example of 400 kV double circuit overhead transmission line with shunt reactors....
-
Analysis of the Usefulness of Cheap Audio Recorders for Spectral Measurement of Environmental Noise
PublikacjaEnvironmental noise pollution is nowadays one of the most serious health threats. The impact of noise on the human body depends not only on the sound level but also on its spectral distribution. Reliable measurements of the environmental noise spectrum are often hampered by the very high price of top quality measuring devices. This paper explores the possibility of using much cheaper audio recorders for the frequency analysis....
-
Youth attitude to entrepreneurship in Eastern and Central European countries: Gender aspect
PublikacjaCurrent business conditions pose new challenges to youth entrepreneurship, which is a significant component of countries’ economic growth. In addition, Generation Z differs from previous generations and requires new approaches. In this context, a comprehensive study of the peculiarities and various aspects of youth entrepreneurship development is highly-demanded and relevant. Furthermore, the lower representation of women among...
-
Towards Cognitive and Perceptive Video Systems
PublikacjaIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublikacjaMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Attitudes to tree removal on private property in rural and urban Polish municipalities.
Dane BadawczeThe urban-rural divide is an important factor known to affect public opinion on issues related to environmental protection and management. The present data set allows for a deeper understanding of this issue with respect to policies dealing with tree removal on private property in two municipalities located in southern Poland: Racibórz (an urban municipality)...