Wyniki wyszukiwania dla: FAKE VIP ATTACK
-
Marcin Niedopytalski Ekspert ds. Ochrony Osób, Strzelectwa i Prawa Konstytucyjnego
OsobyMarcin Niedopytalski to uznany ekspert z 25-letnim doświadczeniem w dziedzinie ochrony i bezpieczeństwa, autor wielu specjalistycznych książek, naukowiec, a także badacz i obserwator w szeroko rozumianej sferze ochrony. Jego rozległe kompetencje obejmują wiele kluczowych obszarów, takich jak zarządzanie kryzysowe, ochrona VIP-ów, samoobrona, strzelectwo, a także ratownictwo medyczne. Marcin rozpoczął swoją karierę w ochronie bardzo...
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublikacjaThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublikacjaCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublikacjaThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublikacjaNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublikacjaThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Chemorezystancyjny czujnik gazu na bazie polimeru przewodzącego PEDOT
PublikacjaPolimery przewodzące, takie jak Poli(3,4-etylenodioksytiofen) (PEDOT) są atrakcyjnymi materiałami elektrodowymi, które posiadają takie zalety, jak biokompatybilność, duża przewodność i elastyczność. Elektroprzewodzące polimery można otrzymać w wyniku chemicznej polimeryzacji lub elektropolimeryzacji. W niniejszej pracy przedstawiono zostanie koncepcja czujnika gazów składająca się z elektrody grzebieniowej oraz polimeru przewodzącego...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublikacjaDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Microscopic examination of the texture of paper products
Dane BadawczeAtomic force microscopy (AFM) can be used to study the state of the paper fibers with the aim of providing qualitative and semi-quantitative information on degradation and aging. The work [1] reports the results of tests of various paper products subjected to deliberate aging processes under the influence of various factors. Chemical and biological...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublikacjaThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublikacjaTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublikacjaDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublikacjaTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublikacjaThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublikacjaA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints
PublikacjaThe paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents
PublikacjaAutomation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...
-
An Innovative Approach to the Forecasting of Energetic Effects While Wood Sawing
PublikacjaIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specifi c cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture mechanics....
-
An innovative approach to the forecasting of energetic effects while wood sawing
PublikacjaIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specific cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Advanced oxidation processes for the removal of mono and polycyclic aromatic hydrocarbons – A review
PublikacjaAromatic hydrocarbons (AHs) are toxic environmental contaminants presented in most of the environmental matrices. Advanced oxidation processes (AOPs) for the removal of AHs in the account of complete mineralization from various environmental matrices have been reviewed in this paper. An in-depth discussion on various AOPs for mono (BTEX) and polyaromatic hydrocarbons (PAHs) and their derivatives is presented. Most of the AOPs were...
-
The power of personal brand authenticity and identification: top celebrity players’ contribution to loyalty toward football
PublikacjaPurpose: In the current era of fake news, illusions, manipulations, and other artificial attributes of virtuality and reality, authenticity is a virtue that people highly appreciate. This study examines the influence of the personal brand authenticity of top football players on loyalty to the football discipline in general, via the mediation of personal brand identification. Design: Based on data collected from a convenience sample...
-
Studies on the formation of formaldehyde during 2-ethylhexyl 4-(dimethylamino)benzoate demethylation in the presence of reactive oxygen and chlorine species
PublikacjaIn order to protect the skin from UV radiation, personal care products (PCPS) often contain chemical UV-filters. These compounds can enter the environment causing serious consequences on the water ecosystems. The aim of this study was to examine, the effect of different factors, such as UV light, the presence of NaOCl and H2O2 on the formaldehyde formation during popular UV filter, 2-ethylhexyl 4-(dimethylamino)benzoate (ODPABA)...
-
Insight into the microstructural and durability characteristics of 3D printed concrete: Cast versus printed specimens
PublikacjaThis study presents the comparison of microstructural and durability characteristics of 3D printed concrete (3DPC) depending on its production method (printing or casting). Printed samples with different numbers of layers, as well as a cast specimen with an identical mix composition, were produced and compared, with their microstructural pore and solid characteristics quantitatively and qualitatively investigated. For this purpose,...
-
The oil film parameters of the wankel engine apex seal in aspects of durability of mating elements
PublikacjaThe Wankel engine is one of only few alternatives to the reciprocating engines. The advantages such as good value of maximum engine power to its mass ratio are still present and can have great sense in selected fields of application, for example General Aviation. Nevertheless the disadvantages of the Wankel engine design have never lost its importance and still pose an obstacle to wider use of the Wankel engine. One of the main...
-
Assessment of cardiovascular risk in assisted living
PublikacjaWady i choroby układu krążenia są jedną z podstawowych przyczyn problemów zdrowotnych oraz przyczyn śmierci. Wczesne ich wykrycie jest szczególnie cenne jako, że może zapobiec przez poważnymi incydentami (np. zawał, udar, itp.). W artykule przedstawiono nasobny system pomiarowy integrujący wiele pomiarów przydatnych do oceny problemów kardiologicznych.Disorders of the heart and blood vessels are the leading cause of health problems...
-
Multi-fidelity robust aerodynamic design optimization under mixed uncertainty
PublikacjaThe objective of this paper is to present a robust optimization algorithm for computationally efficient airfoil design under mixed (inherent and epistemic) uncertainty using a multi-fidelity approach. This algorithm exploits stochastic expansions derived from the Non-Intrusive Polynomial Chaos (NIPC) technique to create surrogate models utilized in the optimization process. A combined NIPC expansion approach is used, where both...
-
Qualitative analysis of phospholipids and their oxidised derivatives – used techniques and examples of their applications related to lipidomic research and food analysis
PublikacjaPhospholipids (PLs) are important biomolecules that not only constitute structural building blocks and scaffolds of cell and organelle membranes, but also play a vital role in cell biochemistry and physiology. Moreover, dietary exogenous PLs are characterized by high nutritional value and other beneficial health effects, which are confirmed by numerous epidemiological studies. For this reason, PLs are of high interest in lipidomics...
-
Fast Low-fidelity Wing Aerodynamics Model for Surrogate-Based Shape Optimization
PublikacjaVariable-fidelity optimization (VFO) can be efficient in terms of the computational cost when compared with traditional approaches, such as gradient-based methods with adjoint sensitivity information. In variable-fidelity methods, the directoptimization of the expensive high-fidelity model is replaced by iterative re-optimization of a physics-based surrogate model, which is constructed from a corrected low-fidelity model. The success...
-
Facet effect of TiO2 nanostructures from TiOF2 and their photocatalytic activity
PublikacjaIn this study, special attention is focused on the design of TiO2 morphology and microstructure in the two-step preparation procedure using TiOF2 as a precursor to study their photodegradation mineralization efficiency. Firstly, TiOF2 was synthesized by a simple solvothermal method using titanium(IV) tetrafluoride, which was further used as a precursor in preparation of anatase 2D nanosheets, octahedral, decahedral, and rectangular prisms...
-
Novel insights into conjugation of antitumor-active unsymmetrical bisacridine C-2028 with glutathione: characteristics of non-enzymatic and glutathione S-transferase-mediated reactions
PublikacjaUnsymmetrical bisacridines (UAs) are a novel potent class of antitumor-active therapeutics. A significant route of phase II drug metabolism is conjugation with glutathione (GSH), which can be non-enzymatic and/or catalyzed by GSH-dependent enzymes. The aim of this work was to investigate the GSH-mediated metabolic pathway of a representative UA, C 2028. GSH supplemented incubations of C-2028 with rat, but not with human, liver...
-
Improved degradation of etodolac in the presence of core-shell ZnFe2O4/SiO2/TiO2 magnetic photocatalyst
PublikacjaIn the present study, susceptibility to photocatalytic degradation of etodolac, 1,8-diethyl-1,3,4,9 – tetrahydro pyran - [3,4-b] indole-1-acetic acid, which is a non-steroidal anti-inflammatory drug frequently detected in an aqueous environment, was for the first time investigated. The obtained p-type TiO2-based photocatalyst coupled with zinc ferrite nanoparticles in a core-shell structure improves the separation and recovery...
-
Formation of chlorinated breakdown products during degradation of sunscreen agent, 2-ethylhexyl-4-methoxycinnamate in the presence of sodium hypochlorite
PublikacjaIn this study, a new degradation path of sunscreen active ingredient, 2-ethylhexyl-4-methoxycinnamate (EHMC) and 4-methoxycinnamic acid (MCA) in the presence of sodium hypochlorite (NaOCl), was discussed. The reaction products were detected using gas chromatography–mass spectrometry (GC-MS). Since HOCl treatment leads to more polar products than EHMC, application of polar extracting agents, dichloromethane and ethyl acetate/n-hexane...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Expedited constrained multi-objective aerodynamic shape optimization by means of physics-based surrogates
PublikacjaIn the paper, computationally efficient constrained multi-objective design optimization of transonic airfoil profiles is considered. Our methodology focuses on fixed-lift design aimed at finding the best possible trade-offs between the two objectives: minimization of the drag coefficient and maximization of the pitching moment. The algorithm presented here exploits the surrogate-based optimization principle, variable-fidelity computational...