Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES

Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES

  • Measures of region failure survivability for wireless mesh networks

    Publikacja

    - WIRELESS NETWORKS - Rok 2015

    Wireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...

    Pełny tekst do pobrania w portalu

  • Generic invariant measures for iterated systems of interval homeomorphisms

    Publikacja

    - ARCHIV DER MATHEMATIK - Rok 2020

    It is well known that iterated function systems generated by orientation preserving homeomorphisms of the unit interval with positive Lyapunov exponents at its ends admit a unique invariant measure on (0, 1) provided their action is minimal. With the additional requirement of continuous differentiability of maps on a fixed neighbourhood of {0,1} { 0 , 1 } , we present a metric in the space of such systems which renders it complete....

    Pełny tekst do pobrania w portalu

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Pełny tekst do pobrania w portalu

  • Some Security Features of Selected IoT Platforms

    Publikacja

    - TASK Quarterly - Rok 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Pełny tekst do pobrania w portalu

  • The Sense of Security of the Prison Service Offi cers

    Publikacja

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated functional safety and cyber security analysis

    Publikacja

    - IFAC-PapersOnLine - Rok 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • Improving Re-rankCCP with Rules Quality Measures

    Publikacja

    - Rok 2022

    Recommender Systems are software tools and techniques which aim at suggesting new items that may possibly be of interest to a user. Context-Aware Recommender Systems exploit contextual information to provide more adequate recommendations. In this paper we described a modification of an existing contextual post-filtering algorithm which uses rules-like user representation called Contextual Conditional Preferences. We extended the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Survey on opportunities and barriers in lighting controls

    Publikacja
    • B. B. Unzeta
    • J. de Boer
    • R. Delvaeye
    • B. Deroisy
    • M. Fontoynont
    • D. Geisler-Moroder,
    • N. Gentile,
    • T. Luo
    • D. N. Pimenta
    • P. Reinhold... i 5 innych

    - Rok 2021

    This report summarizes a survey performed in eight countries on the status quo of daylight and electric lighting control systems. Feedback from more than 100 international experts (building / facility managers and planers) was evaluated. The aim of the survey was to identify the perception of the different possibilities of the current lighting control solutions and the expectations about the control systems. The survey aims to...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Pełny tekst do pobrania w portalu

  • Security ontology construction and integration

    Publikacja

    - Rok 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Determining and verifying the safety integrity level with security aspects

    Publikacja

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publikacja

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Pełny tekst do pobrania w portalu

  • External Validation Measures for Nested Clustering of Text Documents

    Publikacja

    Abstract. This article handles the problem of validating the results of nested (as opposed to "flat") clusterings. It shows that standard external validation indices used for partitioning clustering validation, like Rand statistics, Hubert Γ statistic or F-measure are not applicable in nested clustering cases. Additionally to the work, where F-measure was adopted to hierarchical classification as hF-measure, here some methods to...

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publikacja

    - Rok 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publikacja

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Improvements and Spatial Dependencies in Energy Transition Measures

    Publikacja

    - ENERGIES - Rok 2021

    This article aims to improve one of the newest energy transition measures—the WorldEconomic Forum WEF Energy Transition Index (ETI) and find its driving forces. This paper proposesa new approach to correct the ETI structure, i.e., sensitivity analysis, which allows assessing theaccuracy of variable weights. Moreover, the novelty of the paper is the use the spatial error modelsto estimate determinants of the energy transition on...

    Pełny tekst do pobrania w portalu

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publikacja

    - Rok 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Pełny tekst do pobrania w portalu

  • Functional safety and security assessment of the control and protection systems

    Publikacja

    - Rok 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • Model of pressure distribution in vortex flow controls

    The paper is devoted to the vortex valve. Existing devices are described by CFD-methods, or by means of simple empirical relations. A rational method of the considered object design is proposed, on the base of the input and dissipation energy balance., what gives a simple algebraic equation. Conformity between calcul;ated and measured parameters of the vortex valve allows for acceptation of the proposed concept.

    Pełny tekst do pobrania w portalu

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Pełny tekst do pobrania w portalu

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Assessment of a Turbo-Gas Power Plant

    Publikacja

    - Rok 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Modelling selected road safety measures at the regional level in Europe

    Regions are Europe’s basic levels of management. The literature was reviewed to identify regional safety analyses and some of the factors that are important for road safety in the regions. Next, data were collected atthe regional NUTS 2 level in Europe for the years 1999-2008. An analysis of the data helped identify f actors which have the strongest bearing on fatalities and other safety measures. This paper presents the initial...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Patient-Related Outcome Measures

    Czasopisma

    ISSN: 1179-271X

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Pełny tekst do pobrania w portalu

  • Automatic sound recognition for security purposes

    Publikacja

    - Rok 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publikacja

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • ECONOMIC MEASURES AGAINST A PANDEMICS

    The appropriate level of treatment during periods of increasing workload in the health care system or a particular hospital is ensured either by changing the organization of the system and the principles of use of resources such as space, staff and consumables or their redistribution, or by financial resources such resources are increased or replenished. This article contributes to improve the concept of resource allocation as...

    Pełny tekst do pobrania w portalu

  • The new measures of the population ageing

    Publikacja

    - Rok 2005

    Zestarzenie się populacji mierzy sie zwykle frakcją osób starszych. Miara ta nie uwzględnia rozkładu wieku wśród osób starszych. W pracy przedstawiane są nowe miary zestarzenia się populacji, których ideę zaczerpnięto z ekonomiki ubóstwa: absolutna luka wiekowa AG, relatywna luka wiekowa RAG, syntetyczna miara HRAG=HCR. RAG oraz syntetyczna miara P2. Te nowe miary testowo analizując proces zestarzenia się w 4 krajach europejskich...

  • A sense of security and freedom in a residential environment

    The article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...

    Pełny tekst do pobrania w portalu

  • THE PROTECTIVE MEASURES AGAINST SARS-COV-2 INFECTION IN THE SEAFOOD COMPANY FROM THE PERSPECTIVE OF THE EMPLOYEES

    Purpose: To identify and discuss the protective measures implemented to prevent SARS-CoV-2 infection among employees. Design/methodology/approach: The four-stage course of research. Case study and structured interviews with all employees, directly and indirectly, involved in food processing. Research questions: (R1) What measures have been taken to prevent the risk of infection among employees? (R2) What activities and responsibilities...

    Pełny tekst do pobrania w portalu

  • Adipokine and cytokine levels in patients with adrenocortical cancer, subclinical Cushing's syndrome and healthy controls

    Publikacja

    - STEROIDS - Rok 2018

    Introduction In recent years researchers have focused at hormonal activity in Cushing’s syndrome (CS) in connection with metabolic disorders and the role of adipokines and cytokines secreted by the adipose tissue. The aim of the study was to investigate levels of adipokines and cytokines in patients with: subclinical CS (SCS) – in relation to hormonal parameters of hypercortisolemia, and, adrenocortical cancer (ACC). Materials...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • COMPARISON OF INVESTMENT PERFORMANCE MEASURES USING THE EXAMPLE OF SELECTED STOCK EXCHANGES

    In the following paper, the main objective is to examine whether the selection of the performance measure influences the evaluation of individual investments and the performance rankings generated on that basis. This study presents the values of 16 performance indicators along with their detailed descriptions. All calculations were made using the R program, and the source code can be found at the end of the article. Nine selected...

    Pełny tekst do pobrania w portalu

  • Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet

    Publikacja

    - Rok 2013

    The chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • SDN testbed for validation of cross-layer data-centric security policies

    Publikacja

    - Rok 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publikacja

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...

  • Sensorless multiscalar controls of induction motor at low speed

    Publikacja

    - Rok 2005

    W artykule przedstawiono zastosowanie obserwatora prędkości w dwóch różnych układach sterowania multiskalarnego silnikiem klatkowym. Pierwszy układ bazuje na prądzie stojana i strumieniu wirnika, natomiast drugi nowy układ wykorzystuje zmienne prąd stojana i strumień stojana. Zamieszczono wyniki badań symulacyjnych i eksperymentalych w układzie ze sterowaniem na procesorze SHARC.

  • Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof

    Publikacja
    • D. Yang
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • J. Oppenheim
    • W. Song

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2009

    New measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated safety and security analysis of hazardous plants and systems of critical infrastructure

    This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security information sharing for smart grids: Developing the right data model

    Publikacja

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security of export transactions in the offer of leading banks on the Polish market

    Publikacja

    - Rok 2018

    The following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...